Module 1 - Introduction to ethical hacking - What does a malicious hacker do? - Hacker classes - Vulnerability research - Ethical hacking testing - Security websites - Review - Module 1
Module 2 - Footprinting - Reconnaissance phase and footprinting - Scenario (cont.) - Tools - Sam Spade - Tools - NeoTrace - Tools - The waybackmachine - Tools - Smart whois - Tools - Read notify - Exercise - NeoTrace - Review - Module 2 Module 3 - Scanning - Checking for live systems - Banner Grabbing - Scenario (cont.) - Tools - Angry IP - Tools - NMap - Tools - NetScanToolsPro - Banner Grabbing - NetCraft - OS Detection Tool - SocksChain - Review - Module 3 Module 4 - Enumeration - What is Enumeration - SNMP Enumeration - Example - Connect Using Null Session - Tools - DumpSEC - SID - GetAcct Tool - SolarWinds - Tools - UserInfo - Tools - UserIP - Review - Module 4 Module 5 - System Hacking - Cracking Passwords - Escalating Privileges - Executing Applications - Hiding Files - Covering Tracks - Tool - Legion - Tool - Keylogger - Proof of concept - Tool - LophtCrack Password Cracking Tool - Tool - pwdump Password Cracking Tool - Tool - GetAdmin Tool - Tool - Create Local Admin User X - Tool - Stealth Files - Tool - Spam Mimic - Hide Messages Using Normal Text - Tool - Snow - Steganography - Exercise - Legion - Review - Module 5 Module 6 - Trojans and Backdoors - Indications of a Trojan Attack - ICMP Tunneling - Trojan Horse Construction Kit - Anti-Trojan Software - Example - Tini Trojan - Example - NetBus Trojan - Example - Beast Trojan - Example - YAB - Wrapper - Tool - fPort - Tool - TCPView - Exercise - YAB - Wrapper - Review - Module 6 Module 7 - Sniffers - Types of Sniffing - Sniffer Hacking Tools - Raw Sniffing Tools - Countermeasures - Tool - Ethereal - Tool - SMAC - Tool - DSniff - Tool - WebSpy - Tool - Etherpeek - Review - Module 7 Module 8 - Denial of Service - What are Denial of Service Attacks - DOS Attack Tools - DDOS Attacks - Reflected DOS Attacks - Example - Ping of Death - Example - Freak88 - Exercise - Freak88 - Review - Module 8 Module 9 - Social Engineering - Review - Module 9 Module 10 - Session Hijacking - Programs That Perform Session Hijacking - Demo - Hijacking a Telnet Session - Review - Module 10 Module 11 - Hacking Web Servers - Server Vulnerabilities - Vulnerability Scanners - Example - RPC Hack - Example - Metasploit Framework - Example - Internet Printing Exploit - Example - LSA Exploit - Example - Unicode - Example - Shadow Security Scanner - Exercise - Shadow Security Scanner - Review - Module 11 Module 12 - Web Application Vulnerabilities - Web Application Setup & Hacking - Web Application Threats - Web Application Hacking Tools - Tool Example - Blackwidow - Tool Example - Google - Tool Example - IE Cache Extractor - Tool Example - Generate Unicode Strings - IE Vulnerabilities - Review - Module 12 Module 13 - Web Based Password Cracking Techniques - Authentication - What is a Password Craker - Countermeasures - Tool Example - Obiwan - Using Wordlists - Tool Example - SnadBoy - Using IE to View Passwords - Review - Module 13 Module 14 - SQL Injection - SQL Injection Techniques - SQL Injection Automated Tools - Countermeasures - Example - SQL Injection - Example - SQL Injection Techniques - Example - SQL Scanner - Review - Module 14 Module 15 - Hacking Wireless Networks - Introduction to wireless Networking - Wired Equivalent Privacy - Scanning Tools - Sniffing Tools - Securing Wireless Networks - Tool Example - AiroPeek - Review - Module 15 Module 16 - Virus - Virus History - Virus Classification - Virus Construction and Detection - Example - Virus Tools - Example - Create a Virus - Example - Virus Construction Kit - Exercise - Virus Construction Kit - Review - Module 16 Module 17 - Physical Security - Security Statistics & Incidents - Physical Security Checklist - Locks - Review - Module 17 Module 18 - Linux Hacking - Why Linux? - Scanning in Linux - Hacking Tools - Rootkits - Linux Intrusion Detection System (LIDS) - Linux Tools - Example - Whois - Example - Root Access - Example - Compile in Linux - Tool - Ethereal - Tool - IP Sorcery - Tool - NMap - Tool - Snort - Review - Module 18 Module 19 - Evading IDS, Firewalls and Detecting Honey Pots - Intrusion Detection Tools - IDS Evasion - Firewalls - HoneyPot - Example - ICMP Shell - Example - www Reverse Shell - Review - Module 19 Module 20 - Buffer Overflows - Reasons for Attacks - NOPS - Defense Against Buffer Overflows - Example - Buffer Overflow - Review - Module 20 Module 21 - Cryptography - PKIs - RSA Attacks and Algorithms - Code Breaking Methodologies - Review - Module 21 Module 22 - Penetration Testing - Vulnerability Assessment - Term of Engagement - Filtering Devices - Impact of Threat - Phases of Penetration Testing - Review - Module 22 For more information, you can visit our website at : http://www.ilmuhacker.com Best regards, ilmuhacker.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Algorithm Geeks" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/algogeeks -~----------~----~----~----~------~----~------~--~---
