Ethical Hacking Modules
Ethical Hacking Modules
Chapter 2 – Networking
What is a Network?
Network Topologies
Networking Devices and Cables
Concept of Ports and Services
ISO - OSI Model
TCP/IP Protocol Suite
Client Server Relationship
IP Address
Anatomy of IP Addresses
Networking Protocols
ARP
RARP
ICMP
FTP
Telnet
SMTP
SNMP
HTTP
POP
Virtualization
Introduction to virtualization
Advantages of Virtualization
Virtual Box
Vmware Worksation
Linux
Introduction
Installation
Basic Linux Commands
Installing Linux application
Chapter 3 – Footprinting/Reconnaissance
Footprinting/Information Gathering
Types of Footprinting
Active
Passive
Informaion Gathering Principle
Steps to Information Gathering
Who.is and Domain Registry
Gathering Target Information
Search for People and their Information
Search for Company’s Information
Footprinting Through Search Engines
Tracking Target Location
Information gathering using social media
Parallel Domain
MX Entry
Trace Route
Archive Pages
Crawling and Mirroring of Websites
Banner Grabbing
Prevention Techniques
Introduction to Google
Working of Google – Outline
Working of Google – Crawling, Indexing & Searching
Using Cache and Google as Proxy
Directory Listing and Locating Directory Listings along with specific folders
Google Hacking and what it is about
The basics of Google Hacking: Advanced Search in Google
Advance Search Operators: site:, filetype:, inurl:, intitle:, cache:, info:
Wildcard and Quotes
Understanding and Viewing Robots.txt for important Files
Prevention Techniques
Robot.txt
Metatag and Google Official Remove
Hiding Detailed Error Messages
Disabling Directory Browsing
Tools
Wikto
GoogleHacks
Module 5: Scanning
Definition of Scanning
Types of Scanning
Difference between Port and Network Scanning
Objectives and Benefits of Scanning
TCP three way hands shake
Classification of Scanning
Fragments, UDP, ICMP, Reverse Ident, List & Idle, RPC, Window Scan, Ping Sweep
Concept of War Dialer (History)
OS Finger Printing and Types – Active & Passive
Concealing file extensions
Annonomizers
Scanning Tools
T1Shopper.com
Yougetsignal
Advanced Port Scanner v1.3 (Radmin – Advanced Port Scanner)
Watsup Port Scanner
NetScanner
Mi-Tec Network Scanner
System Hacking
Introduction to System Hacking
System Hacking Techniques
Steps to Crack Passwords
Password Attack Classification – Dictionary, Brute Force and Hybrid
LM Hash and Sam File
Password Recovery through Elcomsoft
SysKey
Hiding Files
Ophcrack
Hiren Boot
NTFS Stream Countermeasures
Password Cracking Countermeasures
Concept of Auditing, Logs, Covering Tracks
Concept of Application Isolation
Linux Hacking
Why Linux is hacked?
Recent Linux Vulnerabilities
Password cracking in Linux
Introduction and explanation of IP Tables & IP Chains
TCP wrappers
Remote connection using SSH
Log and Traffic Monitors in Linux
Understanding Post Install Linux Security Auditing
Understanding and using Backtrack
Keylogger
Categorization of Keystroke Loggers
Acoustic/CAM Keyloggers
Advanced Keylogger
Keylogger: Spytech SpyAgent
Keylogger: Perfect Keylogger
Keylogger: Powered Keylogger
Hardware Keylogger: KeyGhost
Rootkits
Types of Rootkits
Rootkit Working Mechanism
Rootkit: Fu
Steps to detect Rootkits
Shielding from Rootkit Attacks
Anti Rootkit Tools: Rootkit Revealer and McAfee Rootkit Revealer
Cover Tracks
What are Covering Tracks?
Techniques to clear Tracks
Covering Track Tools
Android Security
Introduction to Android Security
Android Malwares
Securing Your Android - Techniques
APK file package
Investigating layout, manifest, permissions and binaries
Analyzing file system access
Investigating database & storage usage
Memory analysis
Memory dumps
Patching & Binary modifications
Traffic Manipulation
Traffic interception
Using proxies
Exposing insecure traffic
iPhone Security
iOS Security Basics
iOS Hardware/Dev ice Types
Understanding the iOS Security Architecture
The Reduced Attack Surface
The Stripped-Down iOS
Privilege Separation
Code Signing
Data Execution Prevention
AddressSpace Layout Randomization
Sandboxing
History of iOS Attack
o Libtiff
o Fun with SMS
o Ilkee Worm
o Jailbreakme
5 iOS Configuration Management
Module 8: Malwares
1. Trojans
Introduction to Trojans
What is Trojan?
Identifying Overt & Covert Channels
Types of Trojans
Working of Trojans
Purpose of Trojan inventor
Detecting Trojan Attacks
Ports used by Trojans
Types of Trojans
Trojan Types
Remote Access Trojans
Beast - Demo
Remote Access Trojan: RAT DarkComet
Trojan Detection
Trojan Detection
Suspicious Port Detection
Suspicious Process Scanning
Process Monitoring Tools
Examining the Registry Entries
Windows Startup Registry Entries
Startup Programs Monitoring Tools
Suspicious Files and Folders Detection
Reliability Check of Files & Folder
Network Activity Detection
Backdoors
What is Backdoor?
Backdoor Installation Process
System Control through backdoor
Prevention Techniques
Protection from Trojan Attacks
Protection from Backdoor Attacks
2. Virus
Introduction to Virus
Working of Viruses: Infection Phase
Working of Viruses: Attack Phase
Purpose of Computer Viruses
Computer infection by Viruses
Signs of Virus Attack
Virus Hoaxes
Virus Analysis
Types of Virus
Characteristics, Symptoms of Viruses
System or Boot Sector Viruses
Life Cycle of Viruses
Famous Virus Program
Virus Detection Method
Countermeasures
3. Worms
Computer Worms
Difference between Worm & Virus
Worm Analysis
4. Spyware
Spyware: Introduction
What does a Spyware do?
Types of Spywares
Routes of Infection
Internet and E-mail Spyware
Effects & Behaviors
Difference between Spyware and Adware
5. Prevention Methods
Anti-Spyware Program
Anti-Virus Program
Defense against Worms
Sniffing Concepts
Sniffing Threats in Network
Working of Sniffers
Types of Sniffing
Active Sniffing
Passive Sniffing
Spoofing Attack
IP Spoofing
MAC Spoofing
MAC Spoofing Impact
MAC Spoofing Tool
Prevention measures form MAC Spoofing
DNS Poisoning
DNS Poisoning Methodologies
Intranet DNS Spoofing
DNS Cache Poisoning
Prevention measures from DNS Spoofing
Prevention Methods
Browser protection
Methodologies to prevent Session Hijacking
IPSec
Modes of IPSec
Architecture of IPSec
IPSec Authentication and Confidentiality
IPSec Components and Implementation
Vulnerability Assessment
Concept of Vulnerability Assessment
Purpose Types of Assessment
Vulnerability Classification
How to Conduct Vulnerability Assessment
Vulnerability Analysis Stages
Vulnerability Assessment Considerations
Vulnerability Assessment Reports
TimeLine and Penetration Attempts
Vulnerability Assessment Tools
1. Exploit Writing
Concept of Exploit Writing
Purpose of Exploit Writing
Requirements of Exploits Writing & Shell codes
Types of Exploits:-
Stack Overflow Exploits
Heap Corruption Exploit
Format String Attack
Integer Bug Exploits
Race Condition
TCP/IP Attack
The Proof-of-Concept and Commercial Grade Exploit
Converting a Proof of Concept Exploit to Commercial Grade Exploit
Attack Methodologies
Socket Binding Exploits
Steps for Writing an Exploit
Shellcodes
Null Byte
Types of Shellcode
Steps for Writing a ShellCode
Issues Involved With Shellcode Writing
Buffer
Static Vs Dynamic Variables
Stack Buffers, Data Region and Memory Process Regions
About the Stack
Need of Stack, Stack Region, Stack frame, Stack pointer, Procedure Call (Procedure
Prolog) , Return Address (RET), Word Size and Buffer Overflows,
Why do we get a segmentation violation and Segmentation Error
Writing Windows Based Exploits
EIP Register and ESP
Metasploit Framework, msfconsole
Development with Metasploit
Need for Creating of Exploit
Determining the Attack Vector
Debugger
Determine the offset & pattern create
Where to place the payload?
2. Buffer Overflow
Why Applications are vulnerable
Buffer Overflow Attack
Reasons of Buffer Overflow
Knowledge for Buffer Overflow
Understanding Stacks
Understanding Heaps
Types of Buffer Overflow Attack
Stack Based
Heap Based
Heap Memory Buffer overflow Bug
Understanding Assembly Language
Intro of Shell Code
Detection of Buffer Overflows in a program
Attacking a Real Program
Once the Stack is smashed
NOPS
Mutate a Buffer Overflow Exploit
Comparing Functions of libc and libsafe
1. Cryptography
Concept of Cryptography
Advantages and uses of Cryptography
PKI (Public Key Infrastructure)
Algorithm’s of encryption – RSA, MD5, SHA, SSL, PGP, SSH, GAK
Concept of Digital Signature
Encryption Cracking Techniques
Disk Encryption
Cracking S/MIME encryption using idle CPU time
Concept of Command Line Scriptor and Crypto Heaven, Cyphercalc
CA (Certificate Authority)
2.Steganography
What is Steganography?
History
Steganography today
Steganography tools
Steganalysis
What is Steganalysis?
Types of analysis
Identification of Steganographic files
Steganalysis meets Cryptanalysis
Password Guessing
Cracking Steganography programs
Conclusions
What’s in the Future?
Other tools in the wild
1. Firewall
What Does a Firewall Do?
What a firewall cannot do
How does a firewall work?
Types of Firewall
Working of Firewall
Advantages and Disadvantages of Firewall
Firewalls Implementing for Authentication Process
Types of Authentication Process
Steps for Conducting Firewall Penetration Testing
Locate the Firewall
Traceroute to identify the network range
Port scan the router
Grab the banner
Create custom packet and look for firewall responses
Test access control Enumeration
Test to indentify firewall architecture
Test firewall using firewalking tool
Test for port redirection
Test Convert channels
Test HTTP Tunneling
Test firewall specific vulnerabilities
How to Bypassing the Firewall
2. Honeypots
Concept of Honeypots
Purpose and working of Honeypots
Advantages and Disadvantages of Honeypots
Types of Honeypots
Uses of Honeypots
Detecting Honeypot
Honeynets
Architecture of Honeynet
Working process of Honeynet
Types of Honeynet
Honeywall CDROM
1. Web Servers
Working process of Web Server
Loopholes of Web Server
Introduction of Popular Web Server and Common Security Threats
Apache Vulnerability
Attacks against IIS
Components of IIS
IIS Directory Traversal
Unicode and Unicode Directory Traversal Vulnerability
Unspecified Executable Path Vulnerability
File System Traversal Counter measures
WebDAV / ntdlldll Vulnerability
RPC DCOM Vulnerability
ASN Exploits
IIS Logs
Escalating Privileges on IIS
Hot Fixes and Patches
Countermeasures of Web Server
Wireless Technology
Introduction to wireless networking
Basics & Terminologies
Advantages of Wireless Technology
Components of Wireless Network
Types of Wireless Network
Setting and detecting a wireless network
Advantages and Disadvantages of wireless network
Antennas, SSID, Access Point Positioning and Rogue Access Point
Concept of Wired Equivalent Privacy (WEP)
MAC Sniffing & AP Spoofing
Terminology of Wi-Fi Access
Denial-of-Service and MITM Attack in Wi-Fi
Wireless Intrusion Detection System
Tips to Secure Wireless Network
Physical Security
Current Statistics
Accountability and Need of Physical security
Factors Affecting Physical Security
Physical Security Checklist
Company Surroundings
Premises
Reception
Server
Workstation Area
Wireless Access Points
Other Equipments such as fax, removable media etc
Access Control
Computer Equipment Maintenance
Wiretapping
Remote Access
Locks
Spyware
Concept of Email
Spam and Spam Laws
E-Mail Tracking By Header
Concept of Fake E-mails
Various steps to send Fake mails
Trace ip by PHP Script
o Understanding Incidents
o Exploring the incident paradigm: classifications and meaning
o Incidents: Types and functionality
o Controlling Incidents
o Incident Response: A Brief Overview
o Incident Response: structural design
o Incident Handling
o Computer Security Incident Response Team (CSIRT)?