النتائج 1 إلى 12 من 12

الموضوع: Career Academy Hacking

  1. #1
    عضو
    تاريخ التسجيل
    Mar 2006
    المشاركات
    333
    معدل تقييم المستوى
    0

    Career Academy Hacking



    Total Size: 4Gb {17CDs }

    Course Detail:
    Module 1
    Ethical Hacking and Penetration Testing
    Security 101
    Hacking Hall of Fame
    What are Today's hackers Like?
    Today's Hackers
    Risk Management
    Evolution of Threats
    Typical Vulnerability Life Cycle
    What is Ethical Hacking?
    Rise of the Ethical Hacker
    Types of Security Test
    Penetration Test (Pen-test)
    Red Teams
    Testing Methodology
    VMWare Workstation
    Windows and Linux Running VMWare
    Linux Is a Must
    Linux Survival Skills
    Useful vi Editor Commands
    Module 1 Review

    Module 2
    Footprinting and Reconnaissance
    Desired Information
    Find Information by the Target (Edgar)
    terraserver.microsoft.com
    Network Reconnaissance & DNS Search
    Query Whois Databases
    Command-Line Whois Searches
    ARIN whois: Search IP Address Blocks
    SamSpade Tool and Website
    Internet Presence
    Look Through Source Code
    Mirror Website
    Find Specific Types of Systems
    Big Brother
    AltaVista
    Specific Data Being Available?
    Anonymizers
    Countermeasures to Information Leakage
    Social Engineering
    DNS Zone Transfer
    Nslookup command-line utility
    Zone Transfer from Linux
    Automated Zone Transfers
    Zone Transfer Countermeasures
    www.CheckDNS.net
    Tracing Out a Network Path
    tracert Output
    Free Tools
    Paratrace
    War Dialing for Hanging Modems
    Manual and Automated War Dialing
    Case Study
    www.guidedogs.com
    Footprinting Countermeasures
    Demo - Footprinting & Info Gathering
    Module 2 Review

    Module 3
    TCP/IP Basics and Scanning
    The OSI Model
    TCP/IP Protocol Suite Layers
    Encapsulation
    Data-Link Protocols
    IP - Internet Protocol, Datagram (Packet)
    ICMP Packets
    UDP – User Datagram Protocol
    UDP Datagram
    TCP – Transmission Control Protocol
    TCP Segment
    TCP/IP 3-Way Handshake and Flags
    TCP and UDP Ports
    Ping Sweeps
    Good Old Ping, Nmap, TCP Ping Sweep
    TCP Sweep Traffic Captured
    Unix Pinging Utilities
    Default TTLs
    Pinging Countermeasures
    Port Scanning
    Nmap
    Advanced Probing Techniques
    Scanrand
    Port Probing Countermeasures
    Watch Your Own Ports
    Demo - Scanning Tools
    Module 3 Review

    Module 4
    Enumeration and Verification
    Operating System Identification
    Differences Between OS TCP/IP Stack
    Nmap -O
    Active vs Passive Fingerprinting
    Xprobe/Xprobe2
    Countermeasures
    SNMP Overview
    SNMP Enumeration
    SMTP, Finger, and E-mail Aliases
    Gleaning Information from SMTP
    SMTP E-mail Alias Enumeration
    SMTP Enumeration Countermeasures
    CIFS/SMB
    Attack Methodology
    Find Domains and Computers
    NetBIOS Data
    NBTscan
    NULL Session
    Local and Domain Users
    Find Shares with net view
    enum: the All-in-one
    Winfo and NTInfoScan (ntis.exe)
    Digging in the Registry
    NetBIOS Attack Summary
    NetBIOS Countermeasures
    What’s this SID Thing Anyway?
    Common SIDs and RIDs
    whoami
    RestrictAnonymous
    USER2SID/SID2USER
    psgetsid.exe and UserDump Tool
    LDAP and Active Directory
    GUI Tools to Perform the Same Actions
    Demo - Enumeration
    Module 4 Review

    Module 5
    Hacking & Defending Wireless/Modems
    Phone Numbers & Modem Background
    Phone Reconnaissance
    Modem Attacks
    Wireless Reconnaissance
    Wireless Background
    Wireless Reconnaissance Continued
    Wireless Sniffing
    Cracking WEP Keys
    Defending Wireless
    Module 5 Review

    Module 6
    Hacking & Defending Web Servers
    Web Servers in General: HTTP
    Uniform Resource Locator: URL
    Apache Web Server Functionality
    Apache: Attacking Mis-configurations
    Apache: Attacking Known Vulnerabilities
    Defending Apache Web Server
    Microsoft Internet Information Server (IIS)
    IIS: Security Features
    IIS: Attacking General Problems
    IIS: IUSER or IWAM Level Access
    IIS: Administrator or Sys Level Access
    IIS: Clearing IIS Logs
    IIS: Defending and Countermeasures
    Web Server Vulnerability Scanners
    Demo - Hacking Web Servers
    Module 6 Review

    Module 7
    Hacking & Defending Web Applications
    Background on Web Threat & Design
    Basic Infrastructure Information
    Information Leaks on Web Pages
    Hacking over SSL
    Use the Source, Luke…
    Functional/Logic Testing
    Attacking Authentication
    Attacking Authorization
    Debug Proxies: @stake webproxy
    Input Validation Attacks
    Attacking Session State
    Attacking Web Clients
    Cross-Site Scripting (XSS) Threats
    Defending Web Applications
    Module 7 Review

    Module 8
    Sniffers and Session Hijacking
    Sniffers
    Why Are Sniffers so Dangerous?
    Collision & Broadcast Domains
    VLANs and Layer-3 Segmentation
    tcpdump & WinDump
    Berkley Packet Filter (BPF)
    Libpcap & WinPcap
    BUTTSniffing Tool and dSniff
    Ethereal
    Mitigation of Sniffer Attacks
    Antisniff
    ARP Poisoning
    MAC Flooding
    DNS and IP Spoofing
    Session Hijacking
    Sequence Numbers
    Hunt
    Ettercap
    Source Routing
    Hijack Countermeasures
    Demo - Sniffers
    Module 8 Review

    Module 9
    Hacking & Defending Windows Systems
    Physical Attacks
    LANMan Hashes and Weaknesses
    WinNT Hash and Weaknesses
    Look for Guest, Temp, Joe Accounts
    Direct Password Attacks
    Before You Crack: Enum Tool
    Finding More Account Information
    Cracking Passwords
    Grabbing the SAM
    Crack the Obtained SAM
    LSA Secrets and Trusts
    Using the Newly Guessed Password
    Bruteforcing Other Services
    Operating System Attacks
    Hiding Tracks: Clearing Logs
    Hardening Windows Systems
    Strong 3-Factor Authentication
    Creating Strong Passwords
    Authentication
    Windows Account Lockouts
    Auditing Passwords
    File Permissions
    Demo - Attacking Windows Systems
    Module 9 Review


    Module 10
    Hacking & Defending Unix Systems
    Physical Attacks on Linux
    Password Cracking
    Brute Force Password Attacks
    Stack Operation
    Race Condition Errors
    Format String Errors
    File System Attacks
    Hiding Tracks
    Single User Countermeasure
    Strong Authentication
    Single Sign-On Technologies
    Account Lockouts
    Shadow Password Files
    Buffer Overflow Countermeasures
    LPRng Countermeasures
    Tight File Permissions
    Hiding Tracks Countermeasures
    Removing Unnecessary Applications
    DoS Countermeasures
    Hardening Scripts
    Using SSH & VPNs to Prevent Sniffing
    Demo - Attacking Unix Systems
    Module 10 Review

    Module 11
    Rootkits, Backdoors, Trojans & Tunnels
    Types Of Rootkits
    A Look at LRK
    Examples of Trojaned Files
    Windows NT Rootkits
    NT Rootkit
    AFX Windows Rootkit 2003
    Rootkit Prevention Unix
    Rootkit Prevention Windows
    netcat
    netcat: Useful Unix Commands
    netcat: What it Looks Like
    VNC-Virtual Network Computing
    Backdoor Defenses
    Trojans
    Back Orifice 2000
    NetBus
    SubSeven
    Defenses to Trojans
    Tunneling
    Loki
    Other Tunnels
    Q-2.4 by Mixter
    Starting Up Malicious Code
    Defenses Against Tunnels
    Manually Deleting Logs
    Tools to Modify Logs
    Demo - Trojans
    Module 11 Review

    Module 12
    Denial of Service and Botnets
    Denial-of-Service Attacks
    CPUHog
    Ping of Death
    Teardrop Attacks
    Jolt2
    Smurf Attacks
    SYN Attacks
    UDP Floods
    Distributed DoS
    DDoS Tool: Trin00
    Other DDoS Variation
    History of Botnets
    Anatomy of a Botnet
    Some Common Bots
    Demo - Denial of Service
    Module 12 Review

    Module 13
    Automated Pen Testing Tools
    General: Definitions
    General:What?
    General: Why?
    Core Impact™ Framework
    Core Impact™ Operation
    Canvas™ Framework
    Canvas™ Operation
    Metasploit Framework
    Metasploit Operation
    Demo - Automated Pen Testing
    Module 13 Review

    Module 14
    Intrusion Detection Systems
    Types of IDSs
    Network IDSs
    Distributed IDSs (DIDSs)
    Anomaly Detection
    Signature Detection
    Common IDS Software Products
    Introduction to Snort
    Attacking an IDS
    Eluding Techniques
    Testing an IDS
    Hacking Tool - NIDSbench
    Hacking Tool - Fragroute
    Hacking Tool - SideStep
    Hacking Tool - ADMmutate
    Other IDS Evasion Tools
    Demo - IDS and Snort
    Module 14 Review

    Module 15
    Firewalls
    Firewall Types
    Application Layer Gateways
    ALGs (Proxies)
    Stateful Inspection Engine
    Hybrid Firewall
    Host-Based Firewall
    Network-Based Firewall
    DMZ (Demilitarized Zone)
    Back-to-Back Firewalls
    Bastion Hosts
    Control Traffic Flow
    Multiple DMZs
    Controlling Traffic Flow
    Why Do I Need a Firewall?
    What Should I Filter?
    Egress Filtering
    Network Address Translation (NAT)
    Firewall Vulnerabilities
    IPTables/NetFilter
    Default Tables and Chains
    iptables Syntax 1
    iptables Syntax 2
    Sample IPTables Script 1
    Sample IPTables Script 2
    Persistent Firewalls
    Firewall Identification
    Firewalk
    Tunneling with Loki
    Tunneling with NetCat/CryptCat
    Port Redirection with Fpipe
    Denial-of-Service Attacks Risk?
    Demo - Firewalls and IP Tables
    Module 15 Review

    Module 16
    Honeypots and Honeynets
    What Is a Honeypot?
    Advantages and Disadvantages
    Types and Categories of Honeypots
    Honeypot: Tarpits
    Honeypot: Kfsensor
    Honeypot: Honeyd
    Sample Honeyd Configuration
    High-Interaction Honeypot
    Project HoneyNet
    Types of Honeynets
    The Main Difference is Data Control
    GEN II Data Control: Honeywall CD
    Gen II Data Capture: Sebek & Sebek II
    Automated Alerting
    Testing
    Legal Issues
    Demo - Setting up a Honeypot
    Module 16 Review

    Module 17
    Ethics and Legal Issues
    The Costs
    Relation to Ethical Hacking?
    The Dual Nature of Tools
    Good Instead of Evil?
    Recognizing Trouble When It Happens
    Emulating the Attack
    Security Does Not Like Complexity
    Proper and Ethical Disclosure
    CERT’s Current Process
    Full Disclosure Policy
    Organization for Internet Safety (OIS)
    What Should We Do from Here?
    Legal Meets Information Systems
    Addressing Individual Laws
    18 USC SECTION 1029
    18 USC SECTION 1030
    1030: Worms and Viruses
    Blaster Worm Attacks
    Civil vs. Criminal
    18 USC SECTIONS 2510 and 2701
    Digital Millennium Copyright Act
    Cyber Security Enhancement Act
    Module 17 Review

  2. #2

  3. #3

  4. #4

  5. #5

  6. #6

  7. #7

  8. #8

  9. #9

  10. #10
    عضو
    تاريخ التسجيل
    Mar 2006
    المشاركات
    333
    معدل تقييم المستوى
    0

  11. #11
    عضو
    تاريخ التسجيل
    May 2007
    المشاركات
    47
    معدل تقييم المستوى
    0

    رد: Career Academy Hacking

    ماشاء الله الله يعطيك العافية
    جاري التنزيل

  12. #12
    عضو برونزي الصورة الرمزية 7amasa7
    تاريخ التسجيل
    Dec 2007
    المشاركات
    1,304
    معدل تقييم المستوى
    0

    رد: Career Academy Hacking



    الف شكر على مجهودك الرائع وجزاك الله كل خير
    جارى التحميل

المواضيع المتشابهه

  1. Career.Academy.CompTIA.Security.Plus.2009
    بواسطة isofreak في المنتدى الأرشيف
    مشاركات: 0
    آخر مشاركة: 23-08-2010, 21:46
  2. Career Academy CEHv6 ( 6 DVDs
    بواسطة outosend في المنتدى منتدى الشهادات العام
    مشاركات: 2
    آخر مشاركة: 14-11-2009, 13:51
  3. Career Academy Hacking, Penetration Testing and Counter 17CD
    بواسطة aldo في المنتدى الأرشيف
    مشاركات: 5
    آخر مشاركة: 12-11-2009, 19:38
  4. Career.Academy.Hacking.Penetration.Testing.and.Cou ntermeasures.Training-LiBiSO
    بواسطة one-zero في المنتدى الأرشيف
    مشاركات: 5
    آخر مشاركة: 14-08-2007, 13:00
  5. Certified Ethical Hacking Career Academy 7 ISO ملف تورنت جيد جدا
    بواسطة carbony في المنتدى الأرشيف
    مشاركات: 12
    آخر مشاركة: 01-04-2007, 16:01

الكلمات الدلالية لهذا الموضوع

المفضلات

ضوابط المشاركة

  • لا تستطيع إضافة مواضيع جديدة
  • لا تستطيع الرد على المواضيع
  • لا تستطيع إرفاق ملفات
  • لا تستطيع تعديل مشاركاتك
  •