Editor Picks

Welcome to ABHIJEET VISHEN's Blogger Register YourSelf For Ethical Hacking Classes To Be an Expert & Win Prizes"    Register Your Self to Learn Ethical Hacking,Hardware & Networking,HTML,DOT NET,PHP

Thursday 7 March 2013

Ethical Hacking Modules



Ethical Hacking

Module 1: 

Hacking Fundamentals
Professional Penetration Testing
The Mind of a Hacker
Security Fundamentals


Module 2: 

Reconnaissance
Business Intelligence
Network Intelligence
Search Engine Hacking
FOCA
Introduction to OSINT *NEW February 2013
DNS Reconnaissance *NEW February 2013
Scanning *UPDATED February 2013
Nmap Scan Options and NSE Introduction *NEW February 2013
SMTP Enumeration *NEW February 2013
SNMP Enumeration *NEW February 2013
Banner Grabbing *NEW February 2013


Module 3: 

Network Penetration Testing
Networking Basics
Network Orientation
Network Scanning
Sniffing
Denial of Service
Using Nessus
Passive OS Fingerprinting
ARP Attacks and Intro to EtterCap
Network Protocols: In-depth Look at ICMP, TCP, and UDP
Messaging Security – Attacking from the Network
Network Analysis: Wireshark
Attacking the Network: Owning through Connectivity


Module 4: 

Server Penetration Testing
Protocols and Basics
Exploitation of Buffer Overflows
Introduction to Metasploit *UPDATED February 2013
Brute Force: Hydra and Medusa
Messaging Security – Attacking the Server
Finding and Using Exploitation Information *NEW February 2013
Password Cracking and John the Ripper *NEW February 2013


Module 5:

 Client Penetration Testing
Client and User Attacks
Social Engineer Toolkit *UPDATED February 2013
Social Engineering Basics
Messaging Security – Attacking the Client

Module 6: 

Web Application Penetration Testing
Web Application Hacking Basics
XSS
CSRF
SQL Injection
Browser Exploitation Framework
ClickJacking: Yet Another Confused Deputy Problem
Attacking the Application – Session Manipulation and Fixation
File Inclusion


Module 7: 

The Structure of a Penetration Test
The Basic Structure
PTAR 1: Introduction to Penetration Testing *NEW January 2013
PTAR 2: The Structure of a Penetration Test *NEW January 2013
PTAR 3: Project Management *NEW January 2013
PTAR 4: Vulnerability Scanning *NEW February 2013
PTAR 5: Writing a Report *NEW February 2013
PTAR 6: Organizing a Report *NEW February 2013
PTAR 7: Technical Findings *NEW February 2013
PTAR 8: Risk Assessment *NEW February 2013
PTAR 9: The Narrative of the Report *NEW February 2013
PTAR 10: The Executive Summary *NEW February 2013
Dradis Methodology *NEW February 2013
Dradis Findings Documentation *NEW February 2013

Module 8: 

Programming & Reverse Engineering
Basics of Coding in Ruby
Coding Meterpreter Scripts with Ruby
Introduction to Reverse Engineering
Low Level Software Introduction
The Reversing Process Introduction
The Legality of Reversing
Number Systems Counting and Conversion
Bitwise Logic Operations and Bit Shifting
Registers
PE File Format
Packers and Unpackers
Understanding Compiled Programs
Linkers and Loaders
Approaches to Reverse Engineering
How Debuggers Work
Intro to OllyDbg

Module 9: 

Digital Forensics
Digital Forensics Introduction
Web Browser History
Windows Cache Forensics
Disk Overview
Filesystems – FAT
Filesystems – NTFS
Filesystems – Ext
Filesystems – HFS+
The Sleuthkit Part I
The Sleuthkit Part II

The Cutting Edge
Cross-site Flash Attacks
Introduction to PDF Attacks
Cloud Computing
PDF Reconnaissance and Data Disclosure Attacks
Metasploit Advanced Topics: Using the db_ commands
Introduction to the PDF Launch Action
Metasploit Advanced Topics: Post-exploit with Meterpreter – Recon and Getting “Stuff”
Metasploit Advanced Topics: Post-exploit with Meterpreter – Evasion and Connecting
Experimenting with the PDF Launch Action
PDF Exploitation via Metasploit
Introduction to Armitage
Evilgrade: Client Exploitation One Update at a Time
Sqlninja: Attacking Microsoft SQL Servers
Discombobulating a SOC: Syslog Spoofing
ProxyChains: The Ultimate Proxifier!
Armitage: A Power Users Interface for Metasploit
Team Operations: Collaborate with Armitage and Metasploit
Cobalt Strike Introduction UPDATED February 2013
Cobalt Strike Social Engineering

0 comments:

Post a Comment