Search this site
Embedded Files
Skip to main content
Skip to navigation
LAB
LAB
Ethical Hacking
01 - Introduction to System Security
02 - Footprinting and Reconnaissance
I. Network Route Trace Using Path Analyzer Pro
II. Mirroring Websites Using the HTTrack Web Site Copier Tool
III. Extracting a Company’s Data Using Web Data Extractor
03 - Scanning Networks
I. Scanning System and Network Resources Using Advanced IP Scanner
04 - Enumeration
I. Enumerating NetBIOS Using the SuperScan Tool
05 - System Hacking
I. Extracting Administrator Passwords Using LCP
06 - Trojans and Backdoors
I. Creating a Server Using the ProRat Tool
07 - Viruses and Worms
I. Creating a Virus Using the JPS Virus Maker Tool
II. Virus Analysis Using IDA Pro
III. Virus Analysis Using OllyDbg
IV. Scan for Viruses using Kaspersky Antivirus
V. Creating a Worm Using Internet Worm Maker Thing
08 - Sniffing
I. Sniffing the Network Using the OmniPeek Network Analyzer
II. Spoofing MAC Address Using SMAC
III. Sniffing a Network Using the WinArpAttacker Tool
IV. Sniffing Passwords Using Wireshark
V. Performing Man-in-the-Middle Attack Using Cain & Abel
VI. Detecting ARP Attacks with the XArp Tool
VII. Detecting Systems in Promiscuous Mode in a Network Using PromqryUI
VIII. Sniffing Password from Captured Packets using Sniff – O – Matic
09 - Social Engineering
I. Social Engineering Penetration Testing using Social Engineering Toolkit
10 - Denial of Service
I. SYN Flooding a Target Host Using hping3
11 - Session Hijacking
I. SYN Flooding a Target Host Using hping3
12 - Hijacking Webservers
I. Footprinting Web server Using the httprecon Tool
II. Footprinting a Web server Using ID Serve
13 - Hacking Web Applications
I. Hacking Web Applications
II. Website Vulnerability Scanning Using Acunetix WVS
14 - SQL Injection
I. SQL Injection Attacks on MS SQL Database
II. Testing for SQL Injection Using IBM Security AppScan Tool
III. Testing for SQL Injection Using N-Stalker Tool
15 - Hacking Wireless Networks
I. Cracking a WEP Network with Aircrack-ng for Windows
II. Sniffing the Network Using the OmniPeek Network Analyzer
16 - Hacking Mobile Platforms
17 - Evading IDS, Firewalls, and Honeypots
I. Detecting Intrusions using Snort
II. Detecting Intruders and Worms Using KFSensor Honeypot IDS
18 - Buffer Overflow
I. Buffer Overflow Example
19 - Cryptography
20 - Penetration Testing
Cyber Security
Operations Security
Telecommunications & Network Security
Business Continuity and Disaster Recovery Planning
Crittography
Information Security Governance and Risk Management
Security Architecture and Design
Access Control
Physical Security
Software Development Security
Legal, Regulations, Investigations and Compliance
LAB
Business Continuity and Disaster Recovery Planning
C. Business Continuity and Disaster Recovery Planning.pptx
Report abuse
Report abuse