0% found this document useful (0 votes)
73 views12 pages

Report

The document outlines the course modules for an ethical hacking course. It covers 22 modules that teach skills like footprinting, scanning, enumeration, hacking tools like trojans and sniffers, social engineering techniques like phishing, and hacking specific targets like email accounts, databases and online games. The first module provides an introduction to ethical hacking and defines key terms. It explains the types of hackers and the steps a malicious hacker takes in an attack.

Uploaded by

pkpsc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views12 pages

Report

The document outlines the course modules for an ethical hacking course. It covers 22 modules that teach skills like footprinting, scanning, enumeration, hacking tools like trojans and sniffers, social engineering techniques like phishing, and hacking specific targets like email accounts, databases and online games. The first module provides an introduction to ethical hacking and defines key terms. It explains the types of hackers and the steps a malicious hacker takes in an attack.

Uploaded by

pkpsc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COURSE OUTLINEourse Outline

􀁾 Module 1: Introduction to Ethical Hacking


􀁾 Module 3: Footprinting
􀁾 Module 5: Scanning
􀁾 Module 6: Enumeration
􀁾 Module 8: Trojans
􀁾 Module 10: Sniffers
􀁾 Module 11: Social Engineering
􀁾 Module 12: Phishing
􀁾 Module 13: Hacking Email Accounts
􀁾 Module 14: SQL Injection
􀁾 Module 15: Penetration Testing
􀁾 Module 16: Hacking USB Devices
􀁾 Module 17: Hacking Database Servers
􀁾 Module 18: Hacking and Cheating Online Games
􀁾 Module 19: Proxy Server Technologies
􀁾 Module 20: Data Loss Prevention
􀁾 Module 21: Firewall Technologies
􀁾 Module 22: Threats and Countermeasures

MODULE 1: Introduction to Ethical Hacking


Module Objectives:
 Importance of Information security in today’s world.
 Elements of security
 Various phases of the Hacking Cycle
 Types of hackers attacksHacktivism
 Ethical Hacking
 Vulnerabilities research and tools
 Cyber laws prevailing in various parts of world.

Essential Terminology
Threats:
An action or event that might compromise security.A threat is
a potential violation of security.
Vulnerability:
Existence of a weakness, design or implementation error
that can lead to an unexpacted and undesirable event
compromising the security of the system.
Target and evaluation:
An IT system, product or component that is
identified/subjected torequire security evaluation.
Attack:
An assault on the system security that is derived from an
intelligent threat. An attack is any action that violates
security.
Exploit:
A defined way to breach the security of an IT system through
vulnerability.

Steps of a Malicious Hacker


 RECONNAISSANCE
Reconnaissance refers to the preparatory phase where an
attackerseeks to gather as much informstio as much
possible about a target of evaluatio prior to launching an
attack.
 SCANNING
Scanning refers to the pre-attack phase when the hacker
scan the network for specific information on the basis of
information gathered during reconnaissance.
 GAINIG ACCESS
Gaining access refers to the to the penetration phase. The
hacker exploits the vulnerability in the system.
 MAINTAINING ACCESS
Maintaining access refers to the phase when the hacker
tries to retain his/her ownership of the system.
 CLEARIGN TRACKS
Clearing tracks refers to the activities that the hacker dose
to hide his misdeeds.
Types of hacker attacks
There are several ways an attacker can gain access to a
system. These are:
 Operating System Attacks
 Aplication-level Attacks
 Shrink Wrap Code Attacks
 Misconfiguration Attacks

Hacktivism
1.Hacktivism refers to the idea if the hacking with or for a
caouse.
2.Comprises of hackers with a social or a poloticalagenda.
3.Aims at sending a messagethrough their hacking activity
and gaining visibility for their causeand themselves.
4.Comman targets includes govt. agencies, MNC’s or any
other entity percieved as bad or wrong by these group of
individuals.
Hackers Classes
There are mainly four types of hacker classes:
 Black Hats:
Individuals with extraordinary computing skills, restoring
to malicious or destructive activities. These are also known
as crackers.
 White Hats
Individuals proffessing hacker skill and using them for
defensive purposes. These are also known as security
analyst.
 Gray Hats
Individuals who work both offensively at various times.
 Suicide Hackers
Individuals who aim to bring down critical infrastructurefor a
cause and do not worry about the outcomes.
Ethical Hackers Classes
 Formar Black Hats
 Reformed crackers.
 First hand experience.
 Lesser credibility percieved
 White Hats
 Independent security consultants
 Claim to be knowledgeable about black hack
activities.
 Consulting Firms
 Parts of ICT firms.
 Good credentials.

MODULE 2: FOOTPRINTING
Module objectives:
This module will familarize you with:
 Footprinting-an introduction
 Information gathering mathedology of a hacker.
 Competitive intelligence gathering.
 Tools that aid in footprinting.
 Footprinting steps.

Footprinting:
Footprinting is the blueprint of the security profile of an
organization, undertaken in a mathedological manner.

Footprinting is one of the three pre-attack phase.

An attacker spends 90% of the time in profiling an organization


and another 10% in launching the attack.

Footprinting is necessary to systematically and methodically


ensure that all pieces of information related to the aforementioned
technologies are identified.

Footprinting is the most difficult task to determine the security


posture of an entity.

Information Gathering Methodology


There are mainly seven steps in this methodology:
 Unearth initial information.
 Locate the network range.
 Ascertain active maschine.
 Discover open ports/access points.
 Detrect OS.
 Uncover services on port.
 Map the network.
Competitive Intelligence Gathering
Competitive intelligence gathering is the process of gathering
information about your competitors from resources such as
internet.
The competitve intelligence is non-interfering and subtle in nature.
It is both a product and a process.

The various issues involved in competitve intelligence are:-


 Data gathering
 Data analysis
 Information verification
 Information security

Need of Competitive Intelligence Gathering


 Compare your products with your competitor’s offerings.
 Analyze your market position compared to the competitors.
 Pull up a list of competing companies in the market.
 Produce a profile of CEO and the entire management staff of
the competitors.
 Predict their tactics and methods based on their previous
track record.

Footprinting Tools
 Whois
 Nslookup
 ARIN
 Neo Trace
 VisualRoute Trace
 Smart Whois
 eMail Tracker pro
 Web site watcher
 Google Earth
 GEO spider
 HTTrack Web Copier
 E-mail Spider

Steps to perform Footprinting


 Find companies external and internal URL’s.
 Perform whois lookup for personal details.
 Extract DNS information.
 Mirror the entire website and look up names.
 Extract the archives of the webstes.
 Google search for the company’s new and press release.
 Use people search for personal information of employees.
 Find the physical location of the web server using “Neo
Tracer”.
 Analyze companies infrastructure details from job posting.
 Track the e-mails using “readnotify.com”

MODULE 3: Scanning

Module’s Objective:
 Definition of scanning
 Types and objectives of scanning
 Checking live systems and open ports
 Different tools present to perform Scanning

Scanning:-Definition
Scanning is one of the three components of intelligence gathering
for an hacker.
The attacker finds information about the:
 Specific IP addresses
 Operating System
 System Architecture
 Services running oneach computer
Types of scaning:-
 Port scanning:-
 A series of messages sent by someone attempting to
break into a computer to learn about the computer
network’s services.
 Each associated with a “well known” port number.
 Network Scanning:-
 A procedure for identifyingactive hosts on a network.
 Either for the purpose of attacking them or for network
security assessment.
 Vulnerability Scanning:-
 The automated process of proactivly identifying
vulnerability of computing systems present in a network.
Objectives of Scanning:-
 To detect the live system running on the network.
 To discover which ports are active/running.
 To discover the operatring system running on the target
system
 To discover the services running/listening on the target
system.
 To discover the IP address of the target system.
Checking for the live systems:-ICMP scanning
 In this type of scanning, it is found out which hosts are up in
a network by pinging them all.
 ICMP scanning can be run parallel so that it can run fast.
 It can also be helpful to tweek the ping timeout value with the
–t option.

Different tools present to perform Scanning


Angry IP scanner
Firewalk Tool
Nmap
HPING2
SYN stealth
Xmas Scan
FIN scan
NULL scan
IP sec scan
NetScan Tool
IPEye
LAN Spy
Nessus
MODULE 4: Enumeration
What is Enumeration:
It is defined as extraction of user’s names,machine
names,network resources,shares, and serivces.

Enumeration technique are conducted in an internet


environment.

It involves active connections to systems and directed quaries.

The types of information enumerated by intruders:


Network resource and shares
Users and groups
Applications and banners
Auditing Settings

Techniques for enumeration:-


Extract user names using Win2k enumeration
Extract user names using SNMP
Extract user names using E-mail id
Extract user names using default passwords
Brute force active directory

MODULE 5: Trojans
This module will familiarize you with:
 Trojans
 Type of Trojans and how Trojan works
 Indication of Trojan attack
 Anti-Trojans
Introduction:

Malicious users are always on the prowl to sneak into networks


and create trouble.

Trojan attacks have affected several businesses around the


globe.

In most cases, it is the absent minded user who invites trouble by


downloading files or being careless about security aspects.

What is TROJAN?

A Trojan is a small program that runs hidden on an infected


computer.
With the help of Trojan, an attacker gets access to stored
passwords in the Trojaned computer and would be able to read
personal documents, delete files and display pictures, and/or
show message on the screen.

Working of Turkojan
An attacker gets access to the Trojaned system as the system
goes online.

By the access provided by the Trojan, the attacker can stage


different types of attacks.

Different type of Trojans:


Remote access Trojans
Data-sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
Security Software Disabler

Indication of a Trojan attack:


CD-ROM drawer opens and close itself.
Computer screen flips upside down or inverts.
Wallpaper or background settings changed themselves.
Documents or messages print from the printer itself.
Mouse buttons reverse their functions.
Mouse pointer disappears.
Windows buttons disappear itself.
The computer shuts down itself.
The taskbar disappears.
The computer monitor turns itself off and on.
Ctrl+Alt+Del stops working.

MODULE 5: Sniffers

This module will familiarize you with:


Sniffing
Protocols vulnerable to sniffing
Types of sniffing
Detecting sniffing

Definition:- Sniffing
Sniffing is a data interception technology.

Sniffer is a program or device that captures the vital information


from the network traffic specific to a particular network.
The objective of sniffing is to steal passwords, E-mail text, files in
transfer.

Protocols vulnerable to Sniffing:-


Telnet and Rolgin
HTTP
SMTP
NNTP
POP
FTP
IMAP

Type of sniffing:
There are two types of sniffing:-
Passive sniffing
Active sniffing

Passive Sniffing
It is called passive because it is difficult to detect.

“Passive sniffing” means sniffing through a hub.

An attacker simply connects the laptop to the hub and start


sniffing.

Active Sniffing
It is done through the switch.

It is difficult to sniff.

It can be easily detectable.

You might also like