Module 02 – Footprinting and Reconnaissance
The objective of the lab is to extract information about the target organization that includes, but is not limited to:
- Internet Protocol (IP) address and IP range associated with the target
- Purpose of organization and why it exists
- Size of the organization
- Class of its IP block
- People and contacts at the target
- Types of operating systems (OS) and network topology in use
- Type of firewall implemented, either hardware or software or combination
- Type of remote access used, either SSH or VPN
Module 03 – Scanning Networks
The objective of this lab is to help students in conducting network scanning, port scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:
- Check live systems and open ports
- Perform banner grabbing and OS fingerprinting
- Identify network vulnerabilities
- Draw network diagrams of vulnerable hosts
Module 04 – Enumeration
The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:
- User name and user groups
- Lists of computers, their operating systems, and ports
- Machine names, network resources, and services
- Lists of shares on individual hosts on the network
- Policies and passwords
Module 05 – Vulnerability Analysis
The objective of this lab is to help students in conducting vulnerability scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:
- Check live systems and open ports
- Perform banner grabbing and OS fingerprinting
- Identify network vulnerabilities
- Draw network diagrams of vulnerable hosts
Module 06 – System Hacking
The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files.
The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include:
- Extracting administrative passwords
- Hiding files and extracting hidden files
- Recovering passwords
- Monitoring a system remotely
Module 07 – Malware Threats
The objective of this lab includes:
- Creating and using different types of malware, such as Trojans, Viruses, and Worms, and exploiting a target machine as proof of concept
- Detecting malware
Module 08 – Sniffing
The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network.
The primary objectives of this lab are to:
- Sniff the network
- Analyze incoming and outgoing packets
- Troubleshoot the network for performance
- Secure the network from attacks
Module 09 – Social Engineering
The objective of this lab is to:
- Perform Credential Harvesting
Module 10 – Denial-of-Service
The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws.
In this lab, you will:
- Perform a DoS attack by sending a large number of SYN packets continuously
- Perform a HTTP flooding attack
- Perform a DDoS attack
- Detect and analyze DoS attack traffic
Module 11 – Session Hijacking
The objective of this lab is to help students learn session hijacking and take over a user account.
In this lab, you will:
- Intercept the Traffic between server and client
- Attain a user session by intercepting the traffic
- Perform ARP Poisoning using Cain & Abel
- Modify Cookies and Hijack a session using Firebug
Module 12 – Evading IDS Firewalls and Honeypots
The objective of this lab is to help students learn and detect intrusions in a network, log, and view all log files.
In this lab, you will learn how to:
- Install and configure Snort IDS
- Detect Intruders using HoneyBot
- Bypassing Windows Firewall Using Nmap
- Bypassing Firewall Rules Using HTTP/FTP Tunneling
- Bypassing Windows Firewall using Metasploit
Module 13 – Hacking Web Servers
The objective of this lab is to help students learn to detect unpatched security flaws, verbose error messages, and much more.
The objective of this lab is to:
- Perform Web Server Security Reconnaissance
- Detect unpatched security flaws like Shellshock bug
- Crack remote passwords
Module 14 – Hacking Web Applications
The objective of this lab is to provide expert knowledge of web application vulnerabilities and attacks, such as:
- Parameter tampering
- Cross-Site Scripting (XSS)
- Stored XSS
- Username and Password Enumeration
- Exploiting WordPress Plugin Vulnerabilities
- Exploiting Remote Command Execution Vulnerability
- Web Application Auditing Framework
- Website Vulnerability Scanning
Module 15 – SQL Injection
The objective of this lab is to provide expert knowledge on SQL Injection attacks and other responsibilities that include:
- Understanding when and how web application connects to a database server in order to access data
- Extracting basic SQL Injection flaws and vulnerabilities
- Testing web applications for Blind SQL Injection vulnerabilities
- Scanning web servers and analyzing the reports
- Securing information in web applications and web servers
Module 16 – Hacking Wireless Networks
The objective of this lab is to protect the wireless network from attackers.
In this lab, you will learn how to:
- Analyze Wireless Network Traffic using Wireshark
- Crack WEP using aircrack-ng
- Crack WPA using aircrack-ng
Module 17 – Hacking Mobile Platforms
The objective of this lab is to help students learn to detect unpatched security flaws in mobile devices, and use them for performing penetration testing.
The objective of this lab is to:
- Exploit the vulnerabilities in an Android device
- Crack websites passwords
- Use Android device to perform a DoS attack on a machine
- Perform Security Assessment on an Android Device
Module 19 – Cloud Computing
The objective of this lab is to help students to build a cloud server, secure it with OpenSSL Encryption, and exploit java vulnerability to harvest user credentials.
In this lab, you will:
- Create User Accounts and assign user rights
- Securing ownCloud from malicious file uploads using ClamAV
- Bypassing ownCloud Antivirus and hacking the host using Kali Linux
Module 20 – Cryptography
This lab will show you how to use encryption tools to encrypt data. It will teach you how to:
- Use encrypting/decrypting techniques
- Generate Hashes and checksum files
Tags : Footprinting and Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis , System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-Service, Session Hijacking, Evading IDS Firewalls and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, Cloud Computing, Cryptography