a

Saturday 14 May 2011

Share CD hacker


1. Hacking, Penetration Testing, and Countermeasure training. 17 CD.


Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security

Module 1
Ethical Hacking and Penetration Testing
Security 101
Hacking Hall of Fame
What are Today's hackers Like?
Today's Hackers
Risk Management
Evolution of Threats
Typical Vulnerability Life Cycle
What is Ethical Hacking?
Rise of the Ethical Hacker
Types of Security Test
Penetration Test (Pen-test)
Red Teams
Testing Methodology
VMWare Workstation
Windows and Linux Running VMWare
Linux Is a Must
Linux Survival Skills
Useful vi Editor Commands
Module 1 Review
Module 2
Footprinting and Reconnaissance
Desired Information
Find Information by the Target (Edgar)
terraserver.micr*soft.com
Network Reconnaissance & DNS Search
Query Whois Databases
Command-Line Whois Searches
ARIN whois: Search IP Address Blocks
SamSpade Tool and Website
Internet Presence
Look Through Source Code
Mirror Website
Find Specific Types of Systems
Big Brother
AltaVista
Specific Data Being Available?
Anonymizers
Countermeasures to Information Leakage
Social Engineering
DNS Zone Transfer
Nslookup command-line utility
Zone Transfer from Linux
Automated Zone Transfers
Zone Transfer Countermeasures
<!-- w -->http://www.CheckDNS.net<!-- m -->)
Tracing Out a Network Path
tracert Output
Free Tools
Paratrace
War Dialing for Hanging Modems
Manual and Automated War Dialing
Case Study
<!-- w -->http://www.guidedogs.com<!-- m -->)
Footprinting Countermeasures
Demo - Footprinting & Info Gathering
Module 2 Review
Module 3
TCP/IP Basics and Scanning
The OSI Model
TCP/IP Protocol Suite Layers
Encapsulation
Data-Link Protocols
IP - Internet Protocol, Datagram (Packet)
ICMP Packets
UDP � User Datagram Protocol
UDP Datagram
TCP � Transmission Control Protocol
TCP Segment
TCP/IP 3-Way Handshake and Flags
TCP and UDP Ports
Ping Sweeps
Good Old Ping, Nmap, TCP Ping Sweep
TCP Sweep Traffic Captured
Unix Pinging Utilities
Default TTLs
Pinging Countermeasures
Port Scanning
Nmap
Advanced Probing Techniques
Scanrand
Port Probing Countermeasures
Watch Your Own Ports
Demo - Scanning Tools
Module 3 Review
Module 4
Enumeration and Verification
Operating System Identification
Differences Between OS TCP/IP Stack
Nmap -O
Active vs Passive Fingerprinting
Xprobe/Xprobe2
Countermeasures
SNMP Overview
SNMP Enumeration
SMTP, Finger, and E-mail Aliases
Gleaning Information from SMTP
SMTP E-mail Alias Enumeration
SMTP Enumeration Countermeasures
CIFS/SMB
Attack Methodology
Find Domains and Computers
NetBIOS Data
NBTscan
NULL Session
Local and Domain Users
Find Shares with net view
enum: the All-in-one
Winfo and NTInfoScan (ntis.exe)
Digging in the Registry
NetBIOS Attack Summary
NetBIOS Countermeasures
What�s this SID Thing Anyway?
Common SIDs and RIDs
whoami
RestrictAnonymous
USER2SID/SID2USER
psgetsid.exe and UserDump Tool
LDAP and Active Directory
GUI Tools to Perform the Same Actions
Demo - Enumeration
Module 4 Review
Module 5
Hacking & Defending Wireless/Modems
Phone Numbers & Modem Background
Phone Reconnaissance
Modem Attacks
Wireless Reconnaissance
Wireless Background
Wireless Reconnaissance Continued
Wireless Sniffing
kracking WEP Keys
Defending Wireless
Module 5 Review
Module 6
Hacking & Defending Web Servers
Web Servers in General: HTTP
Uniform Resource Locator: URL
Apache Web Server Functionality
Apache: Attacking Mis-configurations
Apache: Attacking Known Vulnerabilities
Defending Apache Web Server
micr*soft Internet Information Server (IIS)
IIS: Security Features
IIS: Attacking General Problems
IIS: IUSER or IWAM Level Access
IIS: Administrator or Sys Level Access
IIS: Clearing IIS Logs
IIS: Defending and Countermeasures
Web Server Vulnerability Scanners
Demo - Hacking Web Servers
Module 6 Review
Module 7
Hacking & Defending Web Applications
Background on Web Threat & Design
Basic Infrastructure Information
Information Leaks on Web Pages
Hacking over SSL
Use the Source, Luke�
Functional/Logic Testing
Attacking Authentication
Attacking Authorization
Debug Proxies: @stake webproxy
Input Validation Attacks
Attacking Session State
Attacking Web Clients
Cross-Site Scripting (XSS) Threats
Defending Web Applications
Module 7 Review
Module 8
Sniffers and Session Hijacking
Sniffers
Why Are Sniffers so Dangerous?
Collision & Broadcast Domains
VLANs and Layer-3 Segmentation
tcpdump & WinDump
Berkley Packet Filter (BPF)
Libpcap & WinPcap
BUTTSniffing Tool and dSniff
Ethereal
Mitigation of Sniffer Attacks
Antisniff
ARP Poisoning
MAC Flooding
DNS and IP Spoofing
Session Hijacking
Sequence Numbers
Hunt
Ettercap
Source Routing
Hijack Countermeasures
Demo - Sniffers
Module 8 Review
Module 9
Hacking & Defending Windows Systems
Physical Attacks
LANMan Hashes and Weaknesses
WinNT Hash and Weaknesses
Look for Guest, Temp, Joe Accounts
Direct Password Attacks
Before You krack: Enum Tool
Finding More Account Information
kracking Passwords
Grabbing the SAM
krack the Obtained SAM
LSA Secrets and Trusts
Using the Newly Guessed Password
Bruteforcing Other Services


CD1.Ethical.Hacking.and.Penetration
<!-- m -->http://rapidshare.com/files/31155161/Mo ... part01.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31155163/Mo ... part02.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31155164/Mo ... part03.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31171269/Mo ... part04.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31171270/Mo ... part05.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31171271/Mo ... part06.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31190434/Mo ... part07.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/31190436/Mo ... part08.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/2416395...e_1.part09.rar
<!-- m -->http://rapidshare.com/files/2416395...e_1.part10.rar

CD2 Footprinting and Reconnaissance
<!-- m -->http://rapidshare.com/files/24168655/Mo ... part01.rar<!-- m -->
<!-- m -->http://rapishare.com/files/24168656/Mo ... part02.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24168657/Mo ... part03.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24168658/Mo ... part04.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24174114/Mo ... part05.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24174115/Mo ... part06.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24310589/Mo ... part07.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24310590/Mo ... part08.rar<!-- m -->



CD3 TCP/IP Basics and Scanning
<!-- m -->http://rapidshare.com/files/24321107/mod.3.part1.rar<!-- m -->
<!-- m -->http://rapidshare.com/files/24321109/mod.3.part2.rar<!-- m -->

No comments:

Post a Comment