Tutorials and Online Training Videos

Ethical Hacking & Penetration Testing Tutorial


Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.

Introduction

Course Overview

Ethical Hacking & Penetration Testing

What is Ethical Hacking?
Types of Ethical Hacking
Responsibilities of the Ethical Hacker
Customer Expectations
Skills of the Hacker
Relevant Laws
Preparation
Types of Attacks

Methodology Overview

Your Goals
Reconnaissance [passive, active]
Scanning
Service Enumeration
Vulnerability Assessment
Vulnerability Exploitation
Penetration & Access
Privilege Escalation & Owning the Box
Evading Defenses & Erasing Tracks
Maintaining & Expanding Access

Reconnaissance (Footprinting)

Passive Reconnaissance
Using WHOIS & Other Tools
Active Reconnaissance
Active Reconnaissance Tools & Methods
Putting It All Together
Reconnaissance Demo

Scanning

Scanning For Hosts
TCP Connection Basics
TCP Scan Types
UDP & ICMP Scanning
Scanning Demonstration using NMAP

Port & Service Enumeration

Identifying Ports & Services
OS Fingerprinting
Popular Scanners
Demonstration

Data Enumeration

Data Enumeration
SNMP Enumeration
DNS Zone Transfers
Windows Null Sessions
NetBIOS Enumeration
Active Directory Extraction

Vulnerability Assessment

Vulnerabilities & Exploits
OS Vulnerabilities
Web Server Vulnerabilities
Database Vulnerabilities
TCP Stack Vulnerabilities
Application Vulnerabilities
Vulnerability Assesment

Penetration/Access/Compromise Pt.1

Penetrating the System Pt.1
Penetrating the System Pt.2
Bypassing Access Controls
Password Cracking Pt.1
Password Cracking Pt.2
Social Engineering

Penetration/Access/Compromise Pt.2

Session Hijacking Pt.1
Session Hijacking Pt.2
Privilege Escalation
Maintaining & Expanding Access
System Compromise

Evading Defenses & Erasing Tracks

Where Your Actions Recorded Pt.1
Where Your Actions Recorded Pt.2
Deleting Log Files & Other Evidence Pt.1
Deleting Log Files & Other Evidence Pt.2
Rootkits
Steganography
Evading IDS & Firewalls

Introduction to Hacking Techniques Pt.1

Encryption
Sniffers
Wireless hacking
SQL Injection

Introduction to Hacking Techniques Pt.2

Buffer Overflows
Rootkits
Spoofing
Denial of Service Attacks
Web Hacking

Popular Tools

nmap Pt.1
nmap Pt.2
SuperScan
Nessus

Penetration Test Demo

Penetration Test Demo Pt.1
Penetration Test Demo Pt.2
Penetration Test Demo Pt.3

Credits

About the Authors


Related Books on Ethical Hacking & Penetration Testing







Save $80 on the
DROID BIONIC
by Motorola with Verizon Wireless service for less than from Verizon Wireless directly.
Save $80 on DROID BIONIC
More Cell Phone Discounts