Curso: Ethical Hacking and Countermeasures

Similar documents
AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Ethical Hacking and Prevention

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Certified Ethical Hacker (CEH)

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Course 831 Certified Ethical Hacker v9

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Certified Secure Web Application Engineer

CETPA INFOTECH PVT. LTD. Curriculum of CYBER SECURITY DURATION: 6 MONTHS

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

CSWAE Certified Secure Web Application Engineer

Advanced Diploma on Information Security

CEH: CERTIFIED ETHICAL HACKER v9

Certified Professional Ethical Hacker

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

"Charting the Course... Certified Professional Ethical Hacker. Course Summary

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Audience. Pre-Requisites

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CPTE: Certified Penetration Testing Engineer

Practice Labs Ethical Hacker

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

CS System Security 2nd-Half Semester Review

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

GCIH. GIAC Certified Incident Handler.

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Certified Professional Ethical Hacker

CPEH Certified Professional Ethical Hacker

Penetration Testing with Kali Linux

Ethical Hacking. Content Outline: Session 1

Web Application Penetration Testing

Chapter 4. Network Security. Part I

EC-Council C EH. Certified Ethical Hacker. Program Brochure

POST GRADUATE DIPLOMA IN CYBER SECURITY (PGDCS)

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

RiskSense Attack Surface Validation for Web Applications

Certified Vulnerability Assessor

CEH Tools. Sniffers. - Wireshark: The most popular packet sniffer with cross platform support.

Corso: Certified Ethical Hacker Codice PCSNET: ECCC-1 Cod. Vendor: CEH Durata: 5

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

DIS10.1 Ethical Hacking and Countermeasures

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Cybersecurity Foundations

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Endpoint Security - what-if analysis 1

Access Controls. CISSP Guide to Security Essentials Chapter 2

Basics of executing a penetration test

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Solutions Business Manager Web Application Security Assessment

CompTIA Security+ (Exam SY0-401)

ECCouncil Certified Ethical Hacker. Download Full Version :

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

What action do you want to perform by issuing the above command?

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Penetration Testing following OWASP. Boyan Yanchev Chief Technology Ofcer Peter Dimkov IS Consultant

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Web Application Security. Philippe Bogaerts

Network Security. Thierry Sans

Copyright

3. Which of the following is a weakness in a system, application, network or process? A. Threat B. Exploit C. Vulnerability D.

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

دوره تست نفوذ. Ver.1.2 شما میتوانید آنلاین در این دوره ثبت نام بلافاصله از آن استفاده کنید. Information Gathering. Bash scripting

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Security+ SY0-501 Study Guide Table of Contents

Certified Ethical Hacker

ECCouncil Exam v8 Certified Ethical Hacker v8 Exam Version: 7.0 [ Total Questions: 357 ]

Ethical Hacker Foundation and Security Analysts Course Semester 2

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

CERTIFIED ETHICAL HACKER V.6 TRAINING (DVD-ROM, SINGLE USER)

DIS10.1:Ethical Hacking and Countermeasures

Security and Authentication

Certified Penetration Testing Engineer

Certified Penetration Testing Engineer

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Chapter 1 Introduction

ANATOMY OF AN ATTACK!

Chapter 11: Networks

Principles of ICT Systems and Data Security

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Hackveda Training - Ethical Hacking, Networking & Security

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Contents in Detail. Foreword by Peter Van Eeckhoutte

Hacking Our Way to Better Security: Lessons from a Web Application Penetration Test. Tyler Rasmussen Mercer Engineer Research Center

Application Security Approach

C)PTE Certified Penetration Testing Engineer

Transcription:

Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security Authenticity and Non-Repudiation The Security, Functionality, and Usability Triangle What Does a Hacker Do? Phase 1 Reconnaissance o Reconnaissance Types Phase 2 Scanning Phase 3 Gaining Access Phase 4 Maintaining Access Phase 5 Covering Tracks Types of Attacks on a System o Operating System Attacks o Application-Level Attacks o Shrink Wrap Code Attacks o Misconfiguration Attacks Why Ethical Hacking is Necessary? Defense in Depth Scope and Limitations of Ethical Hacking What Do Ethical Hackers Do? Skills of an Ethical Hacker Vulnerability Research Vulnerability Research Websites What is Penetration Testing? Why Penetration Testing? Penetration Testing Methodology Module 2: Footprinting and Reconnaissance Footprinting Terminologies What is Footprinting? Objectives of Footprinting Footprinting Threats Finding a Company s URL Locate Internal URLs Public and Restricted Websites Search for Company s Information o Tools to Extract Company s Data Footprinting Through Search Engines Collect Location Information People Search o People Search Using http://pipl.com o People Search Online Services o People Search on Social Networking Services Gather Information from Financial Services Footprinting Through Job Sites Monitoring Target Using Alerts Página 1 de 9

Competitive Intelligence Gathering WHOIS Lookup Extracting DNS Information DNS Interrogation Tools DNS Interrogation Online Tools Locate the Network Range Traceroute Mirroring Entire Website Extract Website Information from http://www.archive.org Tracking Email Communications Footprint Using Google Hacking Techniques What a Hacker Can Do With Google Hacking? Google Advance Search Operators Finding Resources using Google Advance Operator Google Hacking Tool: Google Hacking Database (GHDB) Google Hacking Tools Additional Footprinting Tools Footprinting Countermeasures Footprinting Pen Testing Module 3: Scanning Networks Network Scanning Types of Scanning Checking for Live Systems ICMP Scanning Ping Sweep Three-Way Handshake TCP Communication Flags Hping Commands Scanning Techniques Scanning Tools Scanning Countermeasures OS Fingerprinting Banner Grabbing Tools Hiding File Extensions Vulnerability Scanning Network Vulnerability Scanners Network Mappers Proxy Servers Why Attackers Use Proxy Servers? Use of Proxies for Attack Free Proxy Servers TOR (The Onion Routing) TOR Proxy Chaining Software HTTP Tunneling Techniques Why do I Need HTTP Tunneling? Additional HTTP Tunneling Tools SSH Tunneling Proxy Tools Types of Anonymizers Anonymizer Tools Spoofing IP Address IP Spoofing Countermeasures Scanning Pen Testing Página 2 de 9

Module 4: Enumeration What is Enumeration? Techniques for Enumeration Netbios Enumeration Enumerating User Accounts Enumerate Systems Using Default Passwords SNMP (Simple Network Management Protocol) Enumeration UNIX/Linux Enumeration LDAP Enumeration SMTP Enumeration DNS Zone Transfer Enumeration Using nslookup Enumeration Countermeasures Enumeration Pen Testing Module 5: System Hacking Information at Hand Before System Hacking Stage System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking o Password Complexity o Password Cracking Techniques o Types of Password Attacks Passive Online Attacks: Wire Sniffing Password Sniffing Passive Online Attack: Man-in-the-Middle and Replay Attack Active Online Attack: Password Guessing Active Online Attack: Trojan/Spyware/Keylogger Active Online Attack: Hash Injection Attack o Rainbow Attacks: Pre-Computed Hash o Distributed Network Attack o Non-Electronic Attacks o Manual Password Cracking (Guessing) o Automatic Password Cracking Algorithm o Stealing Passwords Using USB Drive Microsoft Authentication How Hash Passwords are Stored in Windows SAM? What is LAN Manager Hash? Kerberos Authentication Salting Password Cracking Tools How to Defend against Password Cracking? Privilege Escalation Privilege Escalation Tools How to Defend against Privilege Escalation? Executing Applications Keylogger Types of Keystroke Loggers Keyloggers Spyware o What Does the Spyware Do? o Types of Spywares How to Defend against Keyloggers? o Anti-Keylogger o Anti-Keyloggers Página 3 de 9

How to Defend against Spyware? Rootkits Types of Rootkits How Rootkit Works? Detecting Rootkits o Steps for Detecting Rootkits How to Defend against Rootkits? What is Steganography? Types of Steganography Image Steganography Steganography Detection Tools System Hacking Penetration Testing Module 6: Trojans & Backdoors What is a Trojan? Purpose of Trojans Indications of a Trojan Attack Common Ports used by Trojans How to Infect Systems Using a Trojan? Wrappers Different Ways a Trojan can Get into a System How to Deploy a Trojan? Evading Anti-Virus Techniques Types of Trojans Destructive Trojans Notification Trojans Credit Card Trojans Data Hiding Trojans (Encrypted Trojans) How to Detect Trojans? Process Monitoring Tool: What s Running o Process Monitoring Tools Scanning for Suspicious Windows Services Scanning for Suspicious Startup Programs Scanning for Suspicious Files and Folders Scanning for Suspicious Network Activities Trojan Countermeasures Backdoor Countermeasures Pen Testing for Trojans and Backdoors Module 7: Viruses & Worms Introduction to Viruses Stages of Virus Life Working of Viruses: Infection Phase Working of Viruses: Attack Phase Indications of Virus Attack Virus Hoaxes Virus Analysis: Types of Viruses Transient and Terminate and Stay Resident Viruses Writing a Simple Virus Program Computer Worms How is a Worm Different from a Virus? Página 4 de 9

Example of Worm Infection: Conficker Worm Worm Analysis: Malware Analysis Procedure Online Malware Testing: VirusTotal Online Malware Analysis Services Virus Detection Methods Virus and Worms Countermeasures Anti-virus Tools Penetration Testing for Virus Module 8: Sniffers Sniffing Threats How a Sniffer Works? Hacker Attacking a Switch Types of Sniffing Protocols Vulnerable to Sniffing Hardware Protocol Analyzers SPAN Port MAC Flooding MAC Spoofing/Duplicating DNS Poisoning Techniques Sniffing Tools Discovery Tools Additional Sniffing Tools How an Attacker Hacks the Network Using Sniffers? How to Defend Against Sniffing? Module 9: Denial of Service What is a Denial of Service Attack? What is Distributed Denial of Service Attacks? Symptoms of a DoS Attack Cyber Criminals DoS Attack Techniques Botnet DoS Attack Tools Detection Techniques DoS/DDoS Countermeasure Strategies Post-attack Forensics Techniques to Defend against Botnets DoS/DDoS Countermeasures DoS/DDoS Protection at ISP Level DoS/DDoS Protection Tool Denial of Service (DoS) Attack Penetration Testing Module 10: Session Hijacking What is Session Hijacking? Why Session Hijacking is Successful? Key Session Hijacking Techniques Brute Forcing Spoofing vs. Hijacking Session Hijacking Process Página 5 de 9

Packet Analysis of a Local Session Hijack Types of Session Hijacking Predictable Session Token Man-in-the-Middle Attack Client-side Attacks Cross-site Script Attack Session Fixation Network Level Session Hijacking The 3-Way Handshake TCP/IP Hijacking Man-in-the-Middle Attack using Packet Sniffer Session Hijacking Tools o Paros o Burp Suite o Firesheep Countermeasures Protecting against Session Hijacking Session Hijacking Remediation Session Hijacking Pen Testing Module 11: Hijacking Webservers Website Defacement Why Web Servers are Compromised? Impact of Webserver Attacks Webserver Misconfiguration Directory Traversal Attacks HTTP Response Splitting Attack Web Cache Poisoning Attack HTTP Response Hijacking SSH Bruteforce Attack Man-in-the-Middle Attack Webserver Password Cracking Web Application Attacks Webserver Attack Methodology o Information Gathering o Webserver Footprinting Webserver Footprinting Tools o Mirroring a Website o Vulnerability Scanning o Session Hijacking o Hacking Web Passwords Webserver Attack Tools Web Password Cracking Tool Countermeasures How to Defend Against Web Server Attacks? Patches and Hotfixes What is Patch Management? Webserver Security Tools Web Server Penetration Testing Página 6 de 9

Module 12: Hijacking Web Applications How Web Applications Work? Web 2.0 Applications Vulnerability Stack Web Attack Vectors Web Application Threats Unvalidated Input Parameter/Form Tampering Directory Traversal Security Misconfiguration Injection Flaws o SQL Injection Attacks o Command Injection Attacks o Command Injection Example o File Injection Attack Cross-Site Scripting (XSS) Attacks o How XSS Attacks Work? o Cross-Site Scripting Attack Scenario: Attack via Email o XSS Example: Attack via Email o XSS Example: Stealing Users' Cookies o XSS Example: Sending an Unauthorized Request o XSS Attack in Blog Posting o XSS Attack in Comment Field o XSS Cheat Sheet o Cross-Site Request Forgery (CSRF) Attack o How CSRF Attacks Work? Buffer Overflow Attacks Cookie/Session Poisoning Session Fixation Attack Improper Error Handling Insecure Cryptographic Storage Broken Authentication and Session Management Unvalidated Redirects and Forwards Footprint Web Infrastructure Web Spidering Using Burp Suite Hacking Web Servers Analyze Web Applications Attack Authentication Mechanism Username Enumeration Password Attacks: Password Functionality Exploits Password Attacks: Password Guessing Password Attacks: Brute-forcing Session Attacks: Session ID Prediction/ Brute-forcing Cookie Exploitation: Cookie Poisoning Authorization Attack Session Management Attack Attack Web App Client Web Application Hacking Tools Web Application Countermeasures Web Application Pen Testing Página 7 de 9

Module 13: SQL Injections What is SQL Injection? SQL Injection Attacks Server Side Technologies HTTP Post Request SQL Injection Detection SQL Injection Black Box Pen Testing Types of SQL Injection What is Blind SQL Injection? SQL Injection Methodology Transfer Database to Attacker s Machine Interacting with the Operating System Interacting with the FileSystem How to Defend Against SQL Injection Attacks? Module 14: Hacking Wireless Networks Wireless Networks Types of Wireless Encryption WEP Encryption How WPA Works? Temporal Keys How WPA2 Works? WEP vs. WPA vs. WPA2 WEP Issues Wireless Threats: Access Control Attacks Wireless Threats: Integrity Attacks Wireless Threats: Confidentiality Attacks Wireless Threats: Availability Attacks Wireless Threats: Authentication Attacks Rogue Access Point Attack Wireless Hacking Methodology Find Wi-Fi Networks to Attack Attackers Scanning for Wi-Fi Networks Footprint the Wireless Network Wireless Sniffers Aircrack-ng Suite Man-in-the-Middle Attack WEP Cracking Using Cain & Abel WPA Brute Forcing Using Cain & Abel Wireless Security Layers How to Defend Against Wireless Attacks? Wireless Intrusion Prevention Systems Wi-Fi Vulnerability Scanning Tools Wireless Penetration Testing Página 8 de 9

Module 15: Buffer Overflow Buffer Overflows Why are Programs And Applications Vulnerable? Understanding Stacks Stack-Based Buffer Overflow Understanding Heap o Heap-Based Buffer Overflow Stack Operations o Shellcode Knowledge Required to Program Buffer Overflow Exploits Buffer Overflow Steps Simple Uncontrolled Overflow Simple Buffer Overflow in C Identifying Buffer Overflows How to Detect Buffer Overflows in a Program? Buffer Overflow Penetration Testing Module 16: Penetration Testing Introduction to Penetration Testing Security Assessments Vulnerability Assessment Penetration Testing Why Penetration Testing? What Should be Tested? What Makes a Good Penetration Test? Types of Penetration Testing o External Penetration Testing o Internal Security Assessment o Black-box Penetration Testing o Grey-box Penetration Testing o White-box Penetration Testing o Announced / Unannounced Testing o Automated Testing o Manual Testing Common Penetration Testing Techniques Using DNS Domain Name and IP Address Information Enumerating Information about Hosts on Publicly-Available Networks Phases of Penetration Testing Penetration Testing Methodology Outsourcing Penetration Testing Services Evaluating Different Types of Pentest Tools Application Security Assessment Tools Página 9 de 9