Ethical Hacking Advanced
Information Gathering
Ethical Hacking: is it Ethical – The Hacker mindset – Types of Hacking – The Ethical
Hacking Methodology – Vulnerability Assessment and Penetration Testing – Pen
Testing Execution Standard (PTES) – Information Gathering – Passive Information
Gathering – Active Information Gathering
Enumeration – SMB Enumeration – SMTP Enumeration – SNMP Enumeration – DNS
Enumeration – Email Harvesting – Document Metadata Extraction – Google Hacking
Scanning
1
Port Scanning
2
Types of Port scans
3
Port status
4
Firewall and IDS Evasion
5
Timing Techniques
6
Zenmap
7
Vulnerability Scanning
8
Vulnerability Databases
9
CVE – CVSS – CWE – SCAP – OVAL – Nessus
Exploitation and Post Exploitation
1
Exploitation – Linux exploitation – Gaining Shell
2
Windows Exploitation – Privilege Escalation – Gaining Shell
3
Post Exploitation – Maintaining session – Screen capture
4
Keyloggers – Remote Desktop – Covering Tracks
5
Social Engineering – Browser Exploitation
Exploitation and Post Exploitation
1
Exploitation – Linux exploitation – Gaining Shell
2
Windows Exploitation – Privilege Escalation – Gaining Shell
3
Post Exploitation – Maintaining session – Screen capture – Keyloggers – Remote Desktop – Covering Tracks
4
Social Engineering – Browser Exploitation
Reporting and Advanced topics
1
Reporting – Documentation standards
2
Red teaming: The Esoteric Art of Ethical Hacking
Capture the Flag -Event
Be the first to add a review.
Please, login to leave a review