Anonymous Hackers Academy - Courses

CEH Training program:

  1. Internet Crime Current Report: IC3
  2. Data Breach Investigations Report
  3. Types of Data Stolen From the Organizations
  4. Essential Terminologies
  5. Elements of Information Security
  6. Authenticity and Non-Repudiation
  7. The Security, Functionality, and Usability Triangle
  8. Security Challenges
  9. Effects of Hacking
  10. Effects of Hacking on Business
  11. Who is a Hacker?
  12. Hacker Classes
  13. What Does a Hacker Do?
  14. Reconnaissance
  15. Scanning
  16. Gaining Access
  17. Maintaining Access
  18. Types of Attacks on a System
  19. Operating System Attacks
  20. Application-Level Attacks
  21. Shrink Wrap Code Attacks
  22. Misconfiguration Attacks
  23. Why Ethical Hacking is Necessary?
  24. Defense in Depth
  25. Scope and Limitations of Ethical Hacking
  26. What Do Ethical Hackers Do?
  27. Skills of an Ethical Hacker
  28. Vulnerability Research
  29. Vulnerability Research Websites
  30. What is Penetration Testing?
  1. What is Footprinting?
  2. Objectives of Footprinting
  3. Footprinting Threats
  4. Finding a Company’s URL
  5. Locate Internal URLs
  6. Public and Restricted Websites
  7. Search for Company’s Information
  8. Tools to Extract Company’s Data
  9. Footprinting Through Search Engines
  10. Collect Location Information
  11. Satellite Picture of a Residence
  12. People Search
  13. People Search Using http://pipl.com
  14. People Search Online Services
  15. People Search on Social Networking Services
  16. Gather Information from Financial Services
  17. Footprinting Through Job Sites
  18. Monitoring Target Using Alerts
  19. Competitive Intelligence Gathering
  20. Competitive Intelligence Tools
  21. Competitive Intelligence Consulting Companies WHOIS Lookup
  22. WHOIS Lookup Result Analysis
  23. WHOIS Lookup Tools: SmartWhois
  24. WHOIS Lookup Tools
  25. WHOIS Lookup Online Tools
  26. Extracting DNS Information
  27. DNS Interrogation Tools
  28. DNS Interrogation Online Tools
  29. Locate the Network Range
  30. Traceroute
  31. Traceroute Analysis
  32. Traceroute Tool: 3D Traceroute
  33. Traceroute Tool: LoriotPro
  34. Traceroute Tool: Path Analyzer Pro
  35. Traceroute Tools
  36. Mirroring Entire Website
  37. Website Mirroring Tools
  38. Mirroring Entire Website Tools
  39. Extract Website Information from http://www.archive.org
  40. Monitoring Web Updates Using Website Watcher
  41. Tracking Email Communications
  42. Email Tracking Tools
  43. Footprint Using Google Hacking Techniques
  44. What a Hacker Can Do With Google Hacking?
  45. Google Advance Search Operators
  46. Finding Resources using Google Advance Operator
  47. Google Hacking Tool: Google Hacking Database (GHDB)
  48. Google Hacking Tools
  49. Additional Footprinting Tools
  50. Footprinting Countermeasures
  51. Footprinting Pen Testing
  1. Network Scanning
  2. Types of Scanning
  3. Checking for Live Systems – ICMP Scanning
  4. Ping Sweep
  5. Ping Sweep Tools
  6. Three-Way Handshake
  7. TCP Communication Flags
  8. Create Custom Packet using TCP Flags
  9. Hping2 / Hping3
  10. Hping Commands
  11. Scanning Techniques
  12. TCP Connect / Full Open Scan
  13. Stealth Scan (Half-open Scan)
  14. Xmas Scan
  15. FIN Scan
  16. NULL Scan
  17. IDLE Scan
  18. IDLE Scan: Step 1
  19. IDLE Scan: Step 2.1 (Open Port)
  20. IDLE Scan: Step 2.2 (Closed Port)
  21. IDLE Scan: Step 3
  22. ICMP Echo Scanning/List Scan
  23. SYN/FIN Scanning Using IP Fragments
  24. UDP Scanning
  25. Inverse TCP Flag Scanning
  26. ACK Flag Scanning
  27. Scanning: IDS Evasion Techniques
  28. IP Fragmentation Tools
  29. Scanning Tool: Nmap
  30. Scanning Tool: NetScan Tools Pro
  31. Scanning Tools
  32. Scanning Countermeasures
  33. War Dialing
  34. Why War Dialing?
  35. War Dialing Tools
  36. War Dialing Countermeasures
  37. War Dialing Countermeasures: SandTrap Tool
  38. OS Fingerprinting
  39. Active Banner Grabbing Using Telnet
  40. Banner Grabbing Tool: ID Serve
  41. GET REQUESTS
  42. Banner Grabbing Tool: Netcraft
  43. Banner Grabbing Tools
  44. Hiding File Extensions
  45. Hiding File Extensions from Webpages
  46. Vulnerability Scanning Tool: Nessus
  47. Vulnerability Scanning Tool: SAINT
  48. Vulnerability Scanning Tool: GFI LANGuard
  49. Network Vulnerability Scanners
  50. LANsurveyor
  51. Network Mappers
  52. Proxy Servers
  53. Why Attackers Use Proxy Servers?
  54. Use of Proxies for Attack
  55. How Does MultiProxy Work?
  56. Free Proxy Servers
  57. Proxy Workbench
  58. Proxifier Tool: Create Chain of Proxy Servers
  59. SocksChain
  60. TOR (The Onion Routing)
  61. TOR Proxy Chaining Software
  62. HTTP Tunneling Techniques
  63. Why do I Need HTTP Tunneling?
  64. Super Network Tunnel Tool
  65. Httptunnel for Windows
  66. Additional HTTP Tunneling Tools
  67. SSH Tunneling
  68. SSL Proxy Tool
  69. How to Run SSL Proxy?
  70. Proxy Tools
  71. Anonymizers
  72. Types of Anonymizers
  73. Text Conversion to Avoid Filters
  74. How Psiphon Works?
  75. How to Check if Your Website is Blocked in China or Not?
  76. G-Zapper
  77. Anonymizer Tools
  78. Spoofing IP Address
  79. IP Spoofing Detection Techniques: Direct TTL Probes
  80. IP Spoofing Detection Techniques: IP Identification Number
  81. IP Spoofing Detection Techniques: TCP Flow Control Method
  82. IP Spoofing Countermeasures
  83. Scanning Pen Testing
  1. Identity thief on email accounts
  2. Techniques for Enumeration
  3. Netbios Enumeration
  4. NetBIOS Enumeration Tool: SuperScan
  5. NetBIOS Enumeration Tool: NetBIOS Enumerator
  6. Enumerating User Accounts
  7. Enumerate Systems Using Default Passwords
  8. SNMP (Simple Network Management Protocol) Enumeration
  9. Management Information Base (MIB)
  10. SNMP Enumeration Tool: OpUtils Network Monitoring Toolset
  11. SNMP Enumeration Tool: SolarWinds
  12. SNMP Enumeration Tools
  13. UNIX/Linux Enumeration
  14. Linux Enumeration Tool: Enum4linux
  15. LDAP Enumeration
  16. LDAP Enumeration Tool: JXplorer
  17. LDAP Enumeration Tool
  18. NTP Enumeration
  19. NTP Server Discovery Tool: NTP Server Scanner
  20. NTP Server: PresenTense Time Server
  21. NTP Enumeration Tools
  22. SMTP Enumeration
  23. SMTP Enumeration Tool: NetScanTools Pro
  24. DNS Zone Transfer Enumeration Using nslookup
  25. DNS Analyzing and Enumeration Tool: The Men & Mice Suite
  26. Enumeration Countermeasures
  27. SMB Enumeration Countermeasures
  28. Enumeration Pen Testing
  1. Cracking passwords
  2. System Hacking: Goals
  3. CEH Hacking Methodology (CHM)
  4. Password Cracking
  5. Password Complexity
  6. Password Cracking Techniques
  7. Types of Password Attacks
  8. Passive Online Attacks: Wire Sniffing
  9. Password Sniffing
  10. Passive Online Attack: Man-in-the-Middle and Replay Attack
  11. Active Online Attack: Password Guessing
  12. Active Online Attack: Trojan/Spyware/Keylogger
  13. Active Online Attack: Hash Injection Attack
  14. Rainbow Attacks: Pre-Computed Hash
  15. Distributed Network Attack
  16. Elcomsoft Distributed Password Recovery
  17. Non-Electronic Attacks
  18. Default Passwords
  19. Manual Password Cracking (Guessing)
  20. Automatic Password Cracking Algorithm
  21. Stealing Passwords Using USB Drive
  22. Microsoft Authentication
  23. How Hash Passwords are Stored in Windows SAM?
  24. What is LAN Manager Hash?
  25. LM “Hash” Generation
  26. LM, NTLMv1, and NTLMv2
  27. NTLM Authentication Process
  28. Kerberos Authentication
  29. Salting
  30. L0phtCrack
  31. Ophcrack
  32. Cain & Abel
  33. RainbowCrack
  34. Password Cracking Tools
  35. LM Hash Backward Compatibility
  36. How to Disable LM HASH?
  37. How to Defend against Password Cracking?
  38. Implement and Enforce Strong Security Policy
  39. Privilege Escalation
  40. Escalation of Privileges
  41. Active@ Password Changer
  42. Privilege Escalation Tools
  43. How to Defend against Privilege Escalation?
  44. Executing Applications
  45. Alchemy Remote Executor
  46. RemoteExec
  47. Execute This!
  48. Keylogger
  49. Types of Keystroke Loggers
  50. Acoustic/CAM Keylogger
  51. Keylogger: Advanced Keylogger
  52. Keylogger: Spytech SpyAgent
  53. Keylogger: Perfect Keylogger
  54. Keylogger: Powered Keylogger
  55. eylogger for Mac: Aobo Mac OS X KeyLogger
  56. Keylogger for Mac: Perfect Keylogger for Mac
  57. Hardware Keylogger: KeyGhost
  58. Keyloggers
  59. Spyware
  60. What Does the Spyware Do?
  61. Types of Spywares
  62. Desktop Spyware
  63. Desktop Spyware: Activity Monitor
  64. Email and Internet Spyware
  65. Email and Internet Spyware: eBLASTER
  66. Internet and E-mail Spyware
  67. Child Monitoring Spyware
  68. Child Monitoring Spyware: Advanced Parental Control
  69. Screen Capturing Spyware
  70. Screen Capturing Spyware: Spector Pro
  71. USB Spyware
  72. USB Spyware: USBDumper
  73. Audio Spyware
  74. Video Spyware
  75. Video Spyware: Net Video Spy
  76. Print Spyware
  77. Print Spyware: Printer Activity Monitor
  78. Telephone/Cellphone Spyware
  79. Cellphone Spyware: Mobile Spy
  80. GPS Spyware
  81. GPS Spyware: GPS TrackMaker
  82. How to Defend against Keyloggers?
  83. Anti-Keylogger
  84. Anti-Keylogger: Zemana AntiLogger
  85. Anti-Keyloggers
  86. How to Defend against Spyware?
  87. Anti-Spyware: Spyware Doctor
  88. Rootkits
  89. Types of Rootkits
  90. How Rootkit Works?
  91. Rootkit: Fu
  92. Detecting Rootkits
  93. Steps for Detecting Rootkits
  94. How to Defend against Rootkits?
  95. Anti-Rootkit: RootkitRevealer and McAfee Rootkit Detective
  96. NTFS Data Stream
  97. How to Create NTFS Streams?
  98. NTFS Stream Manipulation
  99. How to Defend against NTFS Streams?
  100. NTFS Stream Detector: ADS Scan Engine
  101. NTFS Stream Detectors
  102. What is Steganography?
  103. Steganography Techniques
  104. How Steganography Works?
  105. Types of Steganography
  106. Whitespace Steganography Tool: SNOW
  107. Image Steganography
  108. Image Steganography: Hermetic Stego
  109. Image Steganography Tools
  110. Document Steganography: wbStego
  111. Document Steganography Tools
  112. Video Steganography: Our Secret
  113. Video Steganography Tools
  114. Audio Steganography: Mp3stegz
  115. Audio Steganography Tools
  116. Folder Steganography: Invisible Secrets 4
  117. Folder Steganography Tools
  118. Spam/Email Steganography: Spam Mimic
  119. Natural Text Steganography: Sams Big G Play Maker
  120. Steganalysis
  121. Steganalysis Methods/Attacks on Steganography
  122. Steganography Detection Tool: Stegdetect
  123. Steganography Detection Tools
  124. Why Cover Tracks?
  125. Covering Tracks
  126. Ways to Clear Online Tracks
  127. Disabling Auditing: Auditpol
  128. Covering Tracks Tool: Window Washer
  129. Covering Tracks Tool: Tracks Eraser Pro
  130. Track Covering Tools
  131. System Hacking Penetration Testing
  1. Spyware and keyloggers, trojan virus for pc and mobile
  2. Overt and Covert Channels
  3. Purpose of Trojans
  4. What Do Trojan Creators Look For?
  5. Indications of a Trojan Attack
  6. Common Ports used by Trojans
  7. How to Infect Systems Using a Trojan?
  8. Wrappers
  9. Wrapper Covert Programs
  10. Different Ways a Trojan can Get into a System
  11. How to Deploy a Trojan?
  12. Evading Anti-Virus Techniques
  13. Types of Trojans
  14. Command Shell Trojans
  15. Command Shell Trojan: Netcat
  16. GUI Trojan: MoSucker
  17. GUI Trojan: Jumper and Biodox
  18. Document Trojans
  19. E-mail Trojans
  20. E-mail Trojans: RemoteByMail
  21. Defacement Trojans
  22. Defacement Trojans: Restorator
  23. Botnet Trojans
  24. Botnet Trojan: Illusion Bot
  25. Botnet Trojan: NetBot Attacker
  26. Proxy Server Trojans
  27. Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r
  28. FTP Trojans
  29. FTP Trojan: TinyFTPD
  30. VNC Trojans
  31. HTTP/HTTPS Trojans
  32. HTTP Trojan: HTTP RAT
  33. Shttpd Trojan – HTTPS (SSL)
  34. ICMP Tunneling
  35. ICMP Trojan: icmpsend
  36. Remote Access Trojans
  37. Remote Access Trojan: RAT DarkComet
  38. Remote Access Trojan: Apocalypse
  39. Covert Channel Trojan: CCTT
  40. E-banking Trojans
  41. Banking Trojan Analysis
  42. E-banking Trojan: ZeuS
  43. Destructive Trojans
  44. Notification Trojans
  45. Credit Card Trojans
  46. Data Hiding Trojans (Encrypted Trojans)
  47. BlackBerry Trojan: PhoneSnoop
  48. MAC OS X Trojan: DNSChanger
  49. Mac OS X Trojan: Hell Raiser
  50. How to Detect Trojans?
  51. Scanning for Suspicious Ports
  52. Port Monitoring Tool: IceSword
  53. Port Monitoring Tools: CurrPorts and TCPView
  54. Scanning for Suspicious Processes
  55. Process Monitoring Tool: What’s Running
  56. Process Monitoring Tools
  57. Scanning for Suspicious Registry Entries
  58. Registry Entry Monitoring Tools
  59. Scanning for Suspicious Device Drivers
  60. Device Drivers Monitoring Tools: DriverView
  61. Device Drivers Monitoring Tools
  62. Scanning for Suspicious Windows Services
  63. Windows Services Monitoring Tools: Windows Service
  64. Manager (SrvMan)
  65. Windows Services Monitoring Tools
  66. Scanning for Suspicious Startup Programs
  67. Windows7 Startup Registry Entries
  68. Startup Programs Monitoring Tools: Starter
  69. Startup Programs Monitoring Tools: Security AutoRun
  70. Startup Programs Monitoring Tools
  71. Scanning for Suspicious Files and Folders
  72. Files and Folder Integrity Checker: FastSum and WinMD5
  73. Files and Folder Integrity Checker
  74. Scanning for Suspicious Network Activities
  75. Detecting Trojans and Worms with Capsa Network Analyzer
  76. Trojan Countermeasures
  77. Backdoor Countermeasures
  78. Trojan Horse Construction Kit
  79. Anti-Trojan Software: TrojanHunter
  80. Anti-Trojan Software: Emsisoft Anti-Malware
  81. Anti-Trojan Softwares
  82. Pen Testing for Trojans and Backdoors
  1. Viruses
  2. Virus and Worm Statistics 2010
  3. Stages of Virus Life
  4. Working of Viruses: Infection Phase
  5. Working of Viruses: Attack Phase
  6. Why Do People Create Computer Viruses?
  7. Indications of Virus Attack
  8. How does a Computer get Infected by Viruses?
  9. Virus Hoaxes
  10. Virus Analysis:
  11. W32/Sality AA
  12. W32/Toal-A
  13. W32/Virut
  14. Klez
  15. Types of Viruses
  16. System or Boot Sector Viruses
  17. File and Multipartite Viruses
  18. Macro Viruses
  19. Cluster Viruses
  20. Stealth/Tunneling Viruses
  21. Encryption Viruses
  22. Polymorphic Code
  23. Metamorphic Viruses
  24. File Overwriting or Cavity Viruses
  25. Sparse Infector Viruses
  26. Companion/Camouflage Viruses
  27. Shell Viruses
  28. File Extension Viruses
  29. Add-on and Intrusive Viruses
  30. Transient and Terminate and Stay Resident Viruses
  31. Writing a Simple Virus Program
  32. Terabit Virus Maker
  33. JPS Virus Maker
  34. DELmE’s Batch Virus Maker
  35. Computer Worms
  36. How is a Worm Different from a Virus?
  37. Example of Worm Infection: Conficker Worm
  38. What does the Conficker Worm do?
  39. How does the Conficker Worm Work?
  40. Worm Analysis:
  41. W32/Netsky
  42. W32/Bagle.GE
  43. Worm Maker: Internet Worm Maker Thing
  44. What is Sheep Dip Computer?
  45. Anti-Virus Sensors Systems
  46. Malware Analysis Procedure
  47. String Extracting Tool: Bintext
  48. Compression and Decompression Tool: UPX
  49. Process Monitoring Tools: Process Monitor
  50. Log Packet Content Monitoring Tools: NetResident
  51. Debugging Tool: Ollydbg
  52. Virus Analysis Tool: IDA Pro
  53. Online Malware Testing:
  54. Sunbelt CWSandbox
  55. VirusTotal
  56. Online Malware Analysis Services
  57. Virus Detection Methods
  58. Virus and Worms Countermeasures
  59. Companion Antivirus: Immunet Protect
  60. Anti-virus Tools
  61. Penetration Testing for Virus
  1. Tamper Data
  2. Behaviors Vulnerable to Attacks
  3. Factors that Make Companies Vulnerable to Attacks
  4. Why is Social Engineering Effective?
  5. Warning Signs of an Attack
  6. Phases in a Social Engineering Attack
  7. Impact on the Organization
  8. Common Targets of Social Engineering
  9. Common Targets of Social Engineering: Office Workers
  10. Types of Social Engineering
  11. Human-Based Social Engineering
  12. Technical Support Example
  13. Authority Support Example
  14. Human-based Social Engineering: Dumpster Diving
  15. Computer-Based Social Engineering
  16. Computer-Based Social Engineering: Pop-Ups
  17. Computer-Based Social Engineering: Phishing
  18. Social Engineering Using SMS
  19. Social Engineering by a “Fake SMS Spying Tool”
  20. Insider Attack
  21. Disgruntled Employee
  22. Preventing Insider Threats
  23. Common Intrusion Tactics and Strategies for Prevention
  24. Social Engineering Example: LinkedIn Profile
  25. Social Engineering on Facebook
  26. Social Engineering on Twitter
  27. Social Engineering on Orkut
  28. Social Engineering on MySpace
  29. Risks of Social Networking to Corporate Networks
  30. Identity Theft Statistics 2015
  31. Identify Theft
  32. How to Steal an Identity?
  33. Real Steven Gets Huge Credit Card Statement
  34. Identity Theft – Serious Problem
  35. Social Engineering Countermeasures: Policies
  36. Social Engineering Countermeasures
  37. How to Detect Phishing Emails?
  38. Anti-Phishing Toolbar: Netcraft
  39. Anti-Phishing Toolbar: PhishTank
  40. Identity Theft Countermeasures
  41. Social Engineering Pen Testing
  42. Social Engineering Pen Testing: Using Emails
  43. Social Engineering Pen Testing: Using Phone
  44. Social Engineering Pen Testing: In Person
  1. What is a Denial of Service Attack?
  2. What is Distributed Denial of Service Attacks?
  3. How Distributed Denial of Service Attacks Work?
  4. Symptoms of a DoS Attack
  5. Cyber Criminals
  6. Organized Cyber Crime: Organizational Chart
  7. Internet Chat Query (ICQ)
  8. Internet Relay Chat (IRC)
  9. DoS Attack Techniques
  10. Bandwidth Attacks
  11. Service Request Floods
  12. SYN Attack
  13. SYN Flooding
  14. ICMP Flood Attack
  15. Peer-to-Peer Attacks
  16. Permanent Denial-of-Service Attack
  17. Application Level Flood Attacks
  18. Botnet
  19. Botnet Propagation Technique
  20. Botnet Ecosystem
  21. Botnet Trojan: Shark
  22. Poison Ivy: Botnet Command Control Center
  23. Botnet Trojan: PlugBot
  24. WikiLeak Operation Payback
  25. DDoS Attack
  26. DDoS Attack Tool: LOIC
  27. DoS Attack Tools
  28. Detection Techniques
  29. Activity Profiling
  30. Wavelet Analysis
  31. Sequential Change-Point Detection
  32. DoS/DDoS Countermeasure Strategies
  33. DDoS Attack Countermeasures
  34. DoS/DDoS Countermeasures: Protect Secondary Victims
  35. DoS/DDoS Countermeasures: Detect and Neutralize Handlers
  36. DoS/DDoS Countermeasures: Detect Potential Attacks
  37. DoS/DDoS Countermeasures: Deflect Attacks
  38. DoS/DDoS Countermeasures: Mitigate Attacks
  39. Post-attack Forensics
  40. Techniques to Defend against Botnets
  41. DoS/DDoS Countermeasures
  42. DoS/DDoS Protection at ISP Level
  43. Enabling TCP Intercept on Cisco IOS Software
  44. DoS/DDoS Protection Tool
  45. Denial of Service (DoS) Attack Penetration Testing
  1. XSS injection
  2. Dangers Posed by Hijacking
  3. Why Session Hijacking is Successful?
  4. Key Session Hijacking Techniques
  5. Brute Forcing
  6. Brute Forcing Attack
  7. HTTP Referrer Attack
  8. Spoofing vs. Hijacking
  9. Session Hijacking Process
  10. Packet Analysis of a Local Session Hijack
  11. Types of Session Hijacking
  12. Session Hijacking in OSI Model
  13. Application Level Session Hijacking
  14. Session Sniffing
  15. Predictable Session Token
  16. How to Predict a Session Token?
  17. Man-in-the-Browser Attack
  18. Steps to Perform Man-in-the-Browser Attack
  19. Client-side Attacks
  20. Cross-site Script Attack
  21. Session Fixation
  22. Network Level Session Hijacking
  23. The 3-Way Handshake
  24. Sequence Numbers
  25. Sequence Number Prediction
  26. TCP/IP Hijacking
  27. IP Spoofing: Source Routed Packets
  28. RST Hijacking
  29. Blind Hijacking
  30. Man-in-the-Middle Attack using Packet Sniffer
  31. UDP Hijacking
  32. Session Hijacking Tools
  33. Paros
  34. Burp Suite
  35. Firesheep
  36. Protecting against Session Hijacking
  37. Defending against Session Hijack Attacks
  38. Session Hijacking Remediation
  39. IPSec
  40. Modes of IPSec
  41. IPSec Architecture
  42. IPSec Authentication and Confidentiality
  43. Components of IPSec
  44. IPSec Implementation
  45. Session Hijacking Pen Testing
  1. Scanning IP classes under linux
  2. IIS Webserver Architecture
  3. Website Defacement
  4. Case Study
  5. Why Web Servers are Compromised?
  6. Impact of Webserver Attacks
  7. Webserver Misconfiguration
  8. Directory Traversal Attacks
  9. HTTP Response Splitting Attack
  10. Web Cache Poisoning Attack
  11. HTTP Response Hijacking
  12. SSH Bruteforce Attack
  13. Webserver Password Cracking
  14. Webserver Password Cracking Techniques
  15. Web Application Attacks
  16. Webserver Attack Methodology
  17. Webserver Footprinting
  18. Webserver Footprinting Tools
  19. Mirroring a Website
  20. Vulnerability Scanning
  21. Session Hijacking
  22. Hacking Web Passwords
  23. Webserver Attack Tools
  24. Metasploit
  25. Metasploit Architecture
  26. Metasploit Exploit Module
  27. Metasploit Payload Module
  28. Metasploit Auxiliary Module
  29. Metasploit NOPS Module
  30. Wfetch
  31. Web Password Cracking Tool
  32. Brutus
  33. THC-Hydra
  34. Patches and Updates
  35. Protocols
  36. Accounts
  37. Files and Directories
  38. How to Defend Against Web Server Attacks?
  39. Patches and Hotfixes
  40. What is Patch Management?
  41. Identifying Appropriate Sources for Updates and Patches
  42. Installation of a Patch
  43. Patch Management Tools
  44. Web Application Security Scanner: Sandcat
  45. Web Server Security Scanner: Wikto
  46. Webserver Malware Infection Monitoring Tool: HackAlert
  47. Webserver Security Tools
  48. Web Server Penetration Testing
  1. Hijacking mobile devices like iphone 6 and 6s on iOS WhatsApp
  2. Introduction to Web Applications
  3. Web Application Components
  4. Web Application Architecture
  5. Web 2.0 Applications
  6. Vulnerability Stack
  7. Web Attack Vectors
  8. Web Application Threats – 1
  9. Web Application Threats – 2
  10. Unvalidated Input
  11. Parameter/Form Tampering
  12. Directory Traversal
  13. Security Misconfiguration
  14. Injection Flaws
  15. Command Injection Attacks
  16. Command Injection Example
  17. File Injection Attack
  18. What is LDAP Injection?
  19. How LDAP Injection Works?
  20. Hidden Field Manipulation Attack
  21. Cross-Site Scripting (XSS) Attacks
  22. How XSS Attacks Work?
  23. Cross-Site Scripting Attack Scenario: Attack via Email
  24. XSS Example: Attack via Email
  25. XSS Example: Stealing Users’ Cookies
  26. XSS Example: Sending an Unauthorized Request
  27. XSS Attack in Blog Posting
  28. XSS Attack in Comment Field
  29. XSS Cheat Sheet
  30. Cross-Site Request Forgery (CSRF) Attack
  31. How CSRF Attacks Work?
  32. Web Application Denial-of-Service (DoS) Attack
  33. Denial of Service (DoS) Examples
  34. Buffer Overflow Attacks
  35. Cookie/Session Poisoning
  36. How Cookie Poisoning Works?
  37. Session Fixation Attack
  38. Insufficient Transport Layer Protection
  39. Improper Error Handling
  40. Insecure Cryptographic Storage
  41. Broken Authentication and Session Management
  42. Unvalidated Redirects and Forwards
  43. Web Services Architecture
  44. Web Services Attack
  45. Web Services Footprinting Attack
  46. Web Services XML Poisoning
  47. Footprint Web Infrastructure
  48. Footprint Web Infrastructure: Server Discovery
  49. Footprint Web Infrastructure: Hidden Content Discovery
  50. Web Spidering Using Burp Suite
  51. Hacking Web Servers
  52. Web Server Hacking Tool: WebInspect
  53. Analyze Web Applications
  54. Analyze Web Applications: Identify Entry Points for User Input
  55. Analyze Web Applications: Identify Server-Side Technologies
  56. Analyze Web Applications: Identify Server-Side Functionality
  57. Analyze Web Applications: Map the Attack Surface
  58. Attack Authentication Mechanism
  59. Username Enumeration
  60. Password Attacks: Password Functionality Exploits
  61. Password Attacks: Password Guessing
  62. Password Attacks: Brute-forcing
  63. Session Attacks: Session ID Prediction/ Brute-forcing
  64. Cookie Exploitation: Cookie Poisoning
  65. Authorization Attack
  66. HTTP Request Tampering
  67. Authorization Attack: Cookie Parameter Tampering
  68. Session Management Attack
  69. Attacking Session Tokens Handling Mechanism: Session Token Sniffing
  70. Injection Attacks
  71. Attack Data Connectivity
  72. Connection String Injection
  73. Connection String Parameter Pollution (CSPP) Attacks
  74. Connection Pool DoS
  75. Attack Web App Client
  76. Attack Web Services
  77. Web Services Probing Attacks
  78. Web Service Attacks: SOAP Injection
  79. Web Service Attacks: XML Injection
  80. Web Services Parsing Attacks
  81. Web Service Attack Tool: soapUI
  82. Web Service Attack Tool: XMLSpy
  83. Web Application Hacking Tool: Burp Suite Professional
  84. Web Application Hacking Tools: CookieDigger
  85. Web Application Hacking Tools: CookieDigge
  86. Web Application Hacking Tools
  87. Encoding Schemes
  88. How to Defend Against Command Injection Flaws?
  89. How to Defend Against XSS Attacks?
  90. How to Defend Against DoS Attack?
  91. How to Defend Against Web Services Attack?
  92. Web Application Countermeasures
  93. How to Defend Against Web Application Attacks?
  94. Web Application Security Tool: Acunetix Web Vulnerability Scanner
  95. Web Application Security Tool: Falcove Web Vulnerability Scanner
  96. Web Application Security Scanner: Netsparker
  97. Web Application Security Tool: N-Stalker Web Application Security Scanner
  98. Web Application Security Tools
  99. Web Application Firewall: dotDefender
  100. Web Application Firewall: IBM AppScan
  101. Web Application Firewall: ServerDefender VP
  102. Web Application Firewall
  103. Web Application Pen Testing
  104. Configuration Management Testing
  105. Authentication Testing
  106. Session Management Testing
  107. Authorization Testing
  108. Data Validation Testing
  109. Denial of Service Testing
  110. Web Services Testing
  111. AJAX Testing
  1. SQL Injection is the Most Prevalent Vulnerability in 2015
  2. SQL Injection Threats
  3. SQL Injection Attacks
  4. How Web Applications Work?
  5. Server Side Technologies
  6. HTTP Post Request
  7. Example 1: Normal SQL Query
  8. Example 1: SQL Injection Query
  9. Example 1: Code Analysis
  10. Example 2: BadProductList.aspx
  11. Example 2: Attack Analysis
  12. Example 3: Updating Table
  13. Example 4: Adding New Records
  14. Example 5: Identifying the Table Name
  15. Example 6: Deleting a Table
  16. SQL Injection Detection
  17. SQL Injection Error Messages
  18. SQL Injection Attack Characters
  19. Additional Methods to Detect SQL Injection
  20. SQL Injection Black Box Pen Testing
  21. Testing for SQL Injection
  22. Types of SQL Injection
  23. Simple SQL Injection Attack
  24. Union SQL Injection Example
  25. SQL Injection Error Based
  26. What is Blind SQL Injection?
  27. No Error Messages Returned
  28. Blind SQL Injection: WAITFOR DELAY YES or NO Response
  29. Blind SQL Injection – Exploitation (MySQL)
  30. Blind SQL Injection – Extract Database User
  31. Blind SQL Injection – Extract Database Name
  32. Blind SQL Injection – Extract Column Name
  33. Blind SQL Injection – Extract Data from ROWS
  34. SQL Injection Methodology
  35. Information Gathering
  36. Extracting Information through Error Messages
  37. Understanding SQL Query
  38. Bypass Website Logins Using SQL Injection
  39. Database, Table, and Column Enumeration
  40. Advanced Enumeration
  41. Features of Different DBMSs
  42. Creating Database Accounts
  43. Password Grabbing
  44. Grabbing SQL Server Hashes
  45. Extracting SQL Hashes (In a Single Statement)
  46. Transfer Database to Attacker’s Machine
  47. Interacting with the Operating System
  48. Interacting with the FileSystem
  49. Network Reconnaissance Full Query
  50. SQL Injection Tools
  51. SQL Injection Tools: BSQLHacker
  52. SQL Injection Tools: Marathon Tool
  53. SQL Injection Tools: SQL Power Injector
  54. SQL Injection Tools: Havij
  55. Evading IDS
  56. Types of Signature Evasion Techniques
  57. Evasion Technique: Sophisticated Matches
  58. Evasion Technique: Hex Encoding
  59. Evasion Technique: Manipulating White Spaces
  60. Evasion Technique: In-line Comment
  61. Evasion Technique: Char Encoding
  62. Evasion Technique: String Concatenation
  63. Evasion Technique: Obfuscated Codes
  64. How to Defend Against SQL Injection Attacks?
  65. SQL Injection Detection Tools
  66. SQL Injection Detection Tool: Microsoft Source Code Analyzer
  67. SQL Injection Detection Tool: Microsoft UrlScan
  68. SQL Injection Detection Tool: dotDefender
  69. SQL Injection Detection Tool: IBM AppScan
  1. Wireless Networks
  2. Wi-Fi Usage Statistics in the US
  3. Wi-Fi Hotspots at Public Places
  4. Wi-Fi Networks at Home
  5. Types of Wireless Networks
  6. Wireless Standards
  7. Service Set Identifier (SSID)
  8. Wi-Fi Authentication Modes
  9. Wi-Fi Authentication Process
  10. Wireless Terminologies
  11. Wi-Fi Chalking
  12. Wi-Fi Chalking Symbols
  13. Wi-Fi Hotspot Finder: jiwire.com
  14. Wi-Fi Hotspot Finder: WeFi.com
  15. Types of Wireless Antenna
  16. Parabolic Grid Antenna
  17. Types of Wireless Encryption
  18. WEP Encryption
  19. How WEP Works?
  20. What is WPA?
  21. How WPA Works?
  22. Temporal Keys
  23. What is WPA2?
  24. How WPA2 Works?
  25. WEP vs. WPA vs. WPA2
  26. WEP Issues
  27. Weak Initialization Vectors (IV)
  28. How to Break WEP Encryption?
  29. How to Break WPA/WPA2 Encryption?
  30. How to Defend Against WPA Cracking?
  31. Wireless Threats: Access Control Attacks
  32. Wireless Threats: Integrity Attacks
  33. Wireless Threats: Confidentiality Attacks
  34. Wireless Threats: Availability Attacks
  35. Wireless Threats: Authentication Attacks
  36. Rogue Access Point Attack
  37. Client Mis-association
  38. Misconfigured Access Point Attack
  39. Unauthorized Association
  40. Ad Hoc Connection Attack
  41. HoneySpot Access Point Attack
  42. AP MAC Spoofing
  43. Denial-of-Service Attack
  44. Jamming Signal Attack
  45. Wi-Fi Jamming Devices
  46. Wireless Hacking Methodology
  47. Find Wi-Fi Networks to Attack
  48. Attackers Scanning for Wi-Fi Networks
  49. Footprint the Wireless Network
  50. Wi-Fi Discovery Tool: inSSIDer
  51. Wi-Fi Discovery Tool: NetSurveyor
  52. Wi-Fi Discovery Tool: NetStumbler
  53. Wi-Fi Discovery Tool: Vistumbler
  54. Wi-Fi Discovery Tool: WirelessMon
  55. Wi-Fi Discovery Tools
  56. GPS Mapping
  57. GPS Mapping Tool: WIGLE
  58. GPS Mapping Tool: Skyhook
  59. How to Discover Wi-Fi Network Using Wardriving?
  60. Wireless Traffic Analysis
  61. Wireless Cards and Chipsets
  62. Wi-Fi USB Dongle: AirPcap
  63. Wi-Fi Packet Sniffer: Wireshark with AirPcap
  64. Wi-Fi Packet Sniffer: Wi-Fi Pilot
  65. Wi-Fi Packet Sniffer: OmniPeek
  66. Wi-Fi Packet Sniffer: CommView for Wi-Fi
  67. What is Spectrum Analysis?
  68. Wireless Sniffers
  69. Aircrack-ng Suite
  70. How to Reveal Hidden SSIDs
  71. How to Launch MAC Spoofing Attack?
  72. Denial of Service: Deauthentication and Disassociation Attacks
  73. Man-in-the-Middle Attack
  74. MITM Attack Using Aircrack-ng
  75. Wireless ARP Poisoning Attack
  76. Rogue Access Point
  77. Evil Twin
  78. How to Set Up a Fake Hotspot (Evil Twin)?
  79. How to Crack WEP Using Aircrack?
  80. How to Crack WPA-PSK Using Aircrack?
  81. WPA Cracking Tool: KisMAC
  82. WEP Cracking Using Cain & Abel
  83. WPA Brute Forcing Using Cain & Abel
  84. WPA Cracking Tool: Elcomsoft Wireless Security Auditor
  85. WEP/WPA Cracking Tools
  86. Wi-Fi Sniffer: Kismet
  87. Wardriving Tools
  88. RF Monitoring Tools
  89. Wi-Fi Connection Manager Tools
  90. Wi-Fi Traffic Analyzer Tools
  91. Wi-Fi Raw Packet Capturing Tools
  92. Wi-Fi Spectrum Analyzing Tools
  93. Bluetooth Hacking
  94. Bluetooth Stack
  95. Bluetooth Threats
  96. How to BlueJack a Victim?
  97. Bluetooth Hacking Tool: Super Bluetooth Hack
  98. Bluetooth Hacking Tool: PhoneSnoop
  99. Bluetooth Hacking Tool: BlueScanner
  100. Bluetooth Hacking Tools
  101. How to Defend Against Bluetooth Hacking?
  102. How to Detect and Block Rogue AP?
  103. Wireless Security Layers
  104. How to Defend Against Wireless Attacks?
  105. Wireless Intrusion Prevention Systems
  106. Wireless IPS Deployment
  107. Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
  108. Wi-Fi Security Auditing Tool: AirDefense
  109. Wi-Fi Security Auditing Tool: Adaptive Wireless IPS
  110. Wi-Fi Security Auditing Tool: Aruba RFProtect WIPS
  111. Wi-Fi Intrusion Prevention System
  112. Wi-Fi Predictive Planning Tools
  113. Wi-Fi Vulnerability Scanning Tools
  114. Wireless Penetration Testing
  115. Wireless Penetration Testing Framework
  116. Wi-Fi Pen Testing Framework
  117. Pen Testing LEAP Encrypted WLAN
  118. Pen Testing WPA/WPA2 Encrypted WLAN
  119. Pen Testing WEP Encrypted WLAN
  120. Pen Testing Unencrypted WLAN
  1. Accessing databases like MySQL, PostgreSQL and MongoDB
  2. How IDS Works?
  3. Ways to Detect an Intrusion
  4. Types of Intrusion Detection Systems
  5. System Integrity Verifiers (SIV)
  6. General Indications of Intrusions
  7. General Indications of System Intrusions
  8. Firewall
  9. Firewall Architecture
  10. DeMilitarized Zone (DMZ)
  11. Types of Firewall
  12. Packet Filtering Firewall
  13. Circuit-Level Gateway Firewall
  14. Application-Level Firewall
  15. Stateful Multilayer Inspection Firewall
  16. Firewall Identification
  17. Port Scanning
  18. Firewalking
  19. Banner Grabbing
  20. Honeypot
  21. Types of Honeypots
  22. How to Set Up a Honeypot?
  23. Intrusion Detection Tool
  24. Snort
  25. Snort Rules
  26. Rule Actions and IP Protocols
  27. The Direction Operator and IP Addresses
  28. Port Numbers
  29. Intrusion Detection Systems: Tipping Point
  30. Intrusion Detection Tools
  31. Firewall: Sunbelt Personal Firewall
  32. Firewalls
  33. Honeypot Tools
  34. KFSensor
  35. SPECTER
  36. Insertion Attack
  37. Evasion
  38. Denial-of-Service Attack (DoS)
  39. Obfuscating
  40. False Positive Generation
  41. Session Splicing
  42. Unicode Evasion Technique
  43. Fragmentation Attack
  44. Overlapping Fragments
  45. Time-To-Live Attacks
  46. Invalid RST Packets
  47. Urgency Flag
  48. Polymorphic Shellcode
  49. ASCII Shellcode
  50. Application-Layer Attacks
  51. Desynchronization
  52. Pre Connection SYN
  53. Post Connection SYN
  54. Other Types of Evasion
  55. IP Address Spoofing
  56. Attacking Session Token Generation Mechanism
  57. Tiny Fragments
  58. Bypass Blocked Sites Using IP Address in Place of URL
  59. Bypass Blocked Sites Using Anonymous Website Surfing Sites
  60. Bypass a Firewall using Proxy Server
  61. Bypassing Firewall through ICMP Tunneling Method
  62. Bypassing Firewall through ACK Tunneling Method
  63. Bypassing Firewall through HTTP Tunneling Method
  64. Bypassing Firewall through External Systems
  65. Bypassing Firewall through MITM Attack
  66. Detecting Honeypots
  67. Honeypot Detecting Tool: Send-Safe Honeypot Hunter
  68. tcp-over-dns
  69. Firewall Evasion Tools
  70. Packet Fragment Generators
  71. Countermeasures
  72. Firewall/IDS Penetration Testing
  73. Firewall Penetration Testing
  74. IDS Penetration Testing
  1. Buffer Overflows Vulnerability
  2. Why are Programs And Applications Vulnerable?
  3. Understanding Stacks
  4. Stack-Based Buffer Overflow
  5. Understanding Heap
  6. Heap-Based Buffer Overflow
  7. Stack Operations
  8. Shellcode
  9. No Operations (NOPs)
  10. Knowledge Required to Program Buffer Overflow Exploits
  11. Buffer Overflow Steps
  12. Attacking a Real Program
  13. Format String Problem
  14. Overflow using Format String
  15. Smashing the Stack
  16. Once the Stack is Smashed…
  17. Simple Uncontrolled Overflow
  18. Simple Buffer Overflow in C
  19. Code Analysis
  20. Exploiting Semantic Comments in C (Annotations)
  21. How to Mutate a Buffer Overflow Exploit?
  22. Identifying Buffer Overflows
  23. How to Detect Buffer Overflows in a Program?
  24. BOU (Buffer Overflow Utility)
  25. Testing for Heap Overflow Conditions: heap.exe
  26. Steps for Testing for Stack Overflow in OllyDbg Debugger
  27. Testing for Stack Overflow in OllyDbg Debugger
  28. Testing for Format String Conditions using IDA Pro
  29. BoF Detection Tools
  30. Defense Against Buffer Overflows
  31. Preventing BoF Attacks
  32. Programming Countermeasures
  33. Data Execution Prevention (DEP)
  34. Enhanced Mitigation Experience Toolkit (EMET)
  35. EMET System Configuration Settings
  36. EMET Application Configuration Window
  37. /GS http://microsoft.com
  38. BoF Security Tools BufferShield
  39. Buffer Overflow Penetration Testing
  1. Cryptography
  2. Types of Cryptography
  3. Government Access to Keys (GAK)
  4. Ciphers
  5. Advanced Encryption Standard (AES)
  6. Data Encryption Standard (DES)
  7. RC4, RC5, RC6 Algorithms
  8. The DSA and Related Signature Schemes
  9. RSA (Rivest Shamir Adleman)
  10. Example of RSA Algorithm
  11. The RSA Signature Scheme
  12. Message Digest (One-way Bash) Functions
  13. Message Digest Function: MD5
  14. Secure Hashing Algorithm (SHA)
  15. What is SSH (Secure Shell)?
  16. Cryptography Tool: Advanced Encryption Package
  17. Cryptography Tools
  18. Public Key Infrastructure (PKI)
  19. Certification Authorities
  20. Digital Signature
  21. SSL (Secure Sockets Layer)
  22. Transport Layer Security (TLS)
  23. Disk Encryption
  24. Disk Encryption Tools
  25. Cryptography Attacks
  26. Code Breaking Methodologies
  27. Brute-Force Attack
  28. Meet-in-the-Middle Attack on Digital Signature Schemes
  29. Cryptanalysis Tool: CrypTool
  30. Cryptanalysis Tools
  31. Online MD5 Decryption Tool
  1. Introduction to Penetration Testing
  2. Security Assessments
  3. Vulnerability Assessment
  4. Limitations of Vulnerability Assessment
  5. Penetration Testing
  6. Why Penetration Testing?
  7. What Should be Tested?
  8. What Makes a Good Penetration Test?
  9. ROI on Penetration Testing
  10. Testing Points
  11. Testing Locations
  12. Types of Penetration Testing
  13. External Penetration Testing
  14. Internal Security Assessment
  15. Black-box Penetration Testing
  16. Grey-box Penetration Testing
  17. White-box Penetration Testing
  18. Announced / Unannounced Testing
  19. Automated Testing
  20. Manual Testing
  21. Common Penetration Testing Techniques
  22. Using DNS Domain Name and IP Address Information
  23. Phases of Penetration Testing
  24. Pre-Attack Phase
  25. Attack Phase
  26. Activity: Perimeter Testing
  27. Enumerating Devices
  28. Activity: Acquiring Target
  29. Activity: Escalating Privileges
  30. Activity: Execute, Implant, and Retract
  31. Post-Attack Phase and Activities
  32. Penetration Testing Deliverable Templates
  33. Penetration Testing Methodology
  34. Application Security Assessment
  35. Web Application Testing – I
  36. Web Application Testing – II
  37. Web Application Testing – III
  38. Network Security Assessment
  39. Wireless/Remote Access Assessment
  40. Wireless Testing
  41. Telephony Security Assessment
  42. Social Engineering
  43. Testing Network-Filtering Devices
  44. Denial of Service Emulation
  45. Outsourcing Penetration Testing Services
  46. Terms of Engagement
  47. Project Scope
  48. Pentest Service Level Agreements
  49. Penetration Testing Consultants
  50. Evaluating Different Types of Pentest Tools
  51. Application Security Assessment Tool
  52. Webscarab
  53. Network Security Assessment Tool
  54. Angry IP scanner
  55. GFI LANguard
  56. Wireless/Remote Access Assessment Tool
  57. Kismet
  58. Telephony Security Assessment Tool
  59. Omnipeek
  60. Testing Network-Filtering Device Tool
  61. Traffic IQ Professional