| Reconnaissance/Footprinting
o What is Reconnaissance/Footprinting?
o What to Look For?
o Other Reconnaissance Techniques
o Reconnaissance via Google Hacking
o Reconnaissance Countermeasures & Pen Testing
Scanning Networks
o Overview of Scanning
o Understanding the 3-way Handshake
o Finding “Live” Systems and Their Open Ports
o Types of Scanning
o Banner Grabbing and OS Fingerprinting
o Vulnerability Scanning and Drawing Out the Network
o Preparing Proxies and Other Anonymizing Techniques
Enumeration
o What is Enumeration?
o Enumerating via Defaults & NetBIOS
o Enumerating via SNMP
o Enumerating via LDAP
o Enumerating via NTP
o Enumerating via SMTP
o Enumerating via DNS
o Countermeasures for Enumeration
Vulnerability Analysis
o Incorporating Vulnerability Scans
o Scanners
o Analyzing Vulnerability Scans
o Remediation and Change Control
o Remediating Host Vulnerabilities
o Remediating Network Vulnerabilities
o Remediating Virtual Environment Vulnerabilities
System Security
o Understanding System Security Attacks
o Phase 1: Gaining Access – Cracking Passwords
o Phase 2: Gaining Access – Escalating Privileges
o Phase 3: Maintaining Access – Executing Applications
o Phase 4: Maintaining Access – Hiding Your Tools
o Phase 5: Covering Your Tracks – Clearing Logs and Evidence
|
Sniffing
o DHCP Assaults
o Big-MAC Attacks
o ARP Poisoning
o DNS Poisoning
o Countermeasures
Social Engineering
o What is Social Engineering?
o A Walkthrough of a Social Engineering Attack
o Reconnaissance and OSINT
o Phishing Attacks
o Identity Theft and Impersonation
o Social Engineering Countermeasures
Session Persistence in Web Applications
o Hijacking Sessions in Web Applications
o Network and Client Level Session Hijacking
o Mitigating the Risk of Session Hijacking
o Automating Session Hijack Attacks
Evading IDS, Firewalls, and Honeypots
o Understanding Organizational Defenses
o Firewalls
o Intrusion Detection Systems
o Honeypots
SQL Injection Attack
o Why SQL Injection Matters
o Understanding SQL Queries
o The Mechanics of SQL Injection Attacks
o Discovering Schema and Extracting Data
o Blind SQL Injection
o Advanced SQL Injection Concepts
o Defending Against Attacks
o Evasion Techniques
o Automating Attacks
|