Module 02 Footprinting and Reconnaissance
Exercise 1: Open Source Information Gathering Using Windows Command Line Utilities Exercise 2: Collecting Information About a Target Website Using Firebug Exercise 3: Mirroring Website Using HTTrack Web Site Copier Exercise 4: Advanced Network Route Tracing Using Path Analyzer Pro Exercise 5: Information Gathering Using Metasploit
Module 03 Scanning Networks
Exercise 1: UDP and TCP Packet Crafting Techniques using HPING3 Exercise 2: Scanning The Network Using The Colasoft Packet Builder Exercise 3: Basic Network Troubleshooting Using MegaPing Exercise 4: Understanding Network Scanning Using Nmap Exercise 5: Exploring Various Network Scanning Techniques Exercise 6: Scanning a Network Using NetScan Tools Pro Exercise 7: Avoiding Scanning Detection using Multiple Decoy IP Addresses Exercise 8: Drawing Network Diagrams Using Network Topology Mapper Exercise 9: Checking for Live Systems Using Angry IP Scanner Exercise 10: Scanning for Network Traffic Going Through a Computer’s Adapter Using IP-Tools Exercise 11: Identify Target System OS with TTL and TCP Window Sizes using Wireshark
Module 04 Enumeration
Exercise 1: NetBIOS Enumeration Using Global Network Inventory Exercise 2: Enumerating Network Resources Using Advanced IP Scanner Exercise 3: Performing Network Enumeration Using SuperScan Exercise 4: Enumerating Resources in a Local Machine Using Hyena Exercise 5: Performing Network Enumeration Using NetBIOS Enumerator Exercise 6: Enumerating a Network Using SoftPerfect Network Scanner Exercise 7: Enumerating a Target Network using Nmap and Net Use Exercise 8: Enumerating Services on a Target Machine Exercise 9: SNMP Enumeration Using snmp_enum Exercise 10: LDAP Enumeration Using Active Directory Explorer (ADExplorer) Exercise 11: Enumerating information from Windows and Samba host using Enum4linux
Module 05 Vulnerability Analysis
Exercise 1: Vulnerability Analysis Using Nessus Exercise 2: CGI Scanning with Nikto
Module 06 System Hacking
Exercise 1: Dumping and Cracking SAM Hashes to Extract Plaintext Passwords Exercise 2: Creating and Using Rainbow Tables Exercise 3: Auditing System Passwords Using L0phtCrack Exercise 4: Exploiting Client Side Vulnerabilities and Establishing a VNC Session Exercise 5: Escalating Privileges by Exploiting Client Side Vulnerabilities Exercise 6: Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpreter Exercise 7: User System Monitoring and Surveillance Using Spytech SpyAgent Exercise 8: Web Activity Monitoring and Recording using Power Spy Exercise 9: Hiding Files Using NTFS Streams Exercise 10: Hiding Data Using White Space Steganography Exercise 11: Image Steganography Using OpenStego Exercise 12: Image Steganography Using Quick Stego Exercise 13: Viewing, Enabling, and Clearing Audit Policies Using Auditpol Exercise 14: Covert Channels using Covert_TCP Exercise 15: Hacking Windows Server 2012 with a Malicious Office Document Using TheFatRat Exercise 16: Active Online Attack using Responder
Module 07 Malware Threats
Exercise 1: Creating an HTTP Trojan and Remotely Controlling a Target Machine Using HTTP RAT Exercise 2: Creating a Trojan Server Using the GUI Trojan MoSucker Exercise 3: Gaining Control over a Victim Machine Using njRAT Exercise 4: Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Various Anti-Virus Programs Exercise 5: Creating a Server Using the ProRat Tool Exercise 6: Creating a Trojan Server Using Theef Exercise 7: Creating a Virus Using the JPS Virus Maker Tool Exercise 8: Creating a Worm Using Internet Worm Maker Thing Exercise 9: Virus Analysis using IDA Exercise 10: Virus Analysis Using OllyDbg Exercise 11: Detecting Trojans Exercise 12: Monitoring TCP/IP Connections Using the CurrPorts Exercise 13: Removing Malware using Clamwin Exercise 14: Performing Registry Entry Monitoring Exercise 15: Startup Program Monitoring Tool
Module 08 Sniffing
Exercise 1: Sniffing Passwords using Wireshark Exercise 2: Analyzing a Network Using Capsa Network Analyzer Exercise 3: Spoofing MAC Address Using SMAC Exercise 4: Performing Man-in-the-Middle Attack using Cain & Abel Exercise 5: Detecting ARP Poisoning in a Switch Based Network Exercise 6: Detecting ARP Attacks with XArp Tool
Module 09 Social Engineering
Exercise 1: Sniffing Website Credentials Using Social Engineering Toolkit (SET)
Module 10 Denial-of-Service
Exercise 1: SYN Flooding a Target Host Using Metasploit Exercise 2: SYN Flooding a Target Host Using hping3 Exercise 3: Performing Distributed Denial of Service Attack Using HOIC
Module 11 Session Hijacking
Exercise 1: Session Hijacking Using the Zed Attack Proxy (ZAP)
Module 12 Evading IDS Firewalls and Honeypots
Exercise 1: Detecting Intrusions Using Snort Exercise 2: Detecting Malicious Network Traffic Using HoneyBOT Exercise 3: Bypassing Windows Firewall Using Nmap Evasion Techniques Exercise 4: Bypassing Firewall Rules Using HTTP/FTP Tunneling Exercise 5: Bypassing Windows Firewall using Metasploit
Module 13 Hacking Web Servers
Exercise 1: Performing Web Server Reconnaissance using Skipfish Exercise 2: Footprinting a Web Server Using the httprecon Tool Exercise 3: Footprinting a Web Server Using ID Serve Exercise 4: Cracking FTP Credentials Using Dictionary Attack Exercise 5: Uniscan Web Server Fingerprinting in Kali Linux
Module 14 Hacking Web Applications
Exercise 1: Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications Exercise 2: Enumerating and Hacking a Web Application Using WPScan and Metasploit Exercise 3: Exploiting Remote Command Execution Vulnerability to Compromise a Target Web Server Exercise 4: Auditing Web Application Framework Using Vega Exercise 5: Website Vulnerability Scanning Using Acunetix WVS Exercise 6: Exploiting File Upload Vulnerability at Different Security Levels Exercise 7: Performing Cross-Site Request Forgery (CSRF) Attack
Module 15 SQL Injection
Exercise: 1 SQL Injection Attacks on an MS SQL Database Exercise: 2 Scanning Web Applications Using N-Stalker Tool Exercise: 3 Performing SQL Injection attack against MSSQL to extract Databases and WebShell using SQLMAP
Module 16 Hacking Wireless Networks
Exercise: 1 WiFi Packet Analysis using Wireshark Exercise: 2 Cracking a WEP with Aircrack-ng Exercise: 3 Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng
Module 17 Hacking Mobile Platforms
Exercise: 1 Creating Binary Payloads using Kali Linux to Hack Android Exercise: 2 Harvesting Users’ Credentials Using the Social Engineering Toolkit
Module 19 Cloud Computing
Exercise: 1 Creating User Accounts and Assigning User Rights in ownCloud Exercise: 2 Securing ownCloud from Malicious File uploads using ClamAV Exercise: 3 Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux Exercise: 4 Implementing DoS Attack on Linux Cloud Server Using Slowloris Script
Module 20 Cryptography
Exercise 1: Calculating One-Way Hashes Using HashCalc Exercise 2: Calculating MD5 Hashes Using MD5 Calculator Exercise 3: Understanding File and Text Encryption Using CryptoForge Exercise 4: Encrypting and Decrypting the Data Using BCTextEncoder Exercise 5: Creating and Using Self-Signed Certificate Exercise 6: Basic Disk Encryption Using VeraCrypt Exercise 7: Basic Data Encryption Using CrypTool
Répondre