HackerHouse HandsOn Hacking Syllabus
HackerHouse HandsOn Hacking Syllabus
Table of Contents
COURSE SYLLABUS .........................................................................................................................................3
Course Description.................................................................................3
Student Pre-requisites ............................................................................3
Computer Requirements.......................................................................... 4
Objectives ..........................................................................................4
Code of Conduct ...................................................................................5
COURSE SCHEDULE & FORMAT .................................................................................................................5
[1] ETHICS & LEGALITIES ...............................................................................................................................6
[2] OPEN-SOURCE INTELLIGENCE ........................................................................................................... 6
[3] DNS & DOMAIN HACKING ......................................................................................................................6
[4] E-MAIL ATTACKS & MAIL INFRASTRUCTURE ...............................................................................7
[5] WEB SERVER INFRASTRUCTURE HACKING .................................................................................. 8
[6] VIRTUAL PRIVATE NETWORKING ATTACKS ...................................................................................8
[7] FILE SERVERS & INTERNAL INFRASTRUCTURE ATTACKS ......................................................9
[8] UNIX SERVER INFRASTRUCTURE .......................................................................................................9
[9] DATABASES .................................................................................................................................................10
[10] WEB APPLICATION ASSESSMENTS ...............................................................................................10
[11] WINDOWS ENTERPRISE ENVIRONMENTS .................................................................................11
[12] ART OF PASSWORD CRACKING .......................................................................................................11
ADDITIONAL INFORMATION ......................................................................................................................12
Exam & Certificate............................................................................... 12
Further Reading & Resources ...................................................................12
Course Syllabus
Course Description
Hacker House Hands-On Hacking course is an intensive introductory course that
teaches applied hacking methodologies in a hands-on practical orientated
approach. Our course is engineered from decades of experienced cyber security
practitioner’s knowledge to educate students on common cyber security tasks.
Our course is delivered by expert hackers to prepare students on adversarial
thinking and equip them for tasks conducted in a number of different cyber
security roles. Our team is dedicated to ensuring that each student is adequately
prepared and capable of performing several applied hacking concepts to real-
world problems. We teach the theoretical concepts required for each assessment
activity, provide instructor led demonstrations and then tutor assisted hands-on
practical labs to be completed by each student. Our course lab contents and
modules are downloadable and can be re-used by students to continue learning
beyond the course. Access to all material will be granted for 12 months following
the purchase.
Student Pre-requisites
We teach students from a grounds-up approach meaning you are not necessarily
an expert in the technology field. Our students have come from all manner of
technical environments or are currently attempting to enter industries in technical
job roles. We however do require that students can demonstrate technical
proficiency and are comfortable with computing tasks. To benefit the most from
our course as a student you should be comfortable with the following topics:
As this is an introductory course designed for training people into junior and mid-
level positions in the cyber security field, you should be competent with
configuring your computers network interfaces and doing routine administration
tasks beforehand.
Computer Requirements
You will need a computer that meets the following recommended minimum
technical specifications to complete our course:
You can try a sample of our practical components to assess your suitability for
free on the Hacker House website (https://hacker.house/training). This module is
intended to be challenging to our students and so do not be worried if you do not
complete all of the module, it is intended as a guide to show you what the course
is about. There will be plenty of time during the course to sharpen your skills and
ask questions of tutors.
Objectives
We teach how to conduct network and application security assessments from a
real-world scenario driven hacker’s approach. Students who complete our course
leave with a core competency of skills that are applicable to many cyber security
roles. Students will have performed a number of practical hands-on assessment
activities covering different network perspectives and aimed at understanding the
how’s and why’s of how breaches occur. Students completing this course will
leave with an understanding of performing the following assessment activities:
Our course will leave students with a clear understanding of the fundamentals in
performing security assurance exercises against a range of technologies. This can
Code of Conduct
Hacker House strives to provide an environment that encourages student growth
and enables efficient learning. A code of conduct will be provided to students that
outlines our anti-harassment policies and expected behaviour of all course
attendees. We will not teach students who wish to use the course material to
engage in unlawful conduct.
This course is not for the faint of heart; we work hard and fast to ensure you get all
the concepts and materials you need to learn and begin a career in ethical
hacking.
Objective
• Student will demonstrate an understanding of legal responsibilities
• Student will demonstrate an understanding of ethical practices
• Student will know where to seek legal advice and support
Objective
• Student will be able to demonstrate practical use of OSINT
• Identify vulnerabilities and weaknesses through OSINT
• Identify exposed accounts and data leaks through OSINT
Objective
• Student will be able to assess domain technology for common
weaknesses
• Student will be able to identify misconfigurations and weaknesses in
DNS
• Student will conduct vulnerability analysis against and exploit a DNS
server
• Student will understand and perform DDoS attacks using DNS
Objective
• Student will be able to assess e-mail technology for common
weaknesses
• Student will be able to identify misconfigurations and weaknesses in e-
mail
• Student will understand and perform attacks against e-mail
infrastructure
• Student will compromise an email server
Objective
• Student will be able to assess web server technology for common
weaknesses
• Student will be able to identify misconfigurations and weaknesses in web
servers
• Student will understand and perform attacks against web infrastructure
• Student will compromise a web server and perform privilege escalation
activities
Objective
• Student will breach a VPN environment through common attacks
• Student will explore secondary stage authentication attacks
• Student will demonstrate proficiency in performing analysis of VPN
technology
Objective
• Student will be able to probe internal servers for common weaknesses
• Student will leverage weaknesses in file servers for unauthorised access
• Student will be able to probe and identify technology in use for file
sharing
• Student will demonstrate an understanding of file permission attacks
• Student will be able to use privilege escalation attacks against file
servers
Objective
• Student will compromise a UNIX server through misconfigured services
• Student will gain a detailed understanding of targeting RPC and
associated services
[9] Databases
Description
This module deals with database servers and database technologies. We will
demonstrate common attack methodologies against a range of different
database environments, ranging from MySQL & Postgres to NoSQL services. We
will review common misconfigurations that can be misused by attackers to gain
elevated positions within database servers. We teach the core concepts of how to
breach a database server for the purpose of extracting information and accessing
network resources.
Objective
• Student will be able to identify insecure databases and configurations
• Student will be able to extract sensitive information from databases
• Student will be able to exploit and target database servers
• Student will be able to abuse database configurations for privilege
escalation attacks
Objective
• Student will be able to conduct a basic web application assessment
• Student will be able to identify common OWASP top 10 vulnerabilities
• Student will be able to leverage vulnerabilities to access data and
network resources
Objective
• Student will demonstrate how to compromise Windows servers
• Identification of vulnerabilities in common Windows enterprise
technologies
• Perform basic lateral movement and privilege escalation attacks on
Windows servers
• Audit Windows servers for common attack weaknesses
Objective
• Identify hashing and encryption algorithms
• Extract password hashes from common locations
• Use appropriate tools to target and recover plain-text passwords
• Perform password complexity analysis
Additional Information
Exam & Certificate
Hacker House provides a formal examination through the quiz centre. At the end
of the course a certificate is presented to students who demonstrate sufficient
competency of the course material. Taking the course does not guarantee a
certificate and you may not be presented with a certificate if you are unable to
demonstrate successful understanding of practical or theory components. Most
students who take our course are able to demonstrate such understanding and
providing you have read the pre-requisites this should not be a concern.
There are a number of websites and resources online which can help students
learn Linux fundamentals. Our tutors recommend that you should install Linux
and use it as your daily computer for a few weeks to easily grasp the basics. Here
are some of our favourite Linux distributions for beginners and general hacking
use:
We look forward to seeing you at one of our course events soon! If you have any
questions or would like further information then contact the team through our
website https://hacker.house. Happy Hacking!