Introduction to Ethical Hacking. Footprinting and Reconnaissance
  • Introduction
  • Introduction to Ethical Hacking. Footprinting and Reconnaissance
  • Join Our Online Classroom!
  • Demo - Information Gathering using Google Dorks and DNS Queris
  • Demo - Scanning and Enumeration
  • Do it yourself - Information Gathering Exercise
Scanning Networks, Enumeration and Discovering Vulnearbilities
  • Scanning and enumeration
  • Vulnerabilties Identification
  • Demo - Installing Nessus Scanner
  • Demo - Use Nessus to Discover Vulnerabilities
  • Demo - Using Nikto to discover Web Vulnerabilities
  • Demo - Using Paros for Vulnerability Discovery
  • Demo - Use Dirbuster to brute force sub-directories and filenames
  • Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
System Hacking and Vulnerability Exploitation
  • System hacking - vulnerability exploitation
  • Passwords
  • Authentication
Basics of Sniffing
  • Sniffing
Metasploit
  • Metasploit
  • Demo - Exploiting FTP Server Vulnerability using Metasploit
  • Demo - Post Exploitation Example
  • Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC
  • Demo - Eploiting Samba Service on Linux using Metasploit
  • Demo - Windows backdoor using Metasploit
  • Do it yourself - Vulnerability Exploitation using Metasploit Exercise
Trojans, Backdoors, Viruses and Worms
  • Trojans and Backdoors
  • Computer viruses and worms
Cryptography
  • Cryptography concepts
  • Cryptographic Algorithms
  • Cryptography and cryptanalysis tools. Cryptography attacks
  • Demo - Hack SSH passwords using Medusa
  • Hack the SSH Password using Hydra
  • Hack Linux Passwords using John the Ripper
  • Do it yourself - Passwords Protection Exercise
Penetration Testing on Wireless Networks
  • Penetration Testing on Wireless Networks
  • Do it yourself - WiFi Networks Security - practical approach
  • Case Study – Windows Hosted Network Bug or Feature
Penetration Testing Overview. Final words
  • Penetration Testing Overview. Final Words
  • Bonus - OWASP Top 10 Vulnerabilities
(Bonus) Attacking the users trough websites - XSS and Beef-XSS
  • Introduction to Cross-Site Scripting and Beef-XSS
  • XSS example - reflected
  • XSS example - stored
  • Beef-XSS Demo
  • Further information