Module 1 - Introduction to ethical hacking
- What does a malicious hacker do?
- Hacker classes
- Vulnerability research
- Ethical hacking testing
- Security websites
- Review - Module 1

Module 2 - Footprinting
- Reconnaissance phase and footprinting
- Scenario (cont.)
- Tools - Sam Spade
- Tools - NeoTrace
- Tools - The waybackmachine
- Tools - Smart whois
- Tools - Read notify
- Exercise - NeoTrace
- Review - Module 2

Module 3 - Scanning
- Checking for live systems
- Banner Grabbing
- Scenario (cont.)
- Tools - Angry IP
- Tools - NMap
- Tools - NetScanToolsPro
- Banner Grabbing
- NetCraft - OS Detection Tool
- SocksChain
- Review - Module 3

Module 4 - Enumeration
- What is Enumeration
- SNMP Enumeration
- Example - Connect Using Null Session
- Tools - DumpSEC
- SID
- GetAcct Tool
- SolarWinds
- Tools - UserInfo
- Tools - UserIP
- Review - Module 4

Module 5 - System Hacking
- Cracking Passwords
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Tool - Legion
- Tool - Keylogger - Proof of concept
- Tool - LophtCrack Password Cracking Tool
- Tool - pwdump Password Cracking Tool
- Tool - GetAdmin Tool
- Tool - Create Local Admin User X
- Tool - Stealth Files
- Tool - Spam Mimic - Hide Messages Using Normal Text
- Tool - Snow - Steganography
- Exercise - Legion
- Review - Module 5

Module 6 - Trojans and Backdoors
- Indications of a Trojan Attack
- ICMP Tunneling
- Trojan Horse Construction Kit
- Anti-Trojan Software
- Example - Tini Trojan
- Example - NetBus Trojan
- Example - Beast Trojan
- Example - YAB - Wrapper
- Tool - fPort
- Tool - TCPView
- Exercise - YAB - Wrapper
- Review - Module 6

Module 7 - Sniffers
- Types of Sniffing
- Sniffer Hacking Tools
- Raw Sniffing Tools
- Countermeasures
- Tool - Ethereal
- Tool - SMAC
- Tool - DSniff
- Tool - WebSpy
- Tool - Etherpeek
- Review - Module 7

Module 8 - Denial of Service
- What are Denial of Service Attacks
- DOS Attack Tools
- DDOS Attacks
- Reflected DOS Attacks
- Example - Ping of Death
- Example - Freak88
- Exercise - Freak88
- Review - Module 8

Module 9 - Social Engineering
- Review - Module 9

Module 10 - Session Hijacking
- Programs That Perform Session Hijacking
- Demo - Hijacking a Telnet Session
- Review - Module 10

Module 11 - Hacking Web Servers
- Server Vulnerabilities
- Vulnerability Scanners
- Example - RPC Hack
- Example - Metasploit Framework
- Example - Internet Printing Exploit
- Example - LSA Exploit
- Example - Unicode
- Example - Shadow Security Scanner
- Exercise - Shadow Security Scanner
- Review - Module 11

Module 12 - Web Application Vulnerabilities
- Web Application Setup & Hacking
- Web Application Threats
- Web Application Hacking Tools
- Tool Example - Blackwidow
- Tool Example - Google
- Tool Example - IE Cache Extractor
- Tool Example - Generate Unicode Strings
- IE Vulnerabilities
- Review - Module 12

Module 13 - Web Based Password Cracking Techniques
- Authentication
- What is a Password Craker
- Countermeasures
- Tool Example - Obiwan
- Using Wordlists
- Tool Example - SnadBoy
- Using IE to View Passwords
- Review - Module 13

Module 14 - SQL Injection
- SQL Injection Techniques
- SQL Injection Automated Tools
- Countermeasures
- Example - SQL Injection
- Example - SQL Injection Techniques
- Example - SQL Scanner
- Review - Module 14

Module 15 - Hacking Wireless Networks
- Introduction to wireless Networking
- Wired Equivalent Privacy
- Scanning Tools
- Sniffing Tools
- Securing Wireless Networks
- Tool Example - AiroPeek
- Review - Module 15

Module 16 - Virus
- Virus History
- Virus Classification
- Virus Construction and Detection
- Example - Virus Tools
- Example - Create a Virus
- Example - Virus Construction Kit
- Exercise - Virus Construction Kit
- Review - Module 16

Module 17 - Physical Security
- Security Statistics & Incidents
- Physical Security Checklist
- Locks
- Review - Module 17

Module 18 - Linux Hacking
- Why Linux?
- Scanning in Linux
- Hacking Tools
- Rootkits
- Linux Intrusion Detection System (LIDS)
- Linux Tools
- Example - Whois
- Example - Root Access
- Example - Compile in Linux
- Tool - Ethereal
- Tool - IP Sorcery
- Tool - NMap
- Tool - Snort
- Review - Module 18

Module 19 - Evading IDS, Firewalls and Detecting Honey Pots
- Intrusion Detection Tools
- IDS Evasion
- Firewalls
- HoneyPot
- Example - ICMP Shell
- Example - www Reverse Shell
- Review - Module 19

Module 20 - Buffer Overflows
- Reasons for Attacks
- NOPS
- Defense Against Buffer Overflows
- Example - Buffer Overflow
- Review - Module 20

Module 21 - Cryptography
- PKIs
- RSA Attacks and Algorithms
- Code Breaking Methodologies
- Review - Module 21

Module 22 - Penetration Testing
- Vulnerability Assessment
- Term of Engagement
- Filtering Devices
- Impact of Threat
- Phases of Penetration Testing
- Review - Module 22


For more information, you can visit our website at : http://www.ilmuhacker.com

Best regards,

ilmuhacker.com


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Algorithm Geeks" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/algogeeks
-~----------~----~----~----~------~----~------~--~---

Reply via email to