Ethical Hacking

Only available on StudyMode
  • Download(s): 98
  • Published: February 2, 2013
Open Document
Text Preview
Lesson 1: Introduction to Ethical Hacking|
Problem Definition -Why Security?
Essential Terminologies
Elements of Security
The Security, Functionality and Ease of se Triangle
Case Study
What does a Malicious Hacker do?
Types of Hacker Attacks
Hacktivism
Hacker Classes
Security News - Suicide Hacker
Ethical Hacker Classes
What do Ethical Hackers do?
Can Hacking be Ethical
How to become an Ethical Hacker
Skill Profile of an Ethical Hacker
What is Vulnerability Research?
How to Conduct Ethical Hacking
How Do They Go About It?
Approaches to Ethical Hacking
Ethical Hacking Testing
Ethical Hacking Deliverables
Computer Crimes and Implications|
Lesson 2: Hacking Laws|
www.usdoj.gov
www.gob.mx
www.jf.gov.br
canada.justice.gc.ca
www.opsi.gov.uk
europa.eu
Belgium Laws
Denmark Laws
France Laws
German Laws
Greece Laws
Italian Laws
Netherlands Laws
Norway
The Cybercrime Act 2001
The Information Technology Act
Japan’s Cyber Laws
Singapore’s Cyber Laws
Act on Promotion of Information and Communications Network Utilization and Information Protection The Computer Crimes Act 1997
www.legislation.gov.hk
Telecommunication Law|
Lesson 3: Footprinting|
visiting Reconnaissance
Defining Footprinting
Why is Footprinting Necessary
Areas and Information which Attackers Seek
Information Gathering Methodology
Footprinting Tools
E-Mail Spiders
Steps to Create Fake Login Pages
How to Create Fake Login Pages
Websites using Man-in-the-Middle Phishing Kit
Benefits to Fraudster
Steps to Perform Footprinting|
Lesson 4: Google Hacking|
What is Google hacking
What a hacker can do with vulnerable site
Anonymity with Caches
Using Google as a Proxy Server
Directory Listings
Going Out on a Limb - Traversal Techniques
Extension Walking
Site Operator
Locating Public Exploit Sites
Locating Vulnerable Targets
Web Server Software Error Messages
Application Software Error Messages
Default Pages
Searching for Passwords
Google Hacking Database (GHDB)
SiteDigger Tool
Gooscan
Goolink Scanner
Goolag Scanner
Tool - Google Hacks
Google Hack Honeypot
Google Protocol
Google Cartography|
Lesson 5: Scanning|
Scanning: Definition
Types of Scanning
Objectives of Scanning
CEH Scanning Methodology
War Dialer Technique
Banner Grabbing
Vulnerability Scanning
Draw Network Diagrams of Vulnerable Hosts
Preparing Proxies
Scanning Countermeasures
Tool: SentryPC|
Lesson 6: Enumeration|
Overview of System Hacking Cycle
What is Enumeration?
Techniques for Enumeration
NetBIOS Null Sessions
PS Tools
Network Management Protocol (SNMP) Enumeration
LDAP enumeration
NTP enumeration
SMTP enumeration
Web enumeration
Winfingerprint
How To Enumerate Web Application Directories in IIS Using DirectoryServices IP Tools Scanner
Enumerate Systems Using Default Password
Tools
Steps to Perform Enumeration|
Lesson 7: System Hacking|
Part 1- Cracking Password
Part 2- Escalating Privileges
Part 3 - Executing applications
Part 4 - Hiding files
Part 5 - Covering Tracks|
Lesson 8: Trojans and Backdoors|
Effect on Business
What is a Trojan?
Indications of a Trojan Attack
Ports Used by Trojans
Trojans
Classic Trojans Found in the Wild
Hacking Tool: Loki
Atelier Web Remote Commander
Trojan Horse Construction Kit
How to Detect Trojans?
Anti-Trojan Software
Evading Anti-Virus Techniques
Sample Code for Trojan Client/Server
Evading Anti-Trojan/Anti-Virus using Stealth Tools
Backdoor Countermeasures
Tripwire
System File Verification
MD5 Checksum.exe
Microsoft Windows Defender
How to Avoid a Trojan Infection|
Lesson 9: Viruses and Worms|
Virus History
Characteristics of Virus
Working of Virus
Why people create Computer Viruses
Symptoms of a Virus-like Attack
Virus Hoaxes
Chain Letters
How is a Worm Different from a Virus...
tracking img