Course Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security
Module 1
- Ethical Hacking and Penetration Testing
- Security 101
- Hacking Hall of Fame
- What are Today's hackers Like?
- Today's Hackers
- Risk Management
- Evolution of Threats
- Typical Vulnerability Life Cycle
- What is Ethical Hacking?
- Rise of the Ethical Hacker
- Types of Security Test
- Penetration Test (Pen-test)
- Red Teams
- Testing Methodology
- VMWare Workstation
- Windows and Linux Running VMWare
- Linux Is a Must
- Linux Survival Skills
- Useful vi Editor Commands
- Module 1 Review
Module 2
- Footprinting and Reconnaissance
- Desired Information
- Find Information by the Target (Edgar)
- terraserver.microsoft.com
- Network Reconnaissance & DNS Search
- Query Whois Databases
- Command-Line Whois Searches
- ARIN whois: Search IP Address Blocks
- SamSpade Tool and Website
- Internet Presence
- Look Through Source Code
- Mirror Website
- Find Specific Types of Systems
- Big Brother
- AltaVista
- Specific Data Being Available?
- Anonymizers
- Countermeasures to Information Leakage
- Social Engineering
- DNS Zone Transfer
- Nslookup command-line utility
- Zone Transfer from Linux
- Automated Zone Transfers
- Zone Transfer Countermeasures
- www.CheckDNS.net
- Tracing Out a Network Path
- tracert Output
- Free Tools
- Paratrace
- War Dialing for Hanging Modems
- Manual and Automated War Dialing
- Case Study
- Guide Dogs for the Blind: Pairing blind people with Guide Dogs since 1942
- Footprinting Countermeasures
- Demo - Footprinting & Info Gathering
- Module 2 Review
Module 3
- TCP/IP Basics and Scanning
- The OSI Model
- TCP/IP Protocol Suite Layers
- Encapsulation
- Data-Link Protocols
- IP - Internet Protocol, Datagram (Packet)
- ICMP Packets
- UDP – User Datagram Protocol
- UDP Datagram
- TCP – Transmission Control Protocol
- TCP Segment
- TCP/IP 3-Way Handshake and Flags
- TCP and UDP Ports
- Ping Sweeps
- Good Old Ping, Nmap, TCP Ping Sweep
- TCP Sweep Traffic Captured
- Unix Pinging Utilities
- Default TTLs
- Pinging Countermeasures
- Port Scanning
- Nmap
- Advanced Probing Techniques
- Scanrand
- Port Probing Countermeasures
- Watch Your Own Ports
- Demo - Scanning Tools
- Module 3 Review
Module 4
- Enumeration and Verification
- Operating System Identification
- Differences Between OS TCP/IP Stack
- Nmap -O
- Active vs Passive Fingerprinting
- Xprobe/Xprobe2
- Countermeasures
- SNMP Overview
- SNMP Enumeration
- SMTP, Finger, and E-mail Aliases
- Gleaning Information from SMTP
- SMTP E-mail Alias Enumeration
- SMTP Enumeration Countermeasures
- CIFS/SMB
- Attack Methodology
- Find Domains and Computers
- NetBIOS Data
- NBTscan
- NULL Session
- Local and Domain Users
- Find Shares with net view
- enum: the All-in-one
- Winfo and NTInfoScan (ntis.exe)
- Digging in the Registry
- NetBIOS Attack Summary
- NetBIOS Countermeasures
- What’s this SID Thing Anyway?
- Common SIDs and RIDs
- whoami
- RestrictAnonymous
- USER2SID/SID2USER
- psgetsid.exe and UserDump Tool
- LDAP and Active Directory
- GUI Tools to Perform the Same Actions
- Demo - Enumeration
- Module 4 Review
Module 5
- Hacking & Defending Wireless/Modems
- Phone Numbers & Modem Background
- Phone Reconnaissance
- Modem Attacks
- Wireless Reconnaissance
- Wireless Background
- Wireless Reconnaissance Continued
- Wireless Sniffing
- Cracking WEP Keys
- Defending Wireless
- Module 5 Review
Module 6
- Hacking & Defending Web Servers
- Web Servers in General: HTTP
- Uniform Resource Locator: URL
- Apache Web Server Functionality
- Apache: Attacking Mis-configurations
- Apache: Attacking Known Vulnerabilities
- Defending Apache Web Server
- Microsoft Internet Information Server (IIS)
- IIS: Security Features
- IIS: Attacking General Problems
- IIS: IUSER or IWAM Level Access
- IIS: Administrator or Sys Level Access
- IIS: Clearing IIS Logs
- IIS: Defending and Countermeasures
- Web Server Vulnerability Scanners
- Demo - Hacking Web Servers
- Module 6 Review
Module 7
- Hacking & Defending Web Applications
- Background on Web Threat & Design
- Basic Infrastructure Information
- Information Leaks on Web Pages
- Hacking over SSL
- Use the Source, Luke…
- Functional/Logic Testing
- Attacking Authentication
- Attacking Authorization
- Debug Proxies: @stake webproxy
- Input Validation Attacks
- Attacking Session State
- Attacking Web Clients
- Cross-Site Scripting (XSS) Threats
- Defending Web Applications
- Module 7 Review
Module 8
- Sniffers and Session Hijacking
- Sniffers
- Why Are Sniffers so Dangerous?
- Collision & Broadcast Domains
- VLANs and Layer-3 Segmentation
- tcpdump & WinDump
- Berkley Packet Filter (BPF)
- Libpcap & WinPcap
- BUTTSniffing Tool and dSniff
- Ethereal
- Mitigation of Sniffer Attacks
- Antisniff
- ARP Poisoning
- MAC Flooding
- DNS and IP Spoofing
- Session Hijacking
- Sequence Numbers
- Hunt
- Ettercap
- Source Routing
- Hijack Countermeasures
- Demo - Sniffers
- Module 8 Review
Module 9
- Hacking & Defending Windows Systems
- Physical Attacks
- LANMan Hashes and Weaknesses
- WinNT Hash and Weaknesses
- Look for Guest, Temp, Joe Accounts
- Direct Password Attacks
- Before You Crack: Enum Tool
- Finding More Account Information
- Cracking Passwords
- Grabbing the SAM
- Crack the Obtained SAM
- LSA Secrets and Trusts
- Using the Newly Guessed Password
- Bruteforcing Other Services
- Operating System Attacks
- Hiding Tracks: Clearing Logs
- Hardening Windows Systems
- Strong 3-Factor Authentication
- Creating Strong Passwords
- Authentication
- Windows Account Lockouts
- Auditing Passwords
- File Permissions
- Demo - Attacking Windows Systems
- Module 9 Review
Module 10
- Hacking & Defending Unix Systems
- Physical Attacks on Linux
- Password Cracking
- Brute Force Password Attacks
- Stack Operation
- Race Condition Errors
- Format String Errors
- File System Attacks
- Hiding Tracks
- Single User Countermeasure
- Strong Authentication
- Single Sign-On Technologies
- Account Lockouts
- Shadow Password Files
- Buffer Overflow Countermeasures
- LPRng Countermeasures
- Tight File Permissions
- Hiding Tracks Countermeasures
- Removing Unnecessary Applications
- DoS Countermeasures
- Hardening Scripts
- Using SSH & VPNs to Prevent Sniffing
- Demo - Attacking Unix Systems
- Module 10 Review
Module 11
- Rootkits, Backdoors, Trojans & Tunnels
- Types Of Rootkits
- A Look at LRK
- Examples of Trojaned Files
- Windows NT Rootkits
- NT Rootkit
- AFX Windows Rootkit 2003
- Rootkit Prevention Unix
- Rootkit Prevention Windows
- netcat
- netcat: Useful Unix Commands
- netcat: What it Looks Like
- VNC-Virtual Network Computing
- Backdoor Defenses
- Trojans
- Back Orifice 2000
- NetBus
- SubSeven
- Defenses to Trojans
- Tunneling
- Loki
- Other Tunnels
- Q-2.4 by Mixter
- Starting Up Malicious Code
- Defenses Against Tunnels
- Manually Deleting Logs
- Tools to Modify Logs
- Demo - Trojans
- Module 11 Review
Module 12
- Denial of Service and Botnets
- Denial-of-Service Attacks
- CPUHog
- Ping of Death
- Teardrop Attacks
- Jolt2
- Smurf Attacks
- SYN Attacks
- UDP Floods
- Distributed DoS
- DDoS Tool: Trin00
- Other DDoS Variation
- History of Botnets
- Anatomy of a Botnet
- Some Common Bots
- Demo - Denial of Service
- Module 12 Review
Module 13
- Automated Pen Testing Tools
- General: Definitions
- General:What?
- General: Why?
- Core Impact™ Framework
- Core Impact™ Operation
- Canvas™ Framework
- Canvas™ Operation
- Metasploit Framework
- Metasploit Operation
- Demo - Automated Pen Testing
- Module 13 Review
Module 14
- Intrusion Detection Systems
- Types of IDSs
- Network IDSs
- Distributed IDSs (DIDSs)
- Anomaly Detection
- Signature Detection
- Common IDS Software Products
- Introduction to Snort
- Attacking an IDS
- Eluding Techniques
- Testing an IDS
- Hacking Tool - NIDSbench
- Hacking Tool - Fragroute
- Hacking Tool - SideStep
- Hacking Tool - ADMmutate
- Other IDS Evasion Tools
- Demo - IDS and Snort
- Module 14 Review
Module 15
- Firewalls
- Firewall Types
- Application Layer Gateways
- ALGs (Proxies)
- Stateful Inspection Engine
- Hybrid Firewall
- Host-Based Firewall
- Network-Based Firewall
- DMZ (Demilitarized Zone)
- Back-to-Back Firewalls
- Bastion Hosts
- Control Traffic Flow
- Multiple DMZs
- Controlling Traffic Flow
- Why Do I Need a Firewall?
- What Should I Filter?
- Egress Filtering
- Network Address Translation (NAT)
- Firewall Vulnerabilities
- IPTables/NetFilter
- Default Tables and Chains
- iptables Syntax 1
- iptables Syntax 2
- Sample IPTables Script 1
- Sample IPTables Script 2
- Persistent Firewalls
- Firewall Identification
- Firewalk
- Tunneling with Loki
- Tunneling with NetCat/CryptCat
- Port Redirection with Fpipe
- Denial-of-Service Attacks Risk?
- Demo - Firewalls and IP Tables
- Module 15 Review
Module 16
- Honeypots and Honeynets
- What Is a Honeypot?
- Advantages and Disadvantages
- Types and Categories of Honeypots
- Honeypot: Tarpits
- Honeypot: Kfsensor
- Honeypot: Honeyd
- Sample Honeyd Configuration
- High-Interaction Honeypot
- Project HoneyNet
- Types of Honeynets
- The Main Difference is Data Control
- GEN II Data Control: Honeywall CD
- Gen II Data Capture: Sebek & Sebek II
- Automated Alerting
- Testing
- Legal Issues
- Demo - Setting up a Honeypot
- Module 16 Review
Module 17
- Ethics and Legal Issues
- The Costs
- Relation to Ethical Hacking?
- The Dual Nature of Tools
- Good Instead of Evil?
- Recognizing Trouble When It Happens
- Emulating the Attack
- Security Does Not Like Complexity
- Proper and Ethical Disclosure
- CERT’s Current Process
- Full Disclosure Policy
- Organization for Internet Safety (OIS)
- What Should We Do from Here?
- Legal Meets Information Systems
- Addressing Individual Laws
- 18 USC SECTION 1029
- 18 USC SECTION 1030
- 1030: Worms and Viruses
- Blaster Worm Attacks
- Civil vs. Criminal
- 18 USC SECTIONS 2510 and 2701
- Digital Millennium Copyright Act
- Cyber Security Enhancement Act
- Module 17 Review
- Course Closure
- Enjoy M8's
CD1.Ethical.Hacking.and.Penetration
CD2 Footprinting and Reconnaissance
CD3 TCP/IP Basics and Scanning
Code:
http://rapidshare.com/files/24321107/mod.3.part1.rar
Code:
http://rapidshare.com/files/24321109/mod.3.part2.rar
Code:
http://rapidshare.com/files/24339724/mod.3.part3.rar
CD4 Enumeration and Verification
Code:
http://rapidshare.com/files/25291513/module.4.part1.rar
Code:
http://rapidshare.com/files/25291516/module.4.part2.rar
Code:
http://rapidshare.com/files/25297786/module.4.part3.rar
Code:
http://rapidshare.com/files/25297787/module.4.part4.rar
CD5 Hacking & Defending Wireless/Modems
Code:
http://rapidshare.com/files/24480780/module_5.part1.rar
Code:
http://rapidshare.com/files/24480781/module_5.part2.rar
Code:
http://rapidshare.com/files/24480784/module_5.part3.rar
Code:
http://rapidshare.com/files/24480785/module_5.part4.rar
Code:
http://rapidshare.com/files/24480786/module_5.part5.rar
Code:
http://rapidshare.com/files/24480787/module_5.part6.rar
CD6 Hacking & Defending Web Servers
Code:
http://rapidshare.com/files/28925031/Module.6.Hacking.Defending.Web.Servs.part01.rar
Code:
http://rapidshare.com/files/28925032/Module.6.Hacking.Defending.Web.Servs.part02.rar
Code:
http://rapidshare.com/files/28925034/Module.6.Hacking.Defending.Web.Servs.part03.rar
Code:
http://rapidshare.com/files/28925035/Module.6.Hacking.Defending.Web.Servs.part04.rar
Code:
http://rapidshare.com/files/28931012/Module.6.Hacking.Defending.Web.Servs.part05.rar
Code:
http://rapidshare.com/files/28931013/Module.6.Hacking.Defending.Web.Servs.part06.rar
CD7.Hacking.Defending.Web.Applications
Code:
http://rapidshare.com/files/26188740/Module.7.part1.rar
Code:
http://rapidshare.com/files/26188742/Module.7.part2.rar
Code:
http://rapidshare.com/files/26196529/Module.7.part3.rar
CD8. .Sniffers.and.Session.Hijacking
Code:
http://rapidshare.com/files/26196533/Module.8.part1.rar
Code:
http://rapidshare.com/files/26360406/Module.8.part2.rar
Code:
http://rapidshare.com/files/26360407/Module.8.part3.rar
CD9.Hacking.Defending.Windows.Systems
Code:
http://rapidshare.com/files/26370153/Module.9.part1.rar
Code:
http://rapidshare.com/files/26376136/Module.9.part2.rar
Code:
http://rapidshare.com/files/26370156/Module.9.part3.rar
CD10.Hacking.Defending.Unix.Systems
Code:
http://rapidshare.com/files/28216732/Module_10.part01.rar
Code:
http://rapidshare.com/files/28216733/Module_10.part02.rar
Code:
http://rapidshare.com/files/28216734/Module_10.part03.rar
Code:
http://rapidshare.com/files/28216735/Module_10.part04.rar
Code:
http://rapidshare.com/files/28216737/Module_10.part05.rar
Code:
http://rapidshare.com/files/28216740/Module_10.part06.rar
Code:
http://rapidshare.com/files/28222043/Module_10.part07.rar
Code:
http://rapidshare.com/files/28222044/Module_10.part08.rar
Code:
http://rapidshare.com/files/28222045/Module_10.part09.rar
Code:
http://rapidshare.com/files/28222046/Module_10.part10.rar
CD .11.Rootkits.Backdoors.Trojans.Tunnels
Code:
http://rapidshare.com/files/28236225/Module_11.part01.rar
Code:
http://rapidshare.com/files/28236226/Module_11.part02.rar
Code:
http://rapidshare.com/files/28236228/Module_11.part03.rar
Code:
http://rapidshare.com/files/28236229/Module_11.part04.rar
Code:
http://rapidshare.com/files/28236231/Module_11.part05.rar
Code:
http://rapidshare.com/files/28236233/Module_11.part06.rar
Code:
http://rapidshare.com/files/28238956/Module_11.part07.rar
Code:
http://rapidshare.com/files/28238959/Module_11.part08.rar
CD.12.Denial.of.Service.and.Botnets
Code:
http://rapidshare.com/files/28250428/Module_12.part1.rar
Code:
http://rapidshare.com/files/28250430/Module_12.part2.rar
Code:
http://rapidshare.com/files/28250431/Module_12.part3.rar
Code:
http://rapidshare.com/files/28250432/Module_12.part4.rar
Code:
http://rapidshare.com/files/28250433/Module_12.part5.rar
Code:
http://rapidshare.com/files/28250434/Module_12.part6.rar
Code:
http://rapidshare.com/files/28250435/Module_12.part7.rar
CD.13..Automated.Pen.Testing.Tools
Code:
http://rapidshare.com/files/28259605/Module.13.part01.rar
Code:
http://rapidshare.com/files/28259607/Module.13.part02.rar
Code:
http://rapidshare.com/files/28259608/Module.13.part03.rar
Code:
http://rapidshare.com/files/28259610/Module.13.part04.rar
Code:
http://rapidshare.com/files/28259612/Module.13.part05.rar
Code:
http://rapidshare.com/files/28259613/Module.13.part06.rar
Code:
http://rapidshare.com/files/28259614/Module.13.part07.rar
CD.14.Intrusion.Detection.Systems
Code:
http://rapidshare.com/files/28268932/Module_14.part01.rar
Code:
http://rapidshare.com/files/28268933/Module_14.part02.rar
Code:
http://rapidshare.com/files/28268935/Module_14.part03.rar
Code:
http://rapidshare.com/files/28268936/Module_14.part04.rar
Code:
http://rapidshare.com/files/28268937/Module_14.part05.rar
Code:
http://rapidshare.com/files/28268938/Module_14.part06.rar
Code:
http://rapidshare.com/files/28275713/Module_14.part07.rar
Code:
http://rapidshare.com/files/28275714/Module_14.part08.rar
Code:
http://rapidshare.com/files/28275715/Module_14.part09.rar
Code:
http://rapidshare.com/files/28275716/Module_14.part10.rar
CD .15.Firewalls
Code:
http://rapidshare.com/files/28283458/Module_15.part01.rar
Code:
http://rapidshare.com/files/28283459/Module_15.part02.rar
Code:
http://rapidshare.com/files/28283460/Module_15.part03.rar
Code:
http://rapidshare.com/files/28283461/Module_15.part04.rar
Code:
http://rapidshare.com/files/28283464/Module_15.part05.rar
Code:
http://rapidshare.com/files/28283465/Module_15.part06.rar
Code:
http://rapidshare.com/files/28338024/Module_15.part07.rar
Code:
http://rapidshare.com/files/28338028/Module_15.part08.rar
Code:
http://rapidshare.com/files/28338029/Module_15.part09.rar
Code:
http://rapidshare.com/files/28338030/Module_15.part10.rar
Code:
http://rapidshare.com/files/28338032/Module_15.part11.rar
CD. 16.Honeypots.and.Honeynets
Code:
http://rapidshare.com/files/28345006/Module_16.part01.rar
Code:
http://rapidshare.com/files/28345007/Module_16.part02.rar
Code:
http://rapidshare.com/files/28345008/Module_16.part03.rar
Code:
http://rapidshare.com/files/28345009/Module_16.part04.rar
Code:
http://rapidshare.com/files/28345010/Module_16.part05.rar
Code:
http://rapidshare.com/files/28345011/Module_16.part06.rar
Code:
http://rapidshare.com/files/28354433/Module_16.part07.rar
Code:
http://rapidshare.com/files/28354435/Module_16.part08.rar
CD. 17 .Ethics.and.Legal.Issues
Code:
http://rapidshare.com/files/28354436/Module_17.part1.rar
Code:
http://rapidshare.com/files/28354437/Module_17.part2.rar
Code:
http://rapidshare.com/files/28354438/Module_17.part3.rar
Code:
http://rapidshare.com/files/28354439/Module_17.part4.rar
Code:
http://rapidshare.com/files/28357536/Module_17.part5.rar
Code:
http://rapidshare.com/files/28357537/Module_17.part6.rar