Sunday, August 29, 2010

Ethical Hacking and Penentration Testing

Ethical Hacking and Penentration Testing


Introduction Course Overview (04:54)

Ethical Hacking & Penetration Testing What is Ethical Hacking? (04:58)

Types of Ethical Hacking (05:31)

Responsibilities of the Ethical Hacker (03:12)

Customer Expectations (04:04)

Skills of the Hacker (04:16)

Relevant Laws (04:54)

Preparation (04:46)

Types of Attacks (02:12)

Methodology Overview Your Goals (02:34)

Reconnaissance [passive, active] (05:11) Scanning (03:42)

Service Enumeration (03:05) Vulnerability Assessment (03:35)

Vulnerability Exploitation (02:52) Penetration & Access (03:24)

Privilege Escalation & Owning the Box (02:40) Evading Defenses & Erasing Tracks (04:01)

Maintaining & Expanding Access (03:22) Reconnaissance (Footprinting) Passive Reconnaissance (05:03)

Using WHOIS & Other Tools (03:03) Active Reconnaissance (04:10)

Active Reconnaissance Tools & Methods (04:55) Putting It All Together (03:09)

Reconnaissance Demo (07:04) Scanning Scanning For Hosts (02:20)

TCP Connection Basics (04:14) TCP Scan Types (07:18) UDP & ICMP Scanning (03:44)

Scanning Demonstration using NMAP (05:19)

Port & Service Enumeration Identifying Ports & Services (03:06) OS Fingerprinting (02:57)

Popular Scanners (01:54) Demonstration (05:15) Data Enumeration Data Enumeration (05:12)

SNMP Enumeration (07:14) DNS Zone Transfers (06:36) Windows Null Sessions (05:03)

NetBIOS Enumeration (06:44) Active Directory Extraction (03:02) Vulnerability Assessment Vulnerabilities & Exploits (06:07)

OS Vulnerabilities (05:59) Web Server Vulnerabilities (06:54) Database Vulnerabilities (05:25) TCP Stack Vulnerabilities (04:13) Application Vulnerabilities (03:05) Vulnerability Assesment (07:21) Penetration/Access/Compromise Pt.1 Penetrating the System Pt.1 (05:28) Penetrating the System Pt.2 (03:11) Bypassing Access Controls (06:34)

Password Cracking Pt.1 (04:58) Password Cracking Pt.2 (03:52)

Social Engineering (06:28) Penetration/Access/Compromise Pt.2 Session Hijacking Pt.1 (05:46)

Session Hijacking Pt.2 (04:01) Privilege Escalation (04:45)

Maintaining & Expanding Access (07:01) System Compromise (04:40)

Evading Defenses & Erasing Tracks Where Your Actions Recorded Pt.1 (02:04) Where Your Actions Recorded Pt.2 (06:50) Deleting Log Files & Other Evidence Pt.1 (03:16) Deleting Log Files & Other Evidence Pt.2 (04:26)

Rootkits (05:21) Steganography (06:58) Evading IDS & Firewalls (04:29) Introduction to Hacking Techniques Pt.1 Encryption (06:07) Sniffers (04:15) Wireless hacking (06:29) SQL Injection (04:18)

Introduction to Hacking Techniques Pt.2 Buffer Overflows (05:19) Rootkits (03:52)

Spoofing (04:33) Denial of Service Attacks (03:59) Web Hacking (07:00)

Popular Tools nmap Pt.1 (06:38) nmap Pt.2 (02:14) SuperScan (04:30)

Nessus (06:27) Penetration Test Demo Penetration Test Demo Pt.1 (01:41)

Penetration Test Demo Pt.2 (00:59) Penetration Test Demo Pt.3 (01:05) Credits About the Authors (01:37)
 

1 comment: