With rising security threats and increasing demand for information security professional around the globe, it is important to get deep understanding of different penetration techniques and tools. This expert course can benefit the administrators seeking career shift to information security domain and can also help the professionals already in the information security domain by gaining further knowledge in the field. Below are few benefits:
- Learn penetration testing methodology
- Ensure system/network security
- Identify the vulnerable systems and mitigate them
- Assess your network from a hackers perspective
- Apply countermeasures to protect an organization from security breaches
Mandatory Pre-requisites
- Familiarity with both Windows and Linux operating systems
- Understanding of TCP/IP
Helpful Pre-requisites
- Knowledge of Networking Protocols
- Information Security Goals
- Five Principles to Remember
- TCP/IP Stack Review
- Network Security Basics
- What are Vulnerabilities?
- Understanding the Risks Posed by Vulnerabilities
- Introduction
- Footprinting
- Scanning
- Enumeration
- Discovering Vulnerabilities
- Importance of seeking out Vulnerabilities
- Introduction
- Why is Footprinting Necessary?
- WHOIS & DNS Enumeration
- DNS Interrogation
- Network Reconnaissance
- Whois lookup, Wikto
- Online Tools – Samspade, What is MyIP
- DNS Enumerator – nslookup
- Traceroute – Neo Trace, VisualRoute
- Tracing Emails – VisualRoute Mail Tracer, eMailTracker Pro
- Google Searching with Advanced Operators
- Directory Listings
- Locating Directory Listings
- Finding Specific Directories
- Finding Specific Files
- Server Versioning
- Directory Traversal
- Extension Walking
- Network Mapping
- Locating Vulnerable Targets
- Searching for Usernames, Password & Secrets
- Google Hacking Database (GHDB)
- Tools- Site Digger, Google Hacks
- Determining if the System is Alive
- Determining which Services are Running or Listening
- Scan Types
- Identifying TCP and UDP Services Running
- Windows-Based Port Scanners
- Port Scanning Breakdown
- Daemon Banner Grabbing
- Firewall Detection
- Detecting the Operating System
- Active Stack Fingerprinting
- Passive Stack Fingerprinting
- Behind the Proxies
- Proxy Servers
- Anonymizers
- Proxy Chaining- The Onion Routing (TOR)
- Scanning Tools- Superscan, Xprobe, Netcat, TOR, Nmap, GFI Languard, Nessus
- Enumerating Remote Maintenance Services
- FTP
- SSH
- Telnet
- R-Services
- X-Windows
- Remote Desktop
- VNC
- DNS
- Finger
- Auth
- NTP
- SNMP
- LDAP
- rwho
- Fingerprinting Web Servers
- Enumerating Virtual Hosts
- Investigating known Vulnerabilities
- Basic Web Server Crawling
- MS SQL Server
- MySQL
- Oracle
- SMTP
- POP3
- IMAP
- RPC
- NetBIOS
- Tools- Nbtstat, Httprint, Wikto, Brutus, RpcScan
- Sniffing
- Man In The Middle Attack
- Buffer Overflows
- Exploiting Network Services with Metasploit
- Exploiting End User Applications with Metasploit
- Extracting and Cracking Passwords
- Privilege Escalation
- Gaining Access to Remote Control
- Key Loggers
- Spywares
- Trojans and Backdoors
- Hiding and Covering the Tracks
- Tools- Wireshark, Cain and Abel, Hydra, John the Ripper, Metasploit, VNC, Fpipe
No comments:
Post a Comment