TBKResources career academy - hacking penetration testing and countermeasures training

seeders: 0
leechers: 1
Added on June 3, 2008 by in Other > Unsorted
Torrent verified.



TBKResources career academy - hacking penetration testing and countermeasures training (Size: 2.78 GB)
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 01 - Ethical...272.3 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 02 -...236.16 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 03 - TCP IP...177.42 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 04 -...237.2 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 05 - Defending...101.83 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 06 - Hacking...202.48 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 07 - Hacking...134.17 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 08 - Sniffers...148.6 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 09 - Hacking...164.04 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 10 - Hacking...178.67 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 11 - Rootkits...144.52 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 12 - Denial Of...114.46 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 13 - Automated...133.48 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 14 - Intrusion...166.41 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 15 -...185.22 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 16 - Honeypots...142.18 MB
 Career Academy - Hacking Penetration Testing and Countermeasures Training - Module 17 - Ethics...102.53 MB
 career academy - hacking penetration testing and countermeasures training.nfo10.76 KB


Description

These training videos will show you how to scan, test, hack and secure your



own systems. The intensive demonstrations give each student in-depth knowledge



and practical experience with the current security systems. You will begin by



understanding how perimeter defenses work and then be lead into scanning and



attacking your own networks. You will then learn how intruders escalate



privileges and what steps can be taken to secure a system. Students will also



learn about Penetration Testing and Countermeasures, Intrusion Detection,



Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus



Creation.







Module 01 - Ethical Hacking and Penetration Testing



---------------------------------------------------



Security 101



Hacking Hall of Fame



What are Today's hackers Like?



Today's Hackers



Risk Management



Evolution of Threats



Typical Vulnerability Life Cycle



What is Ethical Hacking?



Rise of the Ethical Hacker



Types of Security Test



Penetration Test (Pen-test)



Red Teams



Testing Methodology



VMWare Workstation



Windows and Linux Running VMWare



Linux Is a Must



Linux Survival Skills



Useful vi Editor Commands



Module 1 Review







Module 02 - Footprinting and Reconnaissance



-------------------------------------------



Desired Information



Find Information by the Target (Edgar)



terraserver.microsoft.com



Network Reconnaissance & DNS Search



Query Whois Databases



Command-Line Whois Searches



ARIN whois: Search IP Address Blocks



SamSpade Tool and Website



Internet Presence



Look Through Source Code



Mirror Website



Find Specific Types of Systems



Big Brother



AltaVista



Specific Data Being Available?



Anonymizers



Countermeasures to Information Leakage



Social Engineering



DNS Zone Transfer



Nslookup command-line utility



Zone Transfer from Linux



Automated Zone Transfers



Zone Transfer Countermeasures



www.CheckDNS.net



Tracing Out a Network Path



tracert Output



Free Tools



Paratrace



War Dialing for Hanging Modems



Manual and Automated War Dialing



Case Study



www.guidedogs.com



Footprinting Countermeasures



Demo - Footprinting & Info Gathering



Module 2 Review







Module 03 - TCP/IP Basics and Scanning



--------------------------------------



The OSI Model



TCP/IP Protocol Suite Layers



Encapsulation



Data-Link Protocols



IP - Internet Protocol, Datagram (Packet)



ICMP Packets



UDP – User Datagram Protocol



UDP Datagram



TCP – Transmission Control Protocol



TCP Segment



TCP/IP 3-Way Handshake and Flags



TCP and UDP Ports



Ping Sweeps



Good Old Ping, Nmap, TCP Ping Sweep



TCP Sweep Traffic Captured



Unix Pinging Utilities



Default TTLs



Pinging Countermeasures



Port Scanning



Nmap



Advanced Probing Techniques



Scanrand



Port Probing Countermeasures



Watch Your Own Ports



Demo - Scanning Tools



Module 3 Review







Module 04 - Enumeration and Verification



----------------------------------------



Operating System Identification



Differences Between OS TCP/IP Stack



Nmap -O



Active vs Passive Fingerprinting



Xprobe/Xprobe2



Countermeasures



SNMP Overview



SNMP Enumeration



SMTP, Finger, and E-mail Aliases



Gleaning Information from SMTP



SMTP E-mail Alias Enumeration



SMTP Enumeration Countermeasures



CIFS/SMB



Attack Methodology



Find Domains and Computers



NetBIOS Data



NBTscan



NULL Session



Local and Domain Users



Find Shares with net view



enum: the All-in-one



Winfo and NTInfoScan (ntis.exe)



Digging in the Registry



NetBIOS Attack Summary



NetBIOS Countermeasures



What’s this SID Thing Anyway?



Common SIDs and RIDs



whoami



RestrictAnonymous



USER2SID/SID2USER



psgetsid.exe and UserDump Tool



LDAP and Active Directory



GUI Tools to Perform the Same Actions



Demo - Enumeration



Module 4 Review







Module 05 - Hacking & Defending Wireless/Modems



-----------------------------------------------



Phone Numbers & Modem Background



Phone Reconnaissance



Modem Attacks



Wireless Reconnaissance



Wireless Background



Wireless Reconnaissance Continued



Wireless Sniffing



Cracking WEP Keys



Defending Wireless



Module 5 Review







Module 06 - Hacking & Defending Web Servers



-------------------------------------------



Web Servers in General: HTTP



Uniform Resource Locator: URL



Apache Web Server Functionality



Apache: Attacking Mis-configurations



Apache: Attacking Known Vulnerabilities



Defending Apache Web Server



Microsoft Internet Information Server (IIS)



IIS: Security Features



IIS: Attacking General Problems



IIS: IUSER or IWAM Level Access



IIS: Administrator or Sys Level Access



IIS: Clearing IIS Logs



IIS: Defending and Countermeasures



Web Server Vulnerability Scanners



Demo - Hacking Web Servers



Module 6 Review







Module 07 - Hacking & Defending Web Applications



------------------------------------------------



Background on Web Threat & Design



Basic Infrastructure Information



Information Leaks on Web Pages



Hacking over SSL



Use the Source, Luke…



Functional/Logic Testing



Attacking Authentication



Attacking Authorization



Debug Proxies: @stake webproxy



Input Validation Attacks



Attacking Session State



Attacking Web Clients



Cross-Site Scripting (XSS) Threats



Defending Web Applications



Module 7 Review







Module 08 - Sniffers and Session Hijacking



------------------------------------------



Sniffers



Why Are Sniffers so Dangerous?



Collision & Broadcast Domains



VLANs and Layer-3 Segmentation



tcpdump & WinDump



Berkley Packet Filter (BPF)



Libpcap & WinPcap



BUTTSniffing Tool and dSniff



Ethereal



Mitigation of Sniffer Attacks



Antisniff



ARP Poisoning



MAC Flooding



DNS and IP Spoofing



Session Hijacking



Sequence Numbers



Hunt



Ettercap



Source Routing



Hijack Countermeasures



Demo - Sniffers



Module 8 Review







Module 09 - Hacking & Defending Windows Systems



-----------------------------------------------



Physical Attacks



LANMan Hashes and Weaknesses



WinNT Hash and Weaknesses



Look for Guest, Temp, Joe Accounts



Direct Password Attacks



Before You Crack: Enum Tool



Finding More Account Information



Cracking Passwords



Grabbing the SAM



Crack the Obtained SAM



LSA Secrets and Trusts



Using the Newly Guessed Password



Bruteforcing Other Services



Operating System Attacks



Hiding Tracks: Clearing Logs



Hardening Windows Systems



Strong 3-Factor Authentication



Creating Strong Passwords



Authentication



Windows Account Lockouts



Auditing Passwords



File Permissions



Demo - Attacking Windows Systems



Module 9 Review











Module 10 - Hacking & Defending Unix Systems



--------------------------------------------



Physical Attacks on Linux



Password Cracking



Brute Force Password Attacks



Stack Operation



Race Condition Errors



Format String Errors



File System Attacks



Hiding Tracks



Single User Countermeasure



Strong Authentication



Single Sign-On Technologies



Account Lockouts



Shadow Password Files



Buffer Overflow Countermeasures



LPRng Countermeasures



Tight File Permissions



Hiding Tracks Countermeasures



Removing Unnecessary Applications



DoS Countermeasures



Hardening Scripts



Using SSH & VPNs to Prevent Sniffing



Demo - Attacking Unix Systems



Module 10 Review







Module 11 - Rootkits, Backdoors, Trojans & Tunnels



--------------------------------------------------



Types Of Rootkits



A Look at LRK



Examples of Trojaned Files



Windows NT Rootkits



NT Rootkit



AFX Windows Rootkit 2003



Rootkit Prevention Unix



Rootkit Prevention Windows



netcat



netcat: Useful Unix Commands



netcat: What it Looks Like



VNC-Virtual Network Computing



Backdoor Defenses



Trojans



Back Orifice 2000



NetBus



SubSeven



Defenses to Trojans



Tunneling



Loki



Other Tunnels



Q-2.4 by Mixter



Starting Up Malicious Code



Defenses Against Tunnels



Manually Deleting Logs



Tools to Modify Logs



Demo - Trojans



Module 11 Review







Module 12 - Denial Of Service And Botnets



-----------------------------------------



Denial-of-Service Attacks



CPUHog



Ping of Death



Teardrop Attacks



Jolt2



Smurf Attacks



SYN Attacks



UDP Floods



Distributed DoS



DDoS Tool: Trin00



Other DDoS Variation



History of Botnets



Anatomy of a Botnet



Some Common Bots



Demo - Denial of Service



Module 12 Review







Module 13 - Automated Pen Testing Tools



---------------------------------------



General: Definitions



General:What?



General: Why?



Core Impact™ Framework



Core Impact™ Operation



Canvas™ Framework



Canvas™ Operation



Metasploit Framework



Metasploit Operation



Demo - Automated Pen Testing



Module 13 Review







Module 14 - Intrusion Detection Systems



---------------------------------------



Types of IDSs



Network IDSs



Distributed IDSs (DIDSs)



Anomaly Detection



Signature Detection



Common IDS Software Products



Introduction to Snort



Attacking an IDS



Eluding Techniques



Testing an IDS



Hacking Tool - NIDSbench



Hacking Tool - Fragroute



Hacking Tool - SideStep



Hacking Tool - ADMmutate



Other IDS Evasion Tools



Demo - IDS and Snort



Module 14 Review







Module 15 - Firewalls



---------------------



Firewall Types



Application Layer Gateways



ALGs (Proxies)



Stateful Inspection Engine



Hybrid Firewall



Host-Based Firewall



Network-Based Firewall



DMZ (Demilitarized Zone)



Back-to-Back Firewalls



Bastion Hosts



Control Traffic Flow



Multiple DMZs



Controlling Traffic Flow



Why Do I Need a Firewall?



What Should I Filter?



Egress Filtering



Network Address Translation (NAT)



Firewall Vulnerabilities



IPTables/NetFilter



Default Tables and Chains



iptables Syntax 1



iptables Syntax 2



Sample IPTables Script 1



Sample IPTables Script 2



Persistent Firewalls



Firewall Identification



Firewalk



Tunneling with Loki



Tunneling with NetCat/CryptCat



Port Redirection with Fpipe



Denial-of-Service Attacks Risk?



Demo - Firewalls and IP Tables



Module 15 Review







Module 16 - Honeypots and Honeynets



-----------------------------------



What Is a Honeypot?



Advantages and Disadvantages



Types and Categories of Honeypots



Honeypot: Tarpits



Honeypot: Kfsensor



Honeypot: Honeyd



Sample Honeyd Configuration



High-Interaction Honeypot



Project HoneyNet



Types of Honeynets



The Main Difference is Data Control



GEN II Data Control: Honeywall CD



Gen II Data Capture: Sebek & Sebek II



Automated alerting



Testing



Legal Issues



Demo - Setting up a Honeypot



Module 16 Review







Module 17 - Ethics and Legal Issues



-----------------------------------



The Costs



Relation to Ethical Hacking?



The Dual Nature of Tools



Good Instead of Evil?



Recognizing Trouble When It Happens



Emulating the Attack



Security Does Not Like Complexity



Proper and Ethical Disclosure



CERT’s Current Process



Full Disclosure Policy



Organization for

Sharing Widget


Download torrent
2.78 GB
seeders:0
leechers:1
TBKResources career academy - hacking penetration testing and countermeasures training