0% found this document useful (0 votes)
325 views60 pages

Etical Hacking

Uploaded by

rani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
325 views60 pages

Etical Hacking

Uploaded by

rani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Ethical Hacking

Certification Training

Ethical Hacking Certification Training 1|Page


Table of Contents

1. About the Program

2. About Intellipaat

3. Key Features

4. Career Support

5. Why take up this course?

6. Who should take up this course?

7. Program Curriculum

8. Project Work

9. Certification

10. Intellipaat Success Stories

11. Contact Us

Ethical Hacking Certification Training 2|Page


About the Program
This Certified Ethical Hacking course will help you clear the EC Council’s CEH v11
certification. It has carefully been designed with help of top Ethical hacker from various
major organizations. This CEH certification course will help you master skils sets like
system penetration testing, building firewalls, network security and more to become
certified Ethical hacker. This Ethical hacking training will help you master methodologies
used by the hackers to help you prevent and block security attacks at your organization.

About Intellipaat
Intellipaat is one of the leading online e-learning training providers with more than 600,000
learners across 55+ countries. We are on a mission to democratize education as we
believe that everyone has the right to quality education.

Our courses are delivered by subject matter experts from top MNCs, and our world-class
pedagogy enables to quickly learn difficult topics in no time. Our 24/7 technical support and
career services will help learners jump-start their careers in their dream companies.

Key Features

Ethical Hacking Certification Training 3|Page


40 HRS INSTRUCTOR-LED 8 HRS SELF-PACED TRAINING
TRAINING

6 Months Access to Cloud Lab LIFETIME ACCESS

24/7 TECHNICAL SUPPORT INDUSTRY-RECOGNIZED


CERTIFICATION

JOB ASSISTANCE THROUGH FLEXIBLE SCHEDULING


80+ CORPORATE TIE-UPS

Ethical Hacking Certification Training 4|Page


Career Support

SESSIONS WITH INDUSTRY MENTORS


Attend sessions from top industry experts and get guidance on how to boost
your career growth

MOCK INTERVIEWS
Mock interviews to make you prepare for cracking interviews by top employers

GUARANTEED INTERVIEWS & JOB SUPPORT


Get interviewed by our 400+ hiring partners

RESUME PREPARATION
Get assistance in creating a world-class resume from our career services team

Ethical Hacking Certification Training 5|Page


Why take up this course?
 The United States offers 4,000+ CEH jobs for certified professionals – LinkedIn

 Major companies, like Citibank, Deloitte, Accenture, IBM, Oracle, etc., are mass
hiring professionals in Ethical Hacking – Indeed

 The average salary of Ethical Hackers in India is about ₹655k per annum –
Glassdoor

Who should take up this course?


 Network Security Officers

 Site Administrators

 IT/IS Auditors

 IT Security Officers

 Technical Support Engineers

 IT/IS Analysts and Specialists

 System Analysts

 Network Specialists

 IT Operations Managers

 Senior System Engineers

Program Curriculum
Ethical Hacking Training Course Content

Ethical Hacking Certification Training 6|Page


1. Introduction to Ethical Hacking

 Information Security Overview

1.1 Internet is Integral Part of Business and Personal Life – What Happens Online in
60 Seconds
1.2 Essential Terminology
1.3 Elements of Information Security
1.4 The Security, Functionality, and Usability Triangle

 Information Security Threats and Attack Vectors

1.5 Motives, Goals, and Objectives of Information Security Attacks


1.6 Top Information Security Attack Vectors
1.7 Information Security Threat Categories
1.8 Types of Attacks on a System
1.9 Information Warfare

 Hacking Concepts

1.10 What is Hacking?


1.11Who is a Hacker?
1.12 Hacker Classes
1.13 Hacking Phases

o Reconnaissance

o Scanning

o Gaining Access

o Maintaining Access

o Clearing Tracks

 Ethical Hacking Concepts

1.14 What is Ethical Hacking?


1.15 Why Ethical Hacking is Necessary
1.16 Scope and Limitations of Ethical Hacking
1.17 Skills of an Ethical Hacker

Ethical Hacking Certification Training 7|Page


 Information Security Controls

1.18 Information Assurance (IA)


1.19 Information Security Management Program
1.20 Enterprise Information Security Architecture (EISA)
1.21 Network Security Zoning
1.22 Defense-in-Depth
1.23 Information Security Policies

o Types of Security Policies

o Examples of Security Policies

o Privacy Policies at Workplace

o Steps to Create and Implement Security Policies

o HR/Legal Implications of Security Policy Enforcement

1.24 Physical Security

o Types of Physical Security Control

o Physical Security Controls

1.25 What is Risk?

o Risk Management

o Key Roles and Responsibilities in Risk Management

1.26 Threat Modeling


1.27 Incident Management

o Incident Management Process

o Responsibilities of an Incident Response Team

1.28 Security Incident and Event Management (SIEM)

o SIEM Architecture

1.29 User Behavior Analytics (UBA)


1.30 Network Security Controls

Ethical Hacking Certification Training 8|Page


o Access Control

o Types of Access Control

o User Identification, Authentication, Authorization and Accounting

1.31 Identity and Access Management (IAM)


1.32 Data Leakage

o Data Leakage Threats

o What is Data Loss Prevention (DLP)?

1.33 Data Backup


1.34 Data Recovery
1.35 Role of AI/ML in Cyber Security

 Penetration Testing Concepts

1.36 Penetration Testing


1.37 Why Penetration Testing
1.38 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
1.39 Blue Teaming/Red Teaming
1.40 Types of Penetration Testing
1.41 Phases of Penetration Testing
1.42 Security Testing Methodology

 Information Security Laws and Standards

1.43 Payment Card Industry Data Security Standard (PCI-DSS)


1.44 ISO/IEC 27001:2013
1.45 Health Insurance Portability and Accountability Act (HIPAA)
1.46 Sarbanes Oxley Act (SOX)
1.47 The Digital Millennium Copyright Act (DMCA)
1.48 Federal Information Security Management Act (FISMA)
1.49 Cyber Law in Different Countries

2. Footprinting and Reconnaissance

 Footprinting Concepts

Ethical Hacking Certification Training 9|Page


2.1 What is Footprinting?
2.2 Objectives of Footprinting

 Footprinting through Search Engines

2.3 Footprinting through Search Engines


2.4 Footprint Using Advanced Google Hacking Techniques
2.5 Information Gathering Using Google Advanced Search and Image Search
2.6 Google Hacking Database
2.7 VoIP and VPN Footprinting through Google Hacking Database

 Footprinting through Web Services

2.8 Finding Company’s Top-level Domains (TLDs) and Sub-domains


2.9 Finding the Geographical Location of the Target
2.10 People Search on Social Networking Sites and People Search Services
2.11 Gathering Information from LinkedIn
2.12 Gather Information from Financial Services
2.13 Footprinting through Job Sites
2.14 Monitoring Target Using Alerts
2.15 Information Gathering Using Groups, Forums, and Blogs
2.16 Determining the Operating System
2.17 VoIP and VPN Footprinting through SHODAN

 Footprinting through Social Networking Sites

2.18 Collecting Information through Social Engineering on Social Networking Sites

 Website Footprinting

2.19 Website Footprinting


2.20 Website Footprinting using Web Spiders
2.21 Mirroring Entire Website
2.22 Extracting Website Information from https://archive.org
2.23 Extracting Metadata of Public Documents
2.24 Monitoring Web Pages for Updates and Changes

 Email Footprinting

Ethical Hacking Certification Training 10 | P a g e


2.25 Tracking Email Communications
2.26 Collecting Information from Email Header
2.27 Email Tracking Tools

 Competitive Intelligence

2.28 Competitive Intelligence Gathering


2.29 Competitive Intelligence – When Did this Company Begin? How Did it Develop?
2.30 Competitive Intelligence – What Are the Company’s Plans?
2.31 Competitive Intelligence – What Expert Opinions Say About the Company
2.32 Monitoring Website Traffic of Target Company
2.33 Tracking Online Reputation of the Target

 Whois Footprinting

2.34 Whois Lookup


2.35 Whois Lookup Result Analysis
2.36 Whois Lookup Tools
2.37 Finding IP Geolocation Information

 DNS Footprinting

2.38 Extracting DNS Information


2.39 DNS Interrogation Tools

 Network Footprinting

2.40 Locate the Network Range


2.41 Traceroute
2.42 Traceroute Analysis
2.43 Traceroute Tools

 Footprinting through Social Engineering

2.44 Footprinting through Social Engineering


2.45 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster
Diving

 Footprinting Tools

2.46 Maltego
2.47 Recon-ng
Ethical Hacking Certification Training 11 | P a g e
2.48 FOCA
2.49 Recon-Dog
2.50 OSRFramework
2.51 Additional Footprinting Tools

 Countermeasures

2.52 Footprinting Countermeasures

 Footprinting Pen Testing

2.53 Footprinting Pen Testing


2.54 Footprinting Pen Testing Report Templates

3. Scanning Networks

 Network Scanning Concepts

3.1 Overview of Network Scanning


3.2 TCP Communication Flags
3.3 TCP/IP Communication
3.4 Creating Custom Packet Using TCP Flags
3.5 Scanning in IPv6 Networks

 Scanning Tools

3.6 Nmap
3.7 Hping2 / Hping3

o Hping Commands

3.8 Scanning Tools


3.9 Scanning Tools for Mobile

 Scanning Techniques

3.10 Scanning Techniques

o ICMP Scanning – Checking for Live Systems

o Ping Sweep – Checking for Live Systems

 Ping Sweep Tools

Ethical Hacking Certification Training 12 | P a g e


o ICMP Echo Scanning

o TCP Connect / Full Open Scan

o Stealth Scan (Half-open Scan)

o Inverse TCP Flag Scanning

o Xmas Scan

o ACK Flag Probe Scanning

o IDLE/IPID Header Scan

o UDP Scanning

o SSDP and List Scanning

o Port Scanning Countermeasures

 Scanning Beyond IDS and Firewall

3.11 IDS/Firewall Evasion Techniques

 Packet Fragmentation

 Source Routing

 IP Address Decoy

 IP Address Spoofing

 IP Spoofing Detection Techniques: Direct TTL Probes

 IP Spoofing Detection Techniques: IP Identification Number

 IP Spoofing Detection Techniques: TCP Flow Control Method

 IP Spoofing Countermeasures

 Proxy Servers

 Proxy Chaining

 Proxy Tools

 Proxy Tools for Mobile

 Anonymizers

Ethical Hacking Certification Training 13 | P a g e


 Censorship Circumvention Tools: Alkasir and Tails

 Anonymizers

 Anonymizers for Mobile

 Banner Grabbing

3.12 Banner Grabbing


3.13 How to Identify Target System OS
3.14 Banner Grabbing Countermeasures

 Draw Network Diagrams

3.15 Drawing Network Diagrams


3.16 Network Discovery and Mapping Tools
3.17 Network Discovery Tools for Mobile

 Scanning Pen Testing

3.18 Scanning Pen Testing

4. Enumeration

 Enumeration Concepts

4.1 What is Enumeration?


4.2 Techniques for Enumeration
4.3 Services and Ports to Enumerate

 NetBIOS Enumeration

4.4 NetBIOS Enumeration


4.5 NetBIOS Enumeration Tools
4.6 Enumerating User Accounts
4.7 Enumerating Shared Resources Using Net View

 SNMP Enumeration

4.8 SNMP (Simple Network Management Protocol) Enumeration


4.9 Working of SNMP
4.10 Management Information Base (MIB)
4.11 SNMP Enumeration Tools

Ethical Hacking Certification Training 14 | P a g e


 LDAP Enumeration

4.12 LDAP Enumeration


4.13 LDAP Enumeration Tools

 NTP Enumeration

4.14 NTP Enumeration


4.15 NTP Enumeration Commands
4.16 NTP Enumeration Tools

 SMTP and DNS Enumeration

4.17 SMTP Enumeration


4.18 SMTP Enumeration Tools
4.19 DNS Enumeration Using Zone Transfer

 Other Enumeration Techniques

4.20 IPsec Enumeration


4.21 VoIP Enumeration
4.22 RPC Enumeration
4.23 Unix/Linux User Enumeration

 Enumeration Countermeasures

4.24 Enumeration Countermeasures

 Enumeration Pen Testing

4.25 Enumeration Pen Testing

5. Vulnerability Analysis

 Vulnerability Assessment Concepts

5.1 Vulnerability Research


5.2 Vulnerability Classification
5.3 What is Vulnerability Assessment?
5.4 Types of Vulnerability Assessment
5.5 Vulnerability-Management Life Cycle

Ethical Hacking Certification Training 15 | P a g e


o Pre-Assessment Phase: Creating a Baseline

o Vulnerability Assessment Phase

o Post Assessment Phase

 Vulnerability Assessment Solutions

5.6 Comparing Approaches to Vulnerability Assessment


5.7 Working of Vulnerability Scanning Solutions
5.8 Types of Vulnerability Assessment Tools
5.9 Characteristics of a Good Vulnerability Assessment Solution
5.10 Choosing a Vulnerability Assessment Tool
5.11 Criteria for Choosing a Vulnerability Assessment Tool
5.12 Best Practices for Selecting Vulnerability Assessment Tools

 Vulnerability Scoring Systems

5.13 Common Vulnerability Scoring System (CVSS)


5.14 Common Vulnerabilities and Exposures (CVE)
5.15 National Vulnerability Database (NVD)
5.16 Resources for Vulnerability Research

 Vulnerability Assessment Tools

5.17 Vulnerability Assessment Tools

o Qualys Vulnerability Management

o Nessus Professional

o GFI LanGuard

o Qualys FreeScan

o Nikto

o OpenVAS

o Retina CS

o SAINT

o Microsoft Baseline Security Analyzer (MBSA)

o AVDS – Automated Vulnerability Detection System


Ethical Hacking Certification Training 16 | P a g e
o Vulnerability Assessment Tools

5.18 Vulnerability Assessment Tools for Mobile

 Vulnerability Assessment Reports

5.19 Vulnerability Assessment Reports


5.20 Analyzing Vulnerability Scanning Report

6. System Hacking

 System Hacking Concepts

6.1 CEH Hacking Methodology (CHM)


6.2 System Hacking Goals

 Cracking Passwords

6.3 Password Cracking


6.4 Types of Password Attacks

o Non-Electronic Attacks

o Active Online Attack

 Dictionary, Brute Forcing and Rule-based Attack

 Password Guessing

 Default Passwords

 Trojan/Spyware/Keylogger

 Example of Active Online Attack Using USB Drive

 Hash Injection Attack

 LLMNR/NBT-NS Poisoning

o Passive Online Attack

 Wire Sniffing

 Man-in-the-Middle and Replay Attack

o Offline Attack

 Rainbow Table Attack

Ethical Hacking Certification Training 17 | P a g e


 Tools to Create Rainbow Tables: rtgen and Winrtgen

 Distributed Network Attack

6.5 Password Recovery Tools


6.6 Microsoft Authentication
6.7 How Hash Passwords Are Stored in Windows SAM?
6.8 NTLM Authentication Process
6.9 Kerberos Authentication
6.10 Password Salting
6.11 Tools to Extract the Password Hashes
6.12 Password Cracking Tools
6.13 How to Defend against Password Cracking
6.14 How to Defend against LLMNR/NBT-NS Poisoning

 Escalating Privileges

6.15 Privilege Escalation


6.16 Privilege Escalation Using DLL Hijacking
6.17 Privilege Escalation by Exploiting Vulnerabilities
6.18 Privilege Escalation Using Dylib Hijacking
6.19 Privilege Escalation using Spectre and Meltdown Vulnerabilities
6.20 Other Privilege Escalation Techniques
6.21 How to Defend Against Privilege Escalation

 Executing Applications

6.22 Executing Applications

o Tools for Executing Applications

6.23 Keylogger

o Types of Keystroke Loggers

o Hardware Keyloggers

o Keyloggers for Windows

o Keyloggers for Mac

6.24 Spyware

Ethical Hacking Certification Training 18 | P a g e


o Spyware

o USB Spyware

o Audio Spyware

o Video Spyware

o Telephone/Cellphone Spyware

o GPS Spyware

6.25 How to Defend Against Keyloggers

o Anti-Keylogger

6.26 How to Defend Against Spyware

o Anti-Spyware

 Hiding Files

6.27 Rootkits

o Types of Rootkits

o How Rootkit Works

o Rootkits

 Horse Pill

 GrayFish

 Sirefef

 Necurs

o Detecting Rootkits

o Steps for Detecting Rootkits

o How to Defend against Rootkits

o Anti-Rootkits

6.28 NTFS Data Stream

Ethical Hacking Certification Training 19 | P a g e


o How to Create NTFS Streams

o NTFS Stream Manipulation

o How to Defend against NTFS Streams

o NTFS Stream Detectors

6.29 What is Steganography?

o Classification of Steganography

o Types of Steganography based on Cover Medium

o Whitespace Steganography

o Image Steganography

 Image Steganography Tools

o Document Steganography

o Video Steganography

o Audio Steganography

o Folder Steganography

o Spam/Email Steganography

 Steganography Tools for Mobile Phones

 Steganalysis

 Steganalysis Methods/Attacks on Steganography

 Detecting Steganography (Text, Image, Audio, and Video Files)

 Steganography Detection Tools

 Covering Tracks

6.31 Disabling Auditing: Auditpol


6.32 Clearing Logs
6.33 Manually Clearing Event Logs
6.34 Ways to Clear Online Tracks
6.35 Covering BASH Shell Tracks

Ethical Hacking Certification Training 20 | P a g e


6.36 Covering Tracks on Network
6.37 Covering Tracks on OS
6.38 Covering Tracks Tools

 Penetration Testing

6.39 Password Cracking


6.40 Privilege Escalation
6.41 Executing Applications
6.42 Hiding Files
6.43 Covering Tracks

7. Malware Threats

 Malware Concepts

7.1 Introduction to Malware


7.2 Different Ways a Malware can Get into a System
7.3 Common Techniques Attackers Use to Distribute Malware on the Web
7.4 Components of Malware

 Trojan Concepts

7.5 What is a Trojan?


7.6 How Hackers Use Trojans
7.7 Common Ports used by Trojans
7.8 How to Infect Systems Using a Trojan
7.9 Trojan Horse Construction Kit
7.10 Wrappers
7.11 Crypters
7.12 How Attackers Deploy a Trojan
7.13 Exploit Kits
7.14 Evading Anti-Virus Techniques
7.15 Types of Trojans

o Remote Access Trojans

o Backdoor Trojans

o Botnet Trojans

Ethical Hacking Certification Training 21 | P a g e


o Rootkit Trojans

o E-banking Trojans

 Working of E-banking Trojans

 E-banking Trojan: ZeuS

o Proxy Server Trojans

o Covert Channel Trojans

o Defacement Trojans

o Service Protocol Trojans

o Mobile Trojans

o IoT Trojans

o Other Trojans

 Virus and Worm Concepts

7.16 Introduction to Viruses


7.17 Stages of Virus Life
7.18 Working of Viruses
7.19 Indications of Virus Attack
7.20 How does a Computer Get Infected by Viruses
7.21 Virus Hoaxes
7.22 Fake Antiviruses
7.23 Ransomware
7.24 Types of Viruses

o System and File Viruses

o Multipartite and Macro Viruses

o Cluster and Stealth Viruses

o Encryption and Sparse Infector Viruses

o Polymorphic Viruses

Ethical Hacking Certification Training 22 | P a g e


o Metamorphic Viruses

o Overwriting File or Cavity Viruses

o Companion/Camouflage and Shell Viruses

o File Extension Viruses

o FAT and Logic Bomb Viruses

o Web Scripting and E-mail Viruses

o Other Viruses

7.25 Creating Virus


7.26 Computer Worms
7.27 Worm Makers

1. Malware Analysis

7.28 What is Sheep Dip Computer?


7.29 Anti-Virus Sensor Systems
7.30 Introduction to Malware Analysis
7.31 Malware Analysis Procedure: Preparing Testbed
7.32 Static Malware Analysis

1.18.1 File Fingerprinting

1.18.2 Local and Online Malware Scanning

1.18.3 Performing Strings Search

1.18.4 Identifying Packing/ Obfuscation Methods

1.18.5 Finding the Portable Executables (PE) Information

1.18.6 Identifying File Dependencies

1.18.7 Malware Disassembly

7.33 Dynamic Malware Analysis

1.18.8 Port Monitoring

1.18.9 Process Monitoring

Ethical Hacking Certification Training 23 | P a g e


1.18.10 Registry Monitoring

1.18.11 Windows Services Monitoring

1.18.12 Startup Programs Monitoring

1.18.13 Event Logs Monitoring/Analysis

1.18.14 Installation Monitoring

1.18.15 Files and Folder Monitoring

1.18.16 Device Drivers Monitoring

1.18.17 Network Traffic Monitoring/Analysis

1.18.18 DNS Monitoring/ Resolution

1.18.19 API Calls Monitoring

7.34 Virus Detection Methods


7.35 Trojan Analysis: ZeuS/Zbot
7.36 Virus Analysis: WannaCry

2. Countermeasures

7.37 Trojan Countermeasures


7.38 Backdoor Countermeasures
7.39 Virus and Worms Countermeasures

3. Anti-Malware Software

7.40 Anti-Trojan Software


7.41 Antivirus Software

4. Malware Penetration Testing

7.42 Malware Penetration Testing

8. Sniffing

Sniffing Concepts

8.1 Network Sniffing


8.2 Types of Sniffing
8.3 How an Attacker Hacks the Network Using Sniffers

Ethical Hacking Certification Training 24 | P a g e


8.4 Protocols Vulnerable to Sniffing
8.5 Sniffing in the Data Link Layer of the OSI Model
8.6 Hardware Protocol Analyzers
8.7 SPAN Port
8.8 Wiretapping
8.9 Lawful Interception

Sniffing Technique: MAC Attacks

8.10 MAC Address/CAM Table


8.11 How CAM Works
8.12 What Happens When CAM Table Is Full?
8.13 MAC Flooding
8.14 Switch Port Stealing
8.15 How to Defend against MAC Attacks

Sniffing Technique: DHCP Attacks

8.16 How DHCP Works


8.17 DHCP Request/Reply Messages
8.18 DHCP Starvation Attack
8.19 Rogue DHCP Server Attack
8.20 How to Defend Against DHCP Starvation and Rogue Server Attack

Sniffing Technique: ARP Poisoning

8.21 What Is Address Resolution Protocol (ARP)?


8.22 ARP Spoofing Attack
8.23 Threats of ARP Poisoning
8.24 ARP Poisoning Tools
8.25 How to Defend Against ARP Poisoning
8.26 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
8.27 ARP Spoofing Detection Tools

Sniffing Technique: Spoofing Attacks

8.28 MAC Spoofing/Duplicating


8.29 MAC Spoofing Technique: Windows
8.30 MAC Spoofing Tools

Ethical Hacking Certification Training 25 | P a g e


8.31 IRDP Spoofing
8.32 How to Defend Against MAC Spoofing

Sniffing Technique: DNS Poisoning

8.33 DNS Poisoning Techniques

 Intranet DNS Spoofing

 Internet DNS Spoofing

 Proxy Server DNS Poisoning

 DNS Cache Poisoning

8.34 How to Defend Against DNS Spoofing

Sniffing Tools

8.35 Sniffing Tool: Wireshark

 Follow TCP Stream in Wireshark

8.36 Display Filters in Wireshark


8.37 Additional Wireshark Filters
8.38 Sniffing Tools
8.39 Packet Sniffing Tools for Mobile

Countermeasures

8.40 How to Defend Against Sniffing

Sniffing Detection Techniques

8.41 How to Detect Sniffing


8.42 Sniffer Detection Techniques

 Ping Method

 DNS Method

 ARP Method

8.43 Promiscuous Detection Tools

 Sniffing Pen Testing

Ethical Hacking Certification Training 26 | P a g e


8.44 Sniffing Penetration Testing

9. Social Engineering

Social Engineering Concepts

9.1 What is Social Engineering?


9.2 Phases of a Social Engineering Attack

Social Engineering Techniques

9.3 Types of Social Engineering


9.4 Human-based Social Engineering

 Impersonation

 Impersonation (Vishing)

 Eavesdropping

 Shoulder Surfing

 Dumpster Diving

 Reverse Social Engineering

 Piggybacking

 Tailgating

9.5 Computer-based Social Engineering

 Phishing

9.6 Mobile-based Social Engineering

 Publishing Malicious Apps

 Repackaging Legitimate Apps

 Fake Security Applications

 SMiShing (SMS Phishing)

Insider Threats

9.7 Insider Threat / Insider Attack


9.8 Type of Insider Threats

Ethical Hacking Certification Training 27 | P a g e


Impersonation on Social Networking Sites

9.9 Social Engineering Through Impersonation on Social Networking Sites


9.10 Impersonation on Facebook
9.11 Social Networking Threats to Corporate Networks

Identity Theft

9.12 Identity Theft

Countermeasures

9.13 Social Engineering Countermeasures


9.14 Insider Threats Countermeasures
9.15 Identity Theft Countermeasures
9.16 How to Detect Phishing Emails?
9.17 Anti-Phishing Toolbar
9.18 Common Social Engineering Targets and Defense Strategies

Social Engineering Pen Testing

9.19 Social Engineering Pen Testing

 Using Emails

 Using Phone

 In Person

9.20 Social Engineering Pen Testing Tools

10. Denial-of-Service

DoS/DDoS Concepts

10.1 What is a Denial-of-Service Attack?


10.2 What is Distributed Denial-of-Service Attack?

DoS/DDoS Attack Techniques

10.3 Basic Categories of DoS/DDoS Attack Vectors


10.4 UDP Flood Attack
10.5 ICMP Flood Attack
10.6 Ping of Death and Smurf Attack

Ethical Hacking Certification Training 28 | P a g e


10.7 SYN Flood Attack
10.8 Fragmentation Attack
10.9 HTTP GET/POST and Slowloris Attacks
10.10 Multi-Vector Attack
10.11 Peer-to-Peer Attacks
10.12 Permanent Denial-of-Service Attack
10.13 Distributed Reflection Denial-of-Service (DRDoS)

Botnets

10.14 Organized Cyber Crime: Organizational Chart


10.15 Botnet
10.16 A Typical Botnet Setup
10.17 Botnet Ecosystem
10.18 Scanning Methods for Finding Vulnerable Machines
10.19 How Malicious Code Propagates?
10.20 Botnet Trojans

DDoS Case Study

10.21 DDoS Attack


10.22 Hackers Advertise Links to Download Botnet
10.23 Use of Mobile Devices as Botnets for Launching DDoS Attacks
10.24 DDoS Case Study: Dyn DDoS Attack

DoS/DDoS Attack Tools

10.25 DoS/DDoS Attack Tools


10.26 DoS and DDoS Attack Tool for Mobile

Countermeasures

10.27 Detection Techniques


10.28 DoS/DDoS Countermeasure Strategies
10.29 DDoS Attack Countermeasures

 Protect Secondary Victims

 Detect and Neutralize Handlers

 Prevent Potential Attacks

Ethical Hacking Certification Training 29 | P a g e


 Deflect Attacks

 Mitigate Attacks

 Post-Attack Forensics

10.30 Techniques to Defend against Botnets


10.31 DoS/DDoS Countermeasures
10.32 DoS/DDoS Protection at ISP Level
10.33 Enabling TCP Intercept on Cisco IOS Software

DoS/DDoS Protection Tools

10.34 Advanced DDoS Protection Appliances


10.35 DoS/DDoS Protection Tools

DoS/DDoS Penetration Testing

10.36 Denial-of-Service (DoS) Attack Pen Testing

11. Session Hijacking

Session Hijacking Concepts

11.1 What is Session Hijacking?


11.2 Why Session Hijacking is Successful?
11.3 Session Hijacking Process
11.4 Packet Analysis of a Local Session Hijack
11.5 Types of Session Hijacking
11.6 Session Hijacking in OSI Model
11.7 Spoofing vs. Hijacking

Application Level Session Hijacking

11.8 Application Level Session Hijacking


11.9 Compromising Session IDs using Sniffing and by Predicting Session Token

How to Predict a Session Token

11.10 Compromising Session IDs Using Man-in-the-Middle Attack


11.11 Compromising Session IDs Using Man-in-the-Browser Attack

Ethical Hacking Certification Training 30 | P a g e


 Steps to Perform Man-in-the-Browser Attack

11.12 Compromising Session IDs Using Client-side Attacks


11.13 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
11.14 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery
Attack
11.15 Compromising Session IDs Using Session Replay Attack
11.16 Compromising Session IDs Using Session Fixation
11.17 Session Hijacking Using Proxy Servers
11.18 Session Hijacking Using CRIME Attack
11.19 Session Hijacking Using Forbidden Attack

Network Level Session Hijacking

11.20 TCP/IP Hijacking


11.21 IP Spoofing: Source Routed Packets
11.22 RST Hijacking
11.23 Blind Hijacking
11.24 UDP Hijacking
11.25 MiTM Attack Using Forged ICMP and ARP Spoofing

Session Hijacking Tools

11.26 Session Hijacking Tools


11.27 Session Hijacking Tools for Mobile

Countermeasures

11.28 Session Hijacking Detection Methods


11.29 Protecting against Session Hijacking
11.30 Methods to Prevent Session Hijacking: To be Followed by Web Developers
11.31 Methods to Prevent Session Hijacking: To be Followed by Web Users
11.32 Session Hijacking Detection Tools
11.33 Approaches Vulnerable to Session Hijacking and their Preventative Solutions
11.34 Approaches to Prevent Session Hijacking
11.35 IPSec

 Components of IPsec

 Benefits of IPsec

Ethical Hacking Certification Training 31 | P a g e


 Modes of IPsec

 IPsec Architecture

 IPsec Authentication and Confidentiality

11.36 Session Hijacking Prevention Tools

Penetration Testing

11.37 Session Hijacking Pen Testing

12. Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts

12.1 Intrusion Detection System (IDS)

 How IDS Detects an Intrusion

 General Indications of Intrusions

 Types of Intrusion Detection Systems

 Types of IDS Alerts

12.2 Firewall

 Firewall Architecture

 DeMilitarized Zone (DMZ)

 Types of Firewalls

 Firewall Technologies

 Packet Filtering Firewall

 Circuit-Level Gateway Firewall

 Application-Level Firewall

 Stateful Multilayer Inspection Firewall

 Application Proxy

 Network Address Translation (NAT)

 Virtual Private Network

Ethical Hacking Certification Training 32 | P a g e


 Firewall Limitations

12.3 Honeypot

 Types of Honeypots

 IDS, Firewall and Honeypot Solutions

12.4 Intrusion Detection Tool

 Snort

 Snort Rules

 Snort Rules: Rule Actions and IP Protocols

 Snort Rules: The Direction Operator and IP Addresses

 Snort Rules: Port Numbers

 Intrusion Detection Tools: TippingPoint and AlienVault® OSSIM™

 Intrusion Detection Tools

 Intrusion Detection Tools for Mobile

12.5 Firewalls

 ZoneAlarm Free Firewall 2018 and Firewall Analyzer

 Firewalls

 Firewalls for Mobile

12.6 Honeypot Tools

 KFSensor and SPECTER

 Honeypot Tools

 Honeypot Tools for Mobile

 Evading IDS

12.7 IDS Evasion Techniques

 Insertion Attack

 Evasion

Ethical Hacking Certification Training 33 | P a g e


 Denial-of-Service Attack (DoS)

 Obfuscating

 False Positive Generation

 Session Splicing

 Unicode Evasion

 Fragmentation Attack

 Overlapping Fragments

 Time-To-Live Attacks

 Invalid RST Packets

 Urgency Flag

 Polymorphic Shellcode

 ASCII Shellcode

 Application-Layer Attacks

 Desynchronization

 Other Types of Evasion

 Evading Firewalls

12.8 Firewall Evasion Techniques

 Firewall Identification

 IP Address Spoofing

 Source Routing

 Tiny Fragments

 Bypass Blocked Sites Using IP Address in Place of URL

 Bypass Blocked Sites Using Anonymous Website Surfing Sites

 Bypass a Firewall Using Proxy Server

 Bypassing Firewall through ICMP Tunneling Method

Ethical Hacking Certification Training 34 | P a g e


 Bypassing Firewall through ACK Tunneling Method

 Bypassing Firewall through HTTP Tunneling Method

 Why do I Need HTTP Tunneling

 HTTP Tunneling Tools

 Bypassing Firewall through SSH Tunneling Method

 SSH Tunneling Tool: Bitvise and Secure Pipes

 Bypassing Firewall through External Systems

 Bypassing Firewall through MITM Attack

 Bypassing Firewall through Content

 Bypassing WAF using XSS Attack

 IDS/Firewall Evading Tools

12.9 IDS/Firewall Evasion Tools


12.10 Packet Fragment Generator Tools

 Detecting Honeypots

12.11 Detecting Honeypots


12.12 Detecting and Defeating Honeypots
12.13 Honeypot Detection Tool: Send-Safe Honeypot Hunter

 IDS/Firewall Evasion Countermeasures

12.14 How to Defend Against IDS Evasion


12.15 How to Defend Against Firewall Evasion

 Penetration Testing

12.16 Firewall/IDS Penetration Testing

 Firewall Penetration Testing

 IDS Penetration Testing

13. Hacking Web Servers

Web Server Concepts

Ethical Hacking Certification Training 35 | P a g e


13.1 Web Server Operations
13.2 Open Source Web Server Architecture
13.3 IIS Web Server Architecture
13.4 Web Server Security Issue
13.5 Why Web Servers Are Compromised?
13.6 Impact of Web Server Attacks

Web Server Attacks

13.7 DoS/DDoS Attacks


13.8 DNS Server Hijacking
13.9 DNS Amplification Attack
13.10 Directory Traversal Attacks
13.11 Man-in-the-Middle/Sniffing Attack
13.12 Phishing Attacks
13.13 Website Defacement
13.14 Web Server Misconfiguration
13.15 HTTP Response Splitting Attack
13.16 Web Cache Poisoning Attack
13.17 SSH Brute Force Attack
13.18 Web Server Password Cracking
13.19 Web Application Attacks

Web Server Attack Methodology

13.20 Information Gathering

 Information Gathering from Robots.txt File

13.21 Web Server Footprinting/Banner Grabbing

 Web Server Footprinting Tools

 Enumerating Web Server Information Using Nmap

13.22 Website Mirroring

 Finding Default Credentials of Web Server

 Finding Default Content of Web Server

 Finding Directory Listings of Web Server

Ethical Hacking Certification Training 36 | P a g e


13.23 Vulnerability Scanning

 Finding Exploitable Vulnerabilities

13.24 Session Hijacking


13.25 Web Server Passwords Hacking
13.26 Using Application Server as a Proxy

Web Server Attack Tools

13.27 Metasploit

 Metasploit Exploit Module

 Metasploit Payload and Auxiliary Module

 Metasploit NOPS Module

 13.28 Web Server Attack Tools

 Countermeasures

13.29 Place Web Servers in Separate Secure Server Security Segment on Network
13.30 Countermeasures

 Patches and Updates

 Protocols

 Accounts

 Files and Directories

13.31 Detecting Web Server Hacking Attempts


13.32 How to Defend Against Web Server Attacks
13.33 How to Defend against HTTP Response Splitting and Web Cache Poisoning
13.34 How to Defend against DNS Hijacking

 Patch Management

13.35 Patches and Hotfixes


13.36 What is Patch Management
13.37 Installation of a Patch
13.38 Patch Management Tools

Ethical Hacking Certification Training 37 | P a g e


 Web Server Security Tools

13.39 Web Application Security Scanners


13.40 Web Server Security Scanners
13.41 Web Server Security Tools

 Web Server Pen Testing

13.42 Web Server Penetration Testing


13.43 Web Server Pen Testing Tools

14. Hacking Web Applications

Web App Concepts

14.1 Introduction to Web Applications


14.2 Web Application Architecture
14.3 Web 2.0 Applications
14.4 Vulnerability Stack

Web App Threats

14.5 OWASP Top 10 Application Security Risks – 2017

A1 – Injection Flaws

 SQL Injection Attacks

 Command Injection Attacks

 Command Injection Example

 File Injection Attack

 LDAP Injection Attacks

A2 – Broken Authentication

A3 – Sensitive Data Exposure

A4 – XML External Entity (XXE)

A5 – Broken Access Control

A6 – Security Misconfiguration

A7 – Cross-Site Scripting (XSS) Attacks

Ethical Hacking Certification Training 38 | P a g e


 Cross-Site Scripting Attack Scenario: Attack via Email

 XSS Attack in Blog Posting

 XSS Attack in Comment Field

 Websites Vulnerable to XSS Attack

A8 – Insecure Deserialization

A9 – Using Components with Known Vulnerabilities

A10 – Insufficient Logging and Monitoring

14.6 Other Web Application Threats

 Directory Traversal

 Unvalidated Redirects and Forwards

 Watering Hole Attack

 Cross-Site Request Forgery (CSRF) Attack

 Cookie/Session Poisoning

 Web Services Architecture

 Web Services Attack

 Web Services Footprinting Attack

 Web Services XML Poisoning

 Hidden Field Manipulation Attack

 Hacking Methodology

14.7 Web App Hacking Methodology


14.8 Footprint Web Infrastructure

 Server Discovery

Ethical Hacking Certification Training 39 | P a g e


 Service Discovery

 Server Identification/Banner Grabbing

 Detecting Web App Firewalls and Proxies on Target Site

 Hidden Content Discovery

 Web Spidering Using Burp Suite

 Web Crawling Using Mozenda Web Agent Builder

14.9 Attack Web Servers


14.10 Analyze Web Applications

 Identify Entry Points for User Input

 Identify Server- Side Technologies

 Identify Server- Side Functionality

 Map the Attack Surface

14.11 Bypass Client-Side Controls

 Attack Hidden Form Fields

 Attack Browser Extensions

 Perform Source Code Review

14.12 Attack Authentication Mechanism

User Name Enumeration

 Password Attacks: Password Functionality Exploits

 Password Attacks: Password Guessing and Brute-forcing

 Session Attacks: Session ID Prediction/Brute-forcing

 Cookie Exploitation: Cookie Poisoning

14.13 Attack Authorization Schemes

 HTTP Request Tampering

 Cookie Parameter Tampering

Ethical Hacking Certification Training 40 | P a g e


14.14 Attack Access Controls
14.15 Attack Session Management Mechanism

 Attacking Session Token Generation Mechanism

 Attacking Session Tokens Handling Mechanism: Session Token Sniffing

14.16 Perform Injection/Input Validation Attacks


14.17 Attack Application Logic Flaws
14.18 Attack Database Connectivity

 Connection String Injection

 Connection String Parameter Pollution (CSPP) Attacks

 Connection Pool DoS

14.19 Attack Web App Client


14.20 Attack Web Services

 Web Services Probing Attacks

 Web Service Attacks: SOAP Injection

 Web Service Attacks: XML Injection

 Web Services Parsing Attacks

 Web Service Attack Tools

 Web App Hacking Tools

14.21 Web Application Hacking Tools

Countermeasures
14.22 Web Application Fuzz Testing
14.23 Source Code Review
14.24 Encoding Schemes
14.25 How to Defend Against Injection Attacks
14.26 Web Application Attack Countermeasures
14.27 How to Defend Against Web Application Attacks

Web App Security Testing Tools

Ethical Hacking Certification Training 41 | P a g e


14.28 Web Application Security Testing Tools
14.29 Web Application Firewall

Web App Pen Testing

14.30 Web Application Pen Testing

 Information Gathering

 Configuration Management Testing

 Authentication Testing

 Session Management Testing

 Authorization Testing

 Data Validation Testing

 Denial-of-Service Testing

 Web Services Testing

 AJAX Testing

14.31 Web Application Pen Testing Framework

15. SQL Injection

SQL Injection Concepts

15.1 What is SQL Injection?


15.2 SQL Injection and Server-side Technologies
15.3 Understanding HTTP POST Request
15.4 Understanding Normal SQL Query
15.5 Understanding an SQL Injection Query
15.6 Understanding an SQL Injection Query – Code Analysis
15.7 Example of a Web Application Vulnerable to SQL Injection: aspx
15.8 Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
15.9 Examples of SQL Injection

Types of SQL Injection

15.10 Types of SQL injection

Ethical Hacking Certification Training 42 | P a g e


 In-Band SQL Injection

 Error Based SQL Injection

 Union SQL Injection

 Blind/Inferential SQL Injection

 No Error Messages Returned

 Blind SQL Injection: WAITFOR DELAY (YES or NO Response)

 Blind SQL Injection: Boolean Exploitation and Heavy Query

 Out-of-Band SQL injection

 SQL Injection Methodology

15.11 SQL Injection Methodology

 Information Gathering and SQL Injection Vulnerability Detection

 Information Gathering

 Identifying Data Entry Paths

 Extracting Information through Error Messages

 Testing for SQL Injection

 Additional Methods to Detect SQL Injection

 SQL Injection Black Box Pen Testing

 Source Code Review to Detect SQL Injection Vulnerabilities

 Testing for Blind SQL Injection Vulnerability in MySQL and MSSQL

 Launch SQL Injection Attacks

 Perform Union SQL Injection

 Perform Error Based SQL Injection

 Perform Error Based SQL Injection using Stored Procedure Injection

 Bypass Website Logins Using SQL Injection

Ethical Hacking Certification Training 43 | P a g e


 Perform Blind SQL Injection – Exploitation (MySQL)

 Blind SQL Injection – Extract Database User

 Blind SQL Injection – Extract Database Name

 Blind SQL Injection – Extract Column Name

 Blind SQL Injection – Extract Data from ROWS

 Perform Double Blind SQL Injection – Classical Exploitation (MySQL)

 Perform Blind SQL Injection Using Out of Band Exploitation Technique

 Exploiting Second-Order SQL Injection

 Bypass Firewall using SQL Injection

 Perform SQL Injection to Insert a New User and Update Password

 Exporting a Value with Regular Expression Attack

 Advanced SQL Injection

 Database, Table, and Column Enumeration

 Advanced Enumeration

 Features of Different DBMSs

 Creating Database Accounts

 Password Grabbing

 Grabbing SQL Server Hashes

 Extracting SQL Hashes (In a Single Statement

 Transfer Database to Attacker’s Machine

 Interacting with the Operating System

 Interacting with the File System

 Network Reconnaissance Using SQL Injection

 Finding and Bypassing Admin Panel of a Website

 PL/SQL Exploitation
Ethical Hacking Certification Training 44 | P a g e
 Creating Server Backdoors using SQL Injection

 SQL Injection Tools

15.12 SQL Injection Tools

 SQL Power Injector and sqlmap

 The Mole and jSQL Injection

15.13 SQL Injection Tools


15.14 SQL Injection Tools for Mobile

 Evasion Techniques

15.15 Evading IDS


15.16 Types of Signature Evasion Techniques

 In-line Comment

 Char Encoding

 String Concatenation

 Obfuscated Codes

 Manipulating White Spaces

 Hex Encoding

 Sophisticated Matches

 URL Encoding

 Null Byte

 Case Variation

 Declare Variable

 IP Fragmentation

 Countermeasures

15.17 How to Defend Against SQL Injection Attacks

 Use Type-Safe SQL Parameters

Ethical Hacking Certification Training 45 | P a g e


15.18 SQL Injection Detection Tools

 IBM Security AppScan and Acunetix Web Vulnerability Scanner

 Snort Rule to Detect SQL Injection Attacks

15.19 SQL Injection Detection Tools

16. Hacking Wireless Networks

Wireless Concepts

16.1 Wireless Terminologies


16.2 Wireless Networks
16.3 Wireless Standards
16.4 Service Set Identifier (SSID)
16.5 Wi-Fi Authentication Modes
16.6 Wi-Fi Authentication Process Using a Centralized Authentication Server
16.7 Types of Wireless Antennas

Wireless Encryption

16.8 Types of Wireless Encryption

 WEP (Wired Equivalent Privacy) Encryption

 WPA (Wi-Fi Protected Access) Encryption

 WPA2 (Wi-Fi Protected Access 2) Encryption

16.9 WEP vs. WPA vs. WPA2


16.10 WEP Issues
16.11 Weak Initialization Vectors (IV)

Wireless Threats

16.12 Wireless Threats

 Rogue Access Point Attack

 Client Mis-association

 Misconfigured Access Point Attack

 Unauthorized Association

Ethical Hacking Certification Training 46 | P a g e


 Ad Hoc Connection Attack

 Honeypot Access Point Attack

 AP MAC Spoofing

 Denial-of-Service Attack

 Key Reinstallation Attack (KRACK)

 Jamming Signal Attack

 Wi-Fi Jamming Devices

 Wireless Hacking Methodology

16.13 Wireless Hacking Methodology

 Wi-Fi Discovery

 Footprint the Wireless Network

 Find Wi-Fi Networks in Range to Attack

 Wi-Fi Discovery Tools

 Mobile-based Wi-Fi Discovery Tools

 GPS Mapping

 GPS Mapping Tools

 Wi-Fi Hotspot Finder Tools

 How to Discover Wi-Fi Network Using Wardriving

 Wireless Traffic Analysis

 Choosing the Right Wi-Fi Card

 Wi-Fi USB Dongle: AirPcap

 Wi-Fi Packet Sniffer

 Perform Spectrum Analysis

 Launch Wireless Attacks

 Aircrack-ng Suite

Ethical Hacking Certification Training 47 | P a g e


 How to Reveal Hidden SSIDs

 Fragmentation Attack

 How to Launch MAC Spoofing Attack

 Denial-of-Service: Disassociation and Deauthentication Attacks

 Man-in-the-Middle Attack

 MITM Attack Using Aircrack-ng

 Wireless ARP Poisoning Attack

 Rogue Access Points

 Evil Twin

 How to Set Up a Fake Hotspot (Evil Twin)

 Crack Wi-Fi Encryption

 How to Break WEP Encryption

 How to Crack WEP Using Aircrack-ng

 How to Break WPA/WPA2 Encryption

 How to Crack WPA-PSK Using Aircrack-ng

 WEP Cracking and WPA Brute Forcing Using Cain & Abel

Wireless Hacking Tools

16.14 WEP/WPA Cracking Tools


16.15 WEP/WPA Cracking Tool for Mobile
16.16 Wi-Fi Sniffer
16.17 Wi-Fi Traffic Analyzer Tools
16.18 Other Wireless Hacking Tools

Bluetooth Hacking

16.19 Bluetooth Stack


16.20 Bluetooth Hacking
16.21 Bluetooth Threats

Ethical Hacking Certification Training 48 | P a g e


16.22 How to BlueJack a Victim
16.23 Bluetooth Hacking Tools

Countermeasures

16.24 Wireless Security Layers


16.25 How to Defend Against WPA/WPA2 Cracking
16.26 How to Defend Against KRACK Attacks
16.27 How to Detect and Block Rogue AP
16.28 How to Defend Against Wireless Attacks
16.29 How to Defend Against Bluetooth Hacking

Wireless Security Tools

16.30 Wireless Intrusion Prevention Systems


16.31 Wireless IPS Deployment
16.32 Wi-Fi Security Auditing Tools
16.33 Wi-Fi Intrusion Prevention System
16.34 Wi-Fi Predictive Planning Tools
16.35 Wi-Fi Vulnerability Scanning Tools
16.36 Bluetooth Security Tools
16.37 Wi-Fi Security Tools for Mobile

Wireless Pen Testing

16.38 Wireless Penetration Testing


16.39 Wireless Penetration Testing Framework

 Pen Testing for General Wi-Fi Network Attack

 Pen Testing WEP Encrypted WLAN

 Pen Testing WPA/WPA2 Encrypted WLAN

 Pen Testing LEAP Encrypted WLAN

 Pen Testing Unencrypted WLAN

17. Hacking Mobile Platforms

Mobile Platform Attack Vectors

Ethical Hacking Certification Training 49 | P a g e


17.1 Vulnerable Areas in Mobile Business Environment
17.2 OWASP Top 10 Mobile Risks – 2016
17.3 Anatomy of a Mobile Attack
17.4 How a Hacker can Profit from Mobile when Successfully Compromised
17.5 Mobile Attack Vectors and Mobile Platform Vulnerabilities
17.6 Security Issues Arising from App Stores
17.7 App Sandboxing Issues
17.8 Mobile Spam
17.9 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)

SMS Phishing Attack Examples

17.10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections

Hacking Android OS

17.11 Android OS

Android Device Administration API

17.12 Android Rooting

 Rooting Android Using KingoRoot

 Android Rooting Tools

17.13 Blocking Wi-Fi Access using NetCut


17.14 Hacking with zANTI
17.15 Hacking Networks Using Network Spoofer
17.16 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
17.17 Performing Session Hijacking Using DroidSheep
17.18 Hacking with Orbot Proxy
17.19 Android-based Sniffers
17.20 Android Trojans
17.21 Securing Android Devices
17.22 Android Security Tool: Find My Device
17.23 Android Security Tools
17.24 Android Vulnerability Scanner
17.25 Android Device Tracking Tools
Ethical Hacking Certification Training 50 | P a g e
Hacking iOS

17.26 Apple iOS


17.27 Jailbreaking iOS

 Jailbreaking Techniques

 Jailbreaking of iOS 11.2.1 Using Cydia

 Jailbreaking of iOS 11.2.1 Using Pangu Anzhuang

 Jailbreaking Tools

17.28 iOS Trojans


17.29 Guidelines for Securing iOS Devices
17.30 iOS Device Tracking Tools
17.31 iOS Device Security Tools

Mobile Spyware

17.32 Mobile Spyware


17.33 Mobile Spyware: mSpy
17.34 Mobile Spywares

Mobile Device Management


17.35 Mobile Device Management (MDM)
17.36 Mobile Device Management Solutions
17.37 Bring Your Own Device (BYOD)

 BYOD Risks

 BYOD Policy Implementation

 BYOD Security Guidelines

Mobile Security Guidelines and Tools

17.38 General Guidelines for Mobile Platform Security


17.39 Mobile Device Security Guidelines for Administrator
17.40 SMS Phishing Countermeasures
17.41 Mobile Protection Tools
17.42 Mobile Anti-Spyware

Mobile Pen Testing


Ethical Hacking Certification Training 51 | P a g e
17.43 Android Phone Pen Testing
17.44 iPhone Pen Testing
17.45 Mobile Pen Testing Toolkit: Hackode

18. IoT Hacking

IoT Concepts

18.1 What is IoT


18.2 How IoT Works
18.3 IoT Architecture
18.4 IoT Application Areas and Devices
18.5 IoT Technologies and Protocols
18.6 IoT Communication Models
18.7 Challenges of IoT
18.8 Threat vs Opportunity

IoT Attacks

18.9 IoT Security Problems


18.10 OWASP Top 10 IoT Vulnerabilities and Obstacles
18.11 IoT Attack Surface Areas
18.12 IoT Threats
18.13 Hacking IoT Devices: General Scenario
18.14 IoT Attacks

 DDoS Attack

 Exploit HVAC

 Rolling Code Attack

 BlueBorne Attack

 Jamming Attack

 Hacking Smart Grid / Industrial Devices: Remote Access using Backdoor

 Other IoT Attacks

18.15 IoT Attacks in Different Sectors


18.16 Case Study: Dyn Attack

Ethical Hacking Certification Training 52 | P a g e


IoT Hacking Methodology

 18.17 What is IoT Device Hacking?


18.18 IoT Hacking Methodology

 Information Gathering Using Shodan

 Information Gathering using MultiPing

 Vulnerability Scanning using Nmap

 Vulnerability Scanning using RIoT Vulnerability Scanner

 Sniffing using Foren6

 Rolling code Attack using RFCrack

 Hacking Zigbee Devices with Attify Zigbee Framework

 BlueBorne Attack Using HackRF One

 Gaining Remote Access using Telnet

 Maintain Access by Exploiting Firmware

 IoT Hacking Tools

18.19 Information Gathering Tools


18.20 Sniffing Tools
18.21 Vulnerability Scanning Tools
18.22 IoT Hacking Tools

Countermeasures

18.23 How to Defend Against IoT Hacking


18.24 General Guidelines for IoT Device Manufacturing Companies
18.25 OWASP Top 10 IoT Vulnerabilities Solutions
18.26 IoT Framework Security Considerations
18.27 IoT Security Tools

IoT Pen Testing

18.28 IoT Pen Testing

19. Cloud Computing

Ethical Hacking Certification Training 53 | P a g e


Cloud Computing Concepts

19.1 Introduction to Cloud Computing


19.2 Separation of Responsibilities in Cloud
19.3 Cloud Deployment Models
19.4 NIST Cloud Deployment Reference Architecture
19.5 Cloud Computing Benefits
19.6 Understanding Virtualization

Cloud Computing Threats

19.7 Cloud Computing Threats

Cloud Computing Attacks

19.8 Service Hijacking using Social Engineering Attacks


19.9 Service Hijacking using Network Sniffing
19.10 Session Hijacking using XSS Attack
19.11 Session Hijacking using Session Riding
19.12 Domain Name System (DNS) Attacks
19.13 Side Channel Attacks or Cross-guest VM Breaches
19.14 SQL Injection Attacks
19.15 Cryptanalysis Attacks
19.16 Wrapping Attack
19.17 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
19.18 Man-in-the-Cloud Attack

Cloud Security

19.19 Cloud Security Control Layers


19.20 Cloud Security is the Responsibility of both Cloud Provider and Consumer
19.21 Cloud Computing Security Considerations
19.22 Placement of Security Controls in the Cloud
19.23 Best Practices for Securing Cloud
19.24 NIST Recommendations for Cloud Security
19.25 Organization/Provider Cloud Security Compliance Checklist

Cloud Security Tools

19.26 Cloud Security Tools

Ethical Hacking Certification Training 54 | P a g e


Cloud Penetration Testing

19.27 What is Cloud Pen Testing?


19.28 Key Considerations for Pen Testing in the Cloud
19.29 Cloud Penetration Testing
19.30 Recommendations for Cloud Testing

20. Cryptography

Cryptography Concepts

20.1 Cryptography

Types of Cryptography

20.2 Government Access to Keys (GAK)

Encryption Algorithms
20.3 Ciphers
20.4 Data Encryption Standard (DES)
20.5 Advanced Encryption Standard (AES)
20.6 RC4, RC5, and RC6 Algorithms
20.7 Twofish
20.8 The DSA and Related Signature Schemes
20.9 Rivest Shamir Adleman (RSA)
20.10 Diffie-Hellman
20.11 Message Digest (One-Way Hash) Functions

 Message Digest Function: MD5

 Secure Hashing Algorithm (SHA)

 RIPEMD – 160

 HMAC

 Cryptography Tools

20.12 MD5 Hash Calculators


20.13 Hash Calculators for Mobile
20.14 Cryptography Tools

Ethical Hacking Certification Training 55 | P a g e


 Advanced Encryption Package 2017

 BCTextEncoder

 Cryptography Tools

20.15 Cryptography Tools for Mobile

Public Key Infrastructure (PKI)

20.16 Public Key Infrastructure (PKI)

 Certification Authorities

 Signed Certificate (CA) Vs. Self Signed Certificate

 Email Encryption

20.17 Digital Signature


20.18 Secure Sockets Layer (SSL)
20.19 Transport Layer Security (TLS)
20.20 Cryptography Toolkit

 OpenSSL

 Keyczar

20.21 Pretty Good Privacy (PGP)

Disk Encryption

20.22 Disk Encryption


20.23 Disk Encryption Tools

 VeraCrypt

 Symantec Drive Encryption

 Disk Encryption Tools

 Cryptanalysis

20.24 Cryptanalysis Methods

 Linear Cryptanalysis

 Differential Cryptanalysis

Ethical Hacking Certification Training 56 | P a g e


 Integral Cryptanalysis

20.25 Code Breaking Methodologies


20.26 Cryptography Attacks

 Brute-Force Attack

 Birthday Attack

 Birthday Paradox: Probability

 Meet-in-the-Middle Attack on Digital Signature Schemes

 Side Channel Attack

 Hash Collision Attack

 DUHK Attack

 Rainbow Table Attack

20.27 Cryptanalysis Tools


20.28 Online MD5 Decryption Tools

 Countermeasures

20.29 How to Defend Against Cryptographic Attacks

Project Work

Ethical Hacker Projects Covered


Threat Detection

Being a part of your organization’s Ethical Hacking team, you need to detect threats and
data breaches through in-depth strategies to predict and protect your company from
cybercrimes.

Cracking Wifi

You have to use various tools, technologies, and techniques to crack WPA/WPA2 wifi
routers.

Ethical Hacking Certification Training 57 | P a g e


Certification
After the completion of the course, you will get a certificate from Intellipaat.

Intellipaat Success Stories

Tushar Patil

Excellent course The manner in which Intellipaat conducted the course was really good. The
trainer was extremely knowledgable. The biggest plus point of this course was the support. I was
able to ask my concern and they were readily available for assistance. I highly recommend
Intellipaat if you are planning to learn any trending technology.

Ethical Hacking Certification Training 58 | P a g e


Vishal Pentakota

The best part of this course is the series of hands-on demonstrations that the trainer performed.
Not only did he explain each concept theoretically, but also implemented all those concepts
practically. Great job. Must go for beginners.

Rinki Dutta

The Cyber Security online training course I completed with Intellipaat was great. The
trainer was really helpful in explaining all topics in depth. I was able to understand the
topics clearly. The trainer also used real-life examples in order to explain complicated
modules and topics. The online sessions were also extremely helpful.

CONTACT US
INTELLIPAAT SOFTWARE SOLUTIONS PVT. LTD.

Bangalore
AMR Tech Park 3, Ground Floor, Tower B,
Hongasandra Village, Bommanahalli,
Hosur Road, Bangalore – 560068

USA
1219 E. Hillsdale Blvd. Suite 205,
Foster City, CA 94404

Ethical Hacking Certification Training 59 | P a g e


If you have any further queries or just want to have a conversation with us, then do call us.

IND: +91-7022374614 | US: 1-800-216-8930

Ethical Hacking Certification Training 60 | P a g e

You might also like