Ethical Hacking
Module 1:
Hacking Fundamentals
Professional Penetration Testing
The Mind of a Hacker
Security Fundamentals
Professional Penetration Testing
The Mind of a Hacker
Security Fundamentals
Module 2:
Reconnaissance
Business Intelligence
Network Intelligence
Search Engine Hacking
FOCA
Introduction to OSINT *NEW February 2013
DNS Reconnaissance *NEW February 2013
Scanning *UPDATED February 2013
Nmap Scan Options and NSE Introduction *NEW February 2013
SMTP Enumeration *NEW February 2013
SNMP Enumeration *NEW February 2013
Banner Grabbing *NEW February 2013
Business Intelligence
Network Intelligence
Search Engine Hacking
FOCA
Introduction to OSINT *NEW February 2013
DNS Reconnaissance *NEW February 2013
Scanning *UPDATED February 2013
Nmap Scan Options and NSE Introduction *NEW February 2013
SMTP Enumeration *NEW February 2013
SNMP Enumeration *NEW February 2013
Banner Grabbing *NEW February 2013
Module 3:
Network Penetration Testing
Networking Basics
Network Orientation
Network Scanning
Sniffing
Denial of Service
Using Nessus
Passive OS Fingerprinting
ARP Attacks and Intro to EtterCap
Network Protocols: In-depth Look at ICMP, TCP, and UDP
Messaging Security – Attacking from the Network
Network Analysis: Wireshark
Attacking the Network: Owning through Connectivity
Networking Basics
Network Orientation
Network Scanning
Sniffing
Denial of Service
Using Nessus
Passive OS Fingerprinting
ARP Attacks and Intro to EtterCap
Network Protocols: In-depth Look at ICMP, TCP, and UDP
Messaging Security – Attacking from the Network
Network Analysis: Wireshark
Attacking the Network: Owning through Connectivity
Module 4:
Server Penetration Testing
Protocols and Basics
Exploitation of Buffer Overflows
Introduction to Metasploit *UPDATED February 2013
Brute Force: Hydra and Medusa
Messaging Security – Attacking the Server
Finding and Using Exploitation Information *NEW February 2013
Password Cracking and John the Ripper *NEW February 2013
Protocols and Basics
Exploitation of Buffer Overflows
Introduction to Metasploit *UPDATED February 2013
Brute Force: Hydra and Medusa
Messaging Security – Attacking the Server
Finding and Using Exploitation Information *NEW February 2013
Password Cracking and John the Ripper *NEW February 2013
Module 5:
Client Penetration Testing
Client and User Attacks
Social Engineer Toolkit *UPDATED February 2013
Social Engineering Basics
Messaging Security – Attacking the Client
Client and User Attacks
Social Engineer Toolkit *UPDATED February 2013
Social Engineering Basics
Messaging Security – Attacking the Client
Module 6:
Web Application Penetration Testing
Web Application Hacking Basics
XSS
CSRF
SQL Injection
Browser Exploitation Framework
ClickJacking: Yet Another Confused Deputy Problem
Attacking the Application – Session Manipulation and Fixation
File Inclusion
Web Application Hacking Basics
XSS
CSRF
SQL Injection
Browser Exploitation Framework
ClickJacking: Yet Another Confused Deputy Problem
Attacking the Application – Session Manipulation and Fixation
File Inclusion
Module 7:
The Structure of a Penetration Test
The Basic Structure
PTAR 1: Introduction to Penetration Testing *NEW January 2013
PTAR 2: The Structure of a Penetration Test *NEW January 2013
PTAR 3: Project Management *NEW January 2013
PTAR 4: Vulnerability Scanning *NEW February 2013
PTAR 5: Writing a Report *NEW February 2013
PTAR 6: Organizing a Report *NEW February 2013
PTAR 7: Technical Findings *NEW February 2013
PTAR 8: Risk Assessment *NEW February 2013
PTAR 9: The Narrative of the Report *NEW February 2013
PTAR 10: The Executive Summary *NEW February 2013
Dradis Methodology *NEW February 2013
Dradis Findings Documentation *NEW February 2013
The Basic Structure
PTAR 1: Introduction to Penetration Testing *NEW January 2013
PTAR 2: The Structure of a Penetration Test *NEW January 2013
PTAR 3: Project Management *NEW January 2013
PTAR 4: Vulnerability Scanning *NEW February 2013
PTAR 5: Writing a Report *NEW February 2013
PTAR 6: Organizing a Report *NEW February 2013
PTAR 7: Technical Findings *NEW February 2013
PTAR 8: Risk Assessment *NEW February 2013
PTAR 9: The Narrative of the Report *NEW February 2013
PTAR 10: The Executive Summary *NEW February 2013
Dradis Methodology *NEW February 2013
Dradis Findings Documentation *NEW February 2013
Module 8:
Programming & Reverse Engineering
Basics of Coding in Ruby
Coding Meterpreter Scripts with Ruby
Introduction to Reverse Engineering
Low Level Software Introduction
The Reversing Process Introduction
The Legality of Reversing
Number Systems Counting and Conversion
Bitwise Logic Operations and Bit Shifting
Registers
PE File Format
Packers and Unpackers
Understanding Compiled Programs
Linkers and Loaders
Approaches to Reverse Engineering
How Debuggers Work
Intro to OllyDbg
Basics of Coding in Ruby
Coding Meterpreter Scripts with Ruby
Introduction to Reverse Engineering
Low Level Software Introduction
The Reversing Process Introduction
The Legality of Reversing
Number Systems Counting and Conversion
Bitwise Logic Operations and Bit Shifting
Registers
PE File Format
Packers and Unpackers
Understanding Compiled Programs
Linkers and Loaders
Approaches to Reverse Engineering
How Debuggers Work
Intro to OllyDbg
Module 9:
Digital Forensics
Digital Forensics Introduction
Web Browser History
Windows Cache Forensics
Disk Overview
Filesystems – FAT
Filesystems – NTFS
Filesystems – Ext
Filesystems – HFS+
The Sleuthkit Part I
The Sleuthkit Part II
The Cutting Edge
Cross-site Flash Attacks
Introduction to PDF Attacks
Cloud Computing
PDF Reconnaissance and Data Disclosure Attacks
Metasploit Advanced Topics: Using the db_ commands
Introduction to the PDF Launch Action
Metasploit Advanced Topics: Post-exploit with Meterpreter – Recon and Getting “Stuff”
Metasploit Advanced Topics: Post-exploit with Meterpreter – Evasion and Connecting
Experimenting with the PDF Launch Action
PDF Exploitation via Metasploit
Introduction to Armitage
Evilgrade: Client Exploitation One Update at a Time
Sqlninja: Attacking Microsoft SQL Servers
Discombobulating a SOC: Syslog Spoofing
ProxyChains: The Ultimate Proxifier!
Armitage: A Power Users Interface for Metasploit
Team Operations: Collaborate with Armitage and Metasploit
Cobalt Strike Introduction UPDATED February 2013
Cobalt Strike Social Engineering
Digital Forensics Introduction
Web Browser History
Windows Cache Forensics
Disk Overview
Filesystems – FAT
Filesystems – NTFS
Filesystems – Ext
Filesystems – HFS+
The Sleuthkit Part I
The Sleuthkit Part II
The Cutting Edge
Cross-site Flash Attacks
Introduction to PDF Attacks
Cloud Computing
PDF Reconnaissance and Data Disclosure Attacks
Metasploit Advanced Topics: Using the db_ commands
Introduction to the PDF Launch Action
Metasploit Advanced Topics: Post-exploit with Meterpreter – Recon and Getting “Stuff”
Metasploit Advanced Topics: Post-exploit with Meterpreter – Evasion and Connecting
Experimenting with the PDF Launch Action
PDF Exploitation via Metasploit
Introduction to Armitage
Evilgrade: Client Exploitation One Update at a Time
Sqlninja: Attacking Microsoft SQL Servers
Discombobulating a SOC: Syslog Spoofing
ProxyChains: The Ultimate Proxifier!
Armitage: A Power Users Interface for Metasploit
Team Operations: Collaborate with Armitage and Metasploit
Cobalt Strike Introduction UPDATED February 2013
Cobalt Strike Social Engineering
0 comments:
Post a Comment