TBKResources career academy - hacking penetration testing and countermeasures trainingseeders: 0
leechers: 1
TBKResources career academy - hacking penetration testing and countermeasures training (Size: 2.78 GB)
Description
These training videos will show you how to scan, test, hack and secure your
own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Module 01 - Ethical Hacking and Penetration Testing --------------------------------------------------- Security 101 Hacking Hall of Fame What are Today's hackers Like? Today's Hackers Risk Management Evolution of Threats Typical Vulnerability Life Cycle What is Ethical Hacking? Rise of the Ethical Hacker Types of Security Test Penetration Test (Pen-test) Red Teams Testing Methodology VMWare Workstation Windows and Linux Running VMWare Linux Is a Must Linux Survival Skills Useful vi Editor Commands Module 1 Review Module 02 - Footprinting and Reconnaissance ------------------------------------------- Desired Information Find Information by the Target (Edgar) terraserver.microsoft.com Network Reconnaissance & DNS Search Query Whois Databases Command-Line Whois Searches ARIN whois: Search IP Address Blocks SamSpade Tool and Website Internet Presence Look Through Source Code Mirror Website Find Specific Types of Systems Big Brother AltaVista Specific Data Being Available? Anonymizers Countermeasures to Information Leakage Social Engineering DNS Zone Transfer Nslookup command-line utility Zone Transfer from Linux Automated Zone Transfers Zone Transfer Countermeasures www.CheckDNS.net Tracing Out a Network Path tracert Output Free Tools Paratrace War Dialing for Hanging Modems Manual and Automated War Dialing Case Study www.guidedogs.com Footprinting Countermeasures Demo - Footprinting & Info Gathering Module 2 Review Module 03 - TCP/IP Basics and Scanning -------------------------------------- The OSI Model TCP/IP Protocol Suite Layers Encapsulation Data-Link Protocols IP - Internet Protocol, Datagram (Packet) ICMP Packets UDP – User Datagram Protocol UDP Datagram TCP – Transmission Control Protocol TCP Segment TCP/IP 3-Way Handshake and Flags TCP and UDP Ports Ping Sweeps Good Old Ping, Nmap, TCP Ping Sweep TCP Sweep Traffic Captured Unix Pinging Utilities Default TTLs Pinging Countermeasures Port Scanning Nmap Advanced Probing Techniques Scanrand Port Probing Countermeasures Watch Your Own Ports Demo - Scanning Tools Module 3 Review Module 04 - Enumeration and Verification ---------------------------------------- Operating System Identification Differences Between OS TCP/IP Stack Nmap -O Active vs Passive Fingerprinting Xprobe/Xprobe2 Countermeasures SNMP Overview SNMP Enumeration SMTP, Finger, and E-mail Aliases Gleaning Information from SMTP SMTP E-mail Alias Enumeration SMTP Enumeration Countermeasures CIFS/SMB Attack Methodology Find Domains and Computers NetBIOS Data NBTscan NULL Session Local and Domain Users Find Shares with net view enum: the All-in-one Winfo and NTInfoScan (ntis.exe) Digging in the Registry NetBIOS Attack Summary NetBIOS Countermeasures What’s this SID Thing Anyway? Common SIDs and RIDs whoami RestrictAnonymous USER2SID/SID2USER psgetsid.exe and UserDump Tool LDAP and Active Directory GUI Tools to Perform the Same Actions Demo - Enumeration Module 4 Review Module 05 - Hacking & Defending Wireless/Modems ----------------------------------------------- Phone Numbers & Modem Background Phone Reconnaissance Modem Attacks Wireless Reconnaissance Wireless Background Wireless Reconnaissance Continued Wireless Sniffing Cracking WEP Keys Defending Wireless Module 5 Review Module 06 - Hacking & Defending Web Servers ------------------------------------------- Web Servers in General: HTTP Uniform Resource Locator: URL Apache Web Server Functionality Apache: Attacking Mis-configurations Apache: Attacking Known Vulnerabilities Defending Apache Web Server Microsoft Internet Information Server (IIS) IIS: Security Features IIS: Attacking General Problems IIS: IUSER or IWAM Level Access IIS: Administrator or Sys Level Access IIS: Clearing IIS Logs IIS: Defending and Countermeasures Web Server Vulnerability Scanners Demo - Hacking Web Servers Module 6 Review Module 07 - Hacking & Defending Web Applications ------------------------------------------------ Background on Web Threat & Design Basic Infrastructure Information Information Leaks on Web Pages Hacking over SSL Use the Source, Luke… Functional/Logic Testing Attacking Authentication Attacking Authorization Debug Proxies: @stake webproxy Input Validation Attacks Attacking Session State Attacking Web Clients Cross-Site Scripting (XSS) Threats Defending Web Applications Module 7 Review Module 08 - Sniffers and Session Hijacking ------------------------------------------ Sniffers Why Are Sniffers so Dangerous? Collision & Broadcast Domains VLANs and Layer-3 Segmentation tcpdump & WinDump Berkley Packet Filter (BPF) Libpcap & WinPcap BUTTSniffing Tool and dSniff Ethereal Mitigation of Sniffer Attacks Antisniff ARP Poisoning MAC Flooding DNS and IP Spoofing Session Hijacking Sequence Numbers Hunt Ettercap Source Routing Hijack Countermeasures Demo - Sniffers Module 8 Review Module 09 - Hacking & Defending Windows Systems ----------------------------------------------- Physical Attacks LANMan Hashes and Weaknesses WinNT Hash and Weaknesses Look for Guest, Temp, Joe Accounts Direct Password Attacks Before You Crack: Enum Tool Finding More Account Information Cracking Passwords Grabbing the SAM Crack the Obtained SAM LSA Secrets and Trusts Using the Newly Guessed Password Bruteforcing Other Services Operating System Attacks Hiding Tracks: Clearing Logs Hardening Windows Systems Strong 3-Factor Authentication Creating Strong Passwords Authentication Windows Account Lockouts Auditing Passwords File Permissions Demo - Attacking Windows Systems Module 9 Review Module 10 - Hacking & Defending Unix Systems -------------------------------------------- Physical Attacks on Linux Password Cracking Brute Force Password Attacks Stack Operation Race Condition Errors Format String Errors File System Attacks Hiding Tracks Single User Countermeasure Strong Authentication Single Sign-On Technologies Account Lockouts Shadow Password Files Buffer Overflow Countermeasures LPRng Countermeasures Tight File Permissions Hiding Tracks Countermeasures Removing Unnecessary Applications DoS Countermeasures Hardening Scripts Using SSH & VPNs to Prevent Sniffing Demo - Attacking Unix Systems Module 10 Review Module 11 - Rootkits, Backdoors, Trojans & Tunnels -------------------------------------------------- Types Of Rootkits A Look at LRK Examples of Trojaned Files Windows NT Rootkits NT Rootkit AFX Windows Rootkit 2003 Rootkit Prevention Unix Rootkit Prevention Windows netcat netcat: Useful Unix Commands netcat: What it Looks Like VNC-Virtual Network Computing Backdoor Defenses Trojans Back Orifice 2000 NetBus SubSeven Defenses to Trojans Tunneling Loki Other Tunnels Q-2.4 by Mixter Starting Up Malicious Code Defenses Against Tunnels Manually Deleting Logs Tools to Modify Logs Demo - Trojans Module 11 Review Module 12 - Denial Of Service And Botnets ----------------------------------------- Denial-of-Service Attacks CPUHog Ping of Death Teardrop Attacks Jolt2 Smurf Attacks SYN Attacks UDP Floods Distributed DoS DDoS Tool: Trin00 Other DDoS Variation History of Botnets Anatomy of a Botnet Some Common Bots Demo - Denial of Service Module 12 Review Module 13 - Automated Pen Testing Tools --------------------------------------- General: Definitions General:What? General: Why? Core Impact™ Framework Core Impact™ Operation Canvas™ Framework Canvas™ Operation Metasploit Framework Metasploit Operation Demo - Automated Pen Testing Module 13 Review Module 14 - Intrusion Detection Systems --------------------------------------- Types of IDSs Network IDSs Distributed IDSs (DIDSs) Anomaly Detection Signature Detection Common IDS Software Products Introduction to Snort Attacking an IDS Eluding Techniques Testing an IDS Hacking Tool - NIDSbench Hacking Tool - Fragroute Hacking Tool - SideStep Hacking Tool - ADMmutate Other IDS Evasion Tools Demo - IDS and Snort Module 14 Review Module 15 - Firewalls --------------------- Firewall Types Application Layer Gateways ALGs (Proxies) Stateful Inspection Engine Hybrid Firewall Host-Based Firewall Network-Based Firewall DMZ (Demilitarized Zone) Back-to-Back Firewalls Bastion Hosts Control Traffic Flow Multiple DMZs Controlling Traffic Flow Why Do I Need a Firewall? What Should I Filter? Egress Filtering Network Address Translation (NAT) Firewall Vulnerabilities IPTables/NetFilter Default Tables and Chains iptables Syntax 1 iptables Syntax 2 Sample IPTables Script 1 Sample IPTables Script 2 Persistent Firewalls Firewall Identification Firewalk Tunneling with Loki Tunneling with NetCat/CryptCat Port Redirection with Fpipe Denial-of-Service Attacks Risk? Demo - Firewalls and IP Tables Module 15 Review Module 16 - Honeypots and Honeynets ----------------------------------- What Is a Honeypot? Advantages and Disadvantages Types and Categories of Honeypots Honeypot: Tarpits Honeypot: Kfsensor Honeypot: Honeyd Sample Honeyd Configuration High-Interaction Honeypot Project HoneyNet Types of Honeynets The Main Difference is Data Control GEN II Data Control: Honeywall CD Gen II Data Capture: Sebek & Sebek II Automated alerting Testing Legal Issues Demo - Setting up a Honeypot Module 16 Review Module 17 - Ethics and Legal Issues ----------------------------------- The Costs Relation to Ethical Hacking? The Dual Nature of Tools Good Instead of Evil? Recognizing Trouble When It Happens Emulating the Attack Security Does Not Like Complexity Proper and Ethical Disclosure CERT’s Current Process Full Disclosure Policy Organization for Sharing Widget |