get paid to paste

Key Features of CEH v7

Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques.

Well organized content for a better understanding and learning experience.

Concepts are well-illustrated to create self-explanatory slides.

Diagrammatic representation of concepts and attacks.

Industry standard key tools are featured in detail and other tools are presented as a list for students to try.

Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment.

The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security.

A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are tested against latest Operating Systems with all the patches and hot fixes applied.

Course Outline - Certified Ethical Hacker (CEH v7.1)

Module 00 - Student Introduction

Student Introduction

Course Materials

CEHv7 Course Outline

EC-Council Certification Program

Certified Ethical Hacker Track

CEHv7 Exam Information

Lab Sessions

What Does CEH Teach You?

What CEH is NOT?

Remember This!

CEH Class Speed

Live Hacking Website

Let’s Start Hacking!

Module 01 - Introduction to Ethical Hacking

Module Flow: Info Security Overview

Security News

Case Study

Scenario: How Simple Things Can Get You into Trouble?

Internet Crime Current Report: IC3

Data Breach Investigations Report

Types of Data Stolen From the Organizations

Essential Terminologies

Elements of Information Security

Authenticity and Non-Repudiation

The Security, Functionality, and Usability Triangle

Security Challenges

Module Flow: Hacking Concepts

Effects of Hacking

Effects of Hacking on Business

Who is a Hacker?

Hacker Classes

Hacktivism

Module Flow: Hacking Phases

What Does a Hacker Do?

Phase 1 - Reconnaissance

Phase 2 - Scanning

Phase 3 - Gaining Access

Phase 4 - Maintaining Access

Phase 5 - Covering Tracks

Module Flow: Types of Attacks

Types of Attacks on a System

Operating System Attacks

Application-Level Attacks

Shrink Wrap Code Attacks

Misconfiguration Attacks

Module Flow: Ethical Hacking

Why Ethical Hacking is Necessary?

Defense in Depth

Scope and Limitations of Ethical Hacking

What Do Ethical Hackers Do?

Skills of an Ethical Hacker

Module Flow: Vulnerability Research

Vulnerability Research

Vulnerability Research Websites

Demo - Vulnerability Research Website

What is Penetration Testing?

Why Penetration Testing?

Penetration Testing Methodology

Quotes

Module 01 Review 

Module 02 - Footprinting and Reconnaissance

Module Flow: Footprinting Concepts

Security News

Footprinting Terminologies

What is Footprinting?

Objectives of Footprinting

Module Flow: Footprinting Threats

Footprinting Threats

Module Flow: Footprinting Methodology

Footprinting Methodology: Internet Footprinting

Finding a Company's URL

Locate Internal URLs

Public and Restricted Websites

Search for Company's Information

Tools to Extract Company's Data

Footprinting Through Search Engines

Demo - Footprinting Through Search Engines

Collect Location Information

Satellite Picture of a Residence

People Search

People Search Using http://pipl.com

People Search Online Services

Demo - People Search Using Online Services

People Search on Social Networking Services

Gather Information from Financial Services

Footprinting Through Job Sites

Monitoring Target Using Alerts

Footprinting Methodology: Competitive Intelligence

Competitive Intelligence Gathering

Competitive Intelligence - When Did this Company Begin? How Did it Develop?

Competitive Intelligence - What are the Company's Plans?

Competitive Intelligence - What Expert Opinion Say About the Company?

Competitive Intelligence Tools

Competitive Intelligence Consulting Companies

Footprinting Methodology: WHOIS Footprinting

WHOIS Lookup

WHOIS Lookup Result Analysis

WHOIS Lookup Tools: SmartWhois

Demo - SmartWhois

WHOIS Lookup Tools

WHOIS Lookup Online Tools

Footprinting Methodology: DNS Footprinting

Extracting DNS Information

Demo - DNS Overview

DNS Interrogation Tools

DNS Interrogation Online Tools

Footprinting Methodology: Network Footprinting

Locate the Network Range

Traceroute

Traceroute Analysis

Traceroute Tool: 3D Traceroute

Traceroute Tool: LoriotPro

Traceroute Tool: Path Analyzer Pro

Traceroute Tools

Footprinting Methodology: Website Footprinting

Mirroring Entire Website

Demo - HTTrack and Website Watcher

Website Mirroring Tools

Mirroring Entire Website Tools

Extract Website Information from http://www.archive.org

Monitoring Web Updates Using Website Watcher

Footprinting Methodology: E-mail Footprinting

Tracking Email Communications

Email Tracking Tools

Demo - Tracking Emails with ReadNotify

Footprinting Methodology: Google Hacking

Footprint Using Google Hacking Techniques

What a Hacker Can Do With Google Hacking?

Google Advance Search Operators

Finding Resources using Google Advance Operator

Demo - Google Hacking

Google Hacking Tool: Google Hacking Database (GHDB)

Google Hacking Tools

Module Flow: Footprinting Tools

Additional Footprinting Tools

Module Flow: Footprinting Countermeasures

Footprinting Countermeasures

Module Flow: Footprinting Pen Testing

Footprinting Pen Testing

Quotes

Module 02 Summary 

Module 03 - Scanning Networks

Scanning Networks

Security News

Network Scanning

Types of Scanning

CEH Scanning Methodology: Check for Live System

Checking for Live Systems - ICMP Scanning

Ping Sweep

Ping Sweep Tools

Demo - Angry IP

CEH Scanning Methodology: Check for Open Ports

Three-Way Handshake

TPC Communication Flags

Create Custom Packet using TCP Flags

Hping2/Hping3

Hping3 Screenshot

Hping Commands

Scanning Techniques

TCP Connect/Full Open Scan

Stealth Scan (Half-open Scan)

Xmas Scan

FIN Scan

NULL Scan

IDLE Scan

IDLE Scan: Step 1

IDLE Scan: Step 2.1 (Open Port)

IDLE Scan: Step 2.2 (Closed Port)

IDLE Scan: Step 3

ICMP Echo Scanning/List Scan

SYN/FIN Scanning Using IP Fragments

UDP Scanning

Inverse TCP Flag Scanning

ACK Flag Scanning

Scanning: IDS Evasion Techniques

IP Fragmentation Tools

Scanning Tool: Nmap

Nmap

Demo - Nmap

Scanning Tool: NetScan Tools Pro

Scanning Tools

Do Not Scan These IP Addresses

Scanning Countermeasures

War Dialing

Why War Dialing?

War Dialing Tools

War Dialing Countermeasures

War Dialing Countermeasures: SandTrap Tool

CEH Scanning Methodology: Banner Grabbing

OS Fingerprinting

Active Banner Grabbing Using Telnet

Demo - Banner Grabbing Using Telnet

Banner Grabbing Tool: ID Serve

GET REQUESTS

Banner Grabbing Tool: Netcraft

Demo - Footprinting Webservers Using Netcraft

Banner Grabbing Tools

Banner Grabbing Countermeasures: Disabling or Changing Banner

Hiding File Extensions

Hiding File Extensions from Webpages

CEH Scanning Methodology: Scan for Vulnerability

Vulnerability Scanning

Nessus: Screenshot

Demo - Vulnerability Scanning with Nessus

Vulnerability Scanning Tool: SAINT

GFI LANGuard

Network Vulnerability Scanners

CEH Scanning Methodology: Draw Network Diagrams

LANsurveyor

LANsurveyor: Screenshot

Network Mappers

CEH Scanning Methodology: Prepare Proxies

Proxy Servers

Why Attackers Use Proxy Servers?

Use of Proxies for Attack

How Does MultiProxy Work?

Free Proxy Servers

Proxy Workbench

Proxifier Tool: Create Chain of Proxy Servers

SocksChain

TOR (The Onion Routing)

TOR Proxy Chaining Software

HTTP Tunneling Techniques

Why do I Need HTTP Tunneling?

Super Network Tunnel Tool

Httptunnel for Windows

Additional HTTP Tunneling Tools

SSH Tunneling

SSL Proxy Tool

How to Run SSL Proxy?

Proxy Tools

Anonymizers

Types of Anonymizers

Case: Bloggers Write Text Backwards to Bypass Web Filters in China

Text Conversion to Avoid Filters

Censorship Circumvention Tool: Psiphon

How Psiphon Works?

Psiphon: Screenshot

How to Check if Your Website is Blocked in China or Not?

G-Zapper

Anonymizers (Cont.)

Spoofing IP Address

IP Spoofing Detection Techniques: Direct TTL Probes

IP Spoofing Detection Techniques: IP Identification Number

IP Spoofing Detection Techniques: TCP Flow Control Method

IP Spoofing Countermeasures

Scanning Penetration Testing

Scanning Pen Testing

Quotes

Module 03 Review 

Module 04 - Enumeration

Module Flow: Enumeration Concepts

Security News

What is Enumeration?

Techniques of Enumeration

Module Flow: NetBIOS Enumeration

Netbios Enumeration

NetBIOS Enumeration Tool: SuperScan

Demo - Enumerating Users Using Null Sessions

NetBIOS Enumeration Tool: NetBIOS Enumerator

Enumerating User Accounts

Enumerate Systems Using Default Passwords

Module Flow: SNMP Enumeration

SNMP (Simple Network Management Protocol) Enumeration

Management Information Base (MIB)

SNMP Enumeration Tool: OpUtils Network Monitoring Toolset

SNMP Enumeration Tool: SolarWinds

Demo - SNMP Enumeration with Solar Winds

SNMP Enumeration Tools

Module Flow: UNIX/Linux Enumeration

UNIX/Linux Enumeration

Linux Enumeration Tool: Enum4linux

Module Flow: LDAP Enumeration

LDAP Enumeration

LDAP Enumeration Tool: JXplorer

LDAP Enumeration Tool

Module Flow: NTP Enumeration

NTP Enumeration

NTP Server Discovery Tool: NTP Server Scanner

NTP Server: PresenTense Time Server

NTP Enumeration Tools

Module Flow: SMTP Enumeration

SMTP Enumeration

SMTP Enumeration Tool: NetScanTools Pro

Module Flow: DNS Enumeration

DNS Zone Transfer Enumeration Using nslookup

Demo - Enumerating DNS Using nslookup

DNS Analyzing and Enumeration Tool: The Men & Mice Suite

Module Flow: Enumeration Countermeasures

Enumeration Countermeasures

SMB Enumeration Countermeasures

Module Flow: Enumeration Pen Testing

Enumeration Pen Testing

Quotes

Module 04 Review 

Module 05 - System Hacking

System Hacking

Security News

Information at Hand Before System Hacking Stage

System Hacking: Goals

CEH Hacking Methodology (CHM)

CEH System Hacking Steps: Cracking Passwords

Password Cracking

Password Complexity

Password Cracking Techniques

Demo - Password Cracking with Cain

Types of Password Attacks

Passive Online Attacks: Wire Sniffing

Password Sniffing

Passive Online Attack: Man-in-the-Middle and Replay Attack

Active Online Attack: Password Guessing

Active Online Attack: Trojan/Spyware/Keylogger

Active Online Attack: Hash Injection Attack

Rainbow Attacks: Pre-Computed Hash

Distributed Network Attack

Elcomsoft Distributed Password Recovery

Demo - Distributed Password Cracking with Elcomsoft

Non-Electronic Attacks

Demo - Spytector

Default Passwords

Manual Password Cracking (Guessing)

Automatic Password Cracking Algorithm

Stealing Passwords Using USB Drive

Microsoft Authentication

How Hash Passwords are Stored in Windows SAM?

What is LAN Manager Hash?

LM "Hash" Generation

LM, NTLMv1, and NTLMv2

NTLM Authentication Process

Kerberos Authentication

Salting

PWdump7 and Fgdump

L0phtCrack

Ophcrack

Cain & Abel

RainbowCrack

Password Cracking Tools

LM Hash Backward Compatibility

How to Disable LM HASH?

How to Defend against Password Cracking?

Implement and Enforce Strong Security Policy

CEH System Hacking Steps: Escalating Privileges

Privilege Escalation

Escalation of Privileges

Active@Password Changer

Privilege Escalation Tools

How to Defend against Privilege Escalation?

CEH System Hacking Steps: Executing Applications

Executing Applications

Alchemy Remote Executor

RemoteExec

Execute This!

Keylogger

Types of Keystroke Loggers

Acoustic/CAM Keylogger

Keylogger: Advanced Keylogger

Keylogger: Spytech SpyAgent

Keylogger: Perfect Keylogger

Keylogger: Powered Keylogger

Keylogger for Mac: Aobo Mac OS X KeyLogger

Keylogger for Mac: Perfect Keylogger for Mac

Hardware Keylogger: KeyGhost

Keyloggers

Spyware

What Does the Spyware Do?

Types of Spywares

Desktop Spyware

Desktop Spyware: Activity Monitor

Desktop Spyware (Cont.)

Email and Internet Spyware

Email and Internet Spyware: eBLASTER

Internet and E-mail Spyware

Child Monitoring Spyware

Child Monitoring Spyware: Advanced Parental Control

Child Monitoring Spyware (Cont.)

Screen Capturing Spyware

Screen Capturing Spyware: Spector Pro

Screen Capturing Spyware (Cont.)

USB Spyware

USB Spyware: USBDumper

USB Spyware (Cont.)

Audio Spyware

Audio Spyware: RoboNanny, Stealth Recorder Pro and Spy Voice Recorder

Video Spyware

Video Spyware: Net Video Spy

Video Spyware (Cont.)

Print Spyware

Print Spyware: Printer Activity Monitor

Print Spyware (Cont.)

Telephone/Cellphone Spyware

Cellphone Spyware: Mobile Spy

Telephone/Cellphone Spyware (Cont.)

GPS Spyware

GPS Spyware: GPS TrackMaker

GPS Spyware (Cont.)

How to Defend against Keyloggers?

Anti-Keylogger

Anti-Keylogger: Zemana AntiLogger

Anti-Keyloggers

How to Defend against Spyware?

Anti-Spyware: Spyware Doctor

Anti-Spywares

CEH System Hacking Steps: Hiding Files

Rootkits

Types of Rootkits

How Rootkit Works?

Rootkit: Fu

Demo - Fu Rootkit

Detecting Rootkits

Steps for Detecting Rootkits

How to Defend against Rootkits?

Anti-Rootkit: RootkitRevealer and McAfee Rootkit Detective

Anti-Rootkits

NTFS Data Stream

How to Create NTFS Streams?

NTFS Stream Manipulation

How to Defend against NTFS Streams?

Demo - Creating Alternate Data Streams

NTFS Stream Detector: ADS Scan Engine

NTFS Stream Detectors

What is Steganography?

Steganography Techniques

How Steganography Works?

Types of Steganography

Whitespace Steganography Tool: SNOW

Image Steganography

Image Steganography: Hermetic Stego

Image Steganography Tools

Document Steganography: wbStego

Document Steganography Tools

Video Steganography: Our Secret

Video Steganography Tools

Audio Steganography: Mp3stegz

Audio Steganography Tools

Folder Steganography: Invisible Secrets 4

Demo - Steganography

Folder Steganography Tools

Spam/Email Steganography: Spam Mimic

Natural Text Steganography: Sams Big G Play Maker

Steganalysis

Steganalysis Methods/Attacks on Steganography

Steganography Detection Tool: Stegdetect

Steganography Detection Tools

CEH System Hacking Steps: Covering Tracks

Why Cover Tracks?

Covering Tracks

Ways to Clear Online Tracks

Disabling Auditing: Auditpol

Covering Tracks Tool: Window Washer

Covering Tracks Tool: Tracks Eraser Pro

Track Covering Tools

CEH System Hacking Steps: Penetration Testing

Password Cracking (Cont.)

Privilege Escalation (Cont.)

Executing Applications (Cont.)

Hiding Files

Covering Tracks (Cont.)

Quotes

Module 05 Review 

Module 06 - Trojans and Backdoors

Module Flow: Trojan Concepts

Security News

What is a Trojan?

Overt and Covert Channels

Purpose of Trojans

What Do Trojan Creators Look For?

Indications of a Trojan Attack

Common Ports used by Trojans

Module Flow: Trojan Infection

How to Infect Systems Using a Trojan?

Wrappers

Wrapper Covert Programs

Different Ways a Trojan can Get into a System

How to Deploy a Trojan?

Evading Anti-Virus Techniques

Module Flow: Types of Trojans

Types of Trojans

Command Shell Trojans

Command Shell Trojan: Netcat

Demo - Netcat

GUI Trojan: MoSucker

GUI Trojan: Jumper and Biodox

Document Trojans

E-mail Trojans

E-mail Trojans: RemoteByMail

Defacement Trojans

Defacement Trojans: Restorator

Botnet Trojans

Botnet Trojan: Illusion Bot

Botnet Trojan: NetBot Attacker

Proxy Server Trojans

Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r (Funny Name)

FTP Trojans

FTP Trojan: TinyFTPD

VNC Trojans

HTTP/HTTPS Trojans

HTTP Trojan: HTTP RAT

Shttpd Trojan - HTTPS (SSL)

ICMP Tunneling

ICMP Trojan: icmpsend

Remote Access Trojans

Demo - Beast

Remote Access Trojan: RAT DarkComet

Remote Access Trojan: Apocalypse

Covert Channel Trojan: CCTT

E-banking Trojans

Banking Trojan Analysis

E-banking Trojan: ZeuS

Destructive Trojans

Notification Trojans

Credit Card Trojans

Data Hiding Trojans (Encrypted Trojans)

BlackBerry Trojan: PhoneSnoop

MAC OS X Trojan: DNSChanger

Mac OS X Trojan: Hell Raiser

Module Flow: Trojan Detection

How to Detect Trojans?

Scanning for Suspicious Ports

Port Monitoring Tool: IceSword

Port Monitoring Tools: CurrPorts and TCPView

Scanning for Suspicious Processes

Process Monitoring Tool: What's Running

Process Monitoring Tools

Scanning for Suspicious Registry Entries

Registry Entry Monitoring Tools

Scanning for Suspicious Device Drivers

Device Drivers Monitoring Tools: DriverView

Device Drivers Monitoring Tools

Scanning for Suspicious Windows Services

Windows Services Monitoring Tools: Windows Service Manager (SrvMan)

Windows Services Monitoring Tools

Scanning for Suspicious Startup Programs

Windows7 Startup Registry Entries

Startup Programs Monitoring Tools: Starter

Startup Programs Monitoring Tools: Security AutoRun

Startup Programs Monitoring Tools

Demo - What's Running?

Scanning for Suspicious Files and Folders

Files and Folder Integrity Checker: FastSum and WinMD5

Files and Folder Integrity Checker

Scanning for Suspicious Network Activities

Detecting Trojans and Worms with Capsa Network Analyzer

Module Flow: Countermeasures

Trojan Countermeasures

Backdoor Countermeasures

Trojan Horse Construction Kit

Module Flow: Anti-Trojan Software

Anti-Trojan Software: TrojanHunter

Anti-Trojan Software: Emsisoft Anti-Malware

Anti-Trojan Softwares

Module Flow: Penetration Testing

Pen Testing for Trojans and Backdoors

Quotes

Module 06 Review 

Module 07 - Viruses and Worms

Module Flow: Virus and Worms Concepts

Security News

Introduction to Viruses

Virus and Worm Statistics 2010

Stages of Virus Life

Working of Viruses: Infection Phase

Working of Viruses: Attack Phase

Why Do People Create Computer Viruses?

Indications of Virus Attack

How does a Computer get Infected by Viruses?

Virus Hoaxes

Virus Analysis: W32/Sality.AA

Virus Analysis: W32/Toal-A

Virus Analysis: W32/Virut

Virus Analysis: Klez

Module Flow: Types of Viruses

Types of Viruses

System or Boot Sector Viruses

File and Multipartite Viruses

Macro Viruses

Cluster Viruses

Stealth/Tunneling Viruses

Encryption Viruses

Polymorphic Code

Metamorphic Viruses

File Overwriting or Cavity Viruses

Sparse Infector Viruses

Companion/Camouflage Viruses

Shell Viruses

File Extension Viruses

Add-on and Intrusive Viruses

Transient and Terminate and Stay Resident Viruses

Writing a Simple Virus Program

Terabit Virus Maker

JPS Virus Maker

Demo - JPS Virus Maker Tool

DELmE's Batch Virus Maker

Module Flow: Computer Worms

Computer Worms

How is a Worm Different from a Virus?

Example of Worm Infection: Conficker Worm

What does the Conficker Worm do?

How does the Conficker Worm Work?

Worm Analysis: W32/Netsky

Worm Analysis: W32/Bagle.GE

Worm Maker: Internet Worm Maker Thing

Module Flow: Malware Analysis

What is Sheep Dip Computer?

Anti-Virus Sensors Systems

Malware Analysis Procedure: Preparing Testbed

Malware Analysis Procedure

String Extracting Tool: Bintext

Compression and Decompression Tool: UPX

Process Monitoring Tools: Process Monitor

Log Packet Content Monitoring Tools: NetResident

Debugging Tool: Ollydbg

Virus Analysis Tool: IDA Pro

Online Malware Testing: Sunbelt CWSandbox

Online Malware Testing: VirusTotal

Online Malware Analysis Services

Module Flow: Countermeasures

Virus Detection Methods

Virus and Worms Countermeasures

Companion Antivirus: Immunet Protect

Anti-virus Tools

Module Flow: Penetration Testing

Penetration Testing for Virus

Quotes

Module 07 Review 

Module 08 - Sniffers

Module Flow: Sniffing Concepts

Security News

Lawful Intercept

Benefits of Lawful Intercept

Network Components Used for Lawful Intercept

Wiretapping

Sniffing Threats

How a Sniffer Works?

Hacker Attacking a Switch

Types of Sniffing: Passive Sniffing

Types of Sniffing: Active Sniffing

Protocols Vulnerable to Sniffing

Tie to Data Link Layer in OSI Model

Hardware Protocol Analyzers

SPAN Port

Module Flow: MAC Attacks

MAC Flooding

MAC Address/CAM Table

How CAM Works?

What Happens When CAM Table is Full?

Mac Flooding Switches with macof

MAC Flooding Tool: Yersinia

How to Defend against MAC Attacks?

Module Flow: DHCP Attacks

How DHCP Works?

DHCP Request/Reply Messages

IPv4 DHCP Packet Format

DHCP Starvation Attack

Rogue DHCP Server Attack

DHCP Starvation Attack Tool: Gobbler

How to Defend Against DHCP Starvation and Rogue Server Attack?

Module Flow: ARP Poisoning Attacks

What is Address Resolution Protocol (ARP)?

ARP Spoofing Attack

How Does ARP Spoofing Work?

Threats of ARP Poisoning

ARP Poisoning Tool: Cain and Abel

Demo - Active Sniffing with Cain

Demo - Actively Sniffing a Switched Network with Cain

ARP Poisoning Tool: WinArpAttacker

ARP Poisoning Tool: Ufasoft Snif

How to Defend Against ARP Poisoning?

Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches

Module Flow: Spoofing Attack

MAC Spoofing/Duplicating

Spoofing Attack Threats

MAC Spoofing Tool: SMAC

Demo - Spoofing the MAC Address

How to Defend Against MAC Spoofing?

Module Flow: DNS Poisoning

DNS Poisoning Techniques

Intranet DNS Spoofing

Proxy Server DNS Poisoning

DNS Cache Poisoning

How to Defend Against DNS Spoofing?

Module Flow: Sniffing Tools

Sniffing Tool: Wireshark

Demo - Packet Capturing with Wireshark

Follow TCP Stream in Wireshark

Display Filters in Wireshark

Additional Wireshark Filters

Sniffing Tool: CACE Pilot

Sniffing Tool: Tcpdump/Windump

Discovery Tool: NetworkView

Discovery Tool: The Dude Sniffer

Password Sniffing Tool: Ace

Packet Sniffing Tool: Capsa Network Analyzer

OmniPeek Network Analyzer

Network Packet Analyzer: Observer

Session Capture Sniffer: NetWitness

Email Message Sniffer: Big-Mother

TCP/IP Packet Crafter: Packet Builder

Additional Sniffing Tools

How an Attacker Hacks the Network Using Sniffers?

Module Flow: Countermeasures

How to Defend Against Sniffing?

Sniffing Prevention Techniques

How to Detect Sniffing?

Promiscuous Detection Tool: PromqryUI

Promiscuous Detection Tool: PromiScan

Quotes

Module 08 Review 

Module 09 - Social Engineering

Module Flow: Social Engineering Concepts

Security News

What is Social Engineering?

Behaviors Vulnerable to Attacks

Factors that Make Companies Vulnerable to Attacks

Why is Social Engineering Effective?

Warning Signs of an Attack

Phases in a Social Engineering Attack

Impact on the Organization

Command Injection Attacks

"Rebecca" and "Jessica"

Common Targets of Social Engineering

Common Targets of Social Engineering: Office Workers

Module Flow: Social Engineering Techniques

Types of Social Engineering

Human-Based Social Engineering

Technical Support Example

Authority Support Example

Human-Based Social Engineering (Cont.)

Human-Based Social Engineering: Dumpster Diving

Human-Based Social Engineering (Cont..)

Watch these Movies

Watch this Movie

Computer-Based Social Engineering

Computer-Based Social Engineering: Pop-Ups

Computer-Based Social Engineering: Phishing

Social Engineering Using SMS

Social Engineering by a "Fake SMS Spying Tool"

Insider Attack

Disgruntled Employee

Preventing Insider Threats

Common Intrusion Tactics and Strategies for Prevention

Module Flow: Impersonation on Social Networking Sites

Social Engineering Through Impersonation on Social Networking Sites

Social Engineering Example: LinkedIn Profile

Social Engineering on Facebook

Social Engineering on Twitter

Social Engineering on Orkut

Social Engineering on MySpace

Risks of Social Networking to Corporate Networks

Module Flow: Identity Theft

Identity Theft Statistics 2010

Identity Theft

How to Steal an Identity?

Step 1

Step 2

Comparison

Step 3

Real Steven Gets Huge Credit Card Statement

Identity Theft - Serious Problem

Module Flow: Social Engineering Countermeasures

Social Engineering Countermeasures: Policies

Social Engineering Countermeasures

How to Detect Phishing Emails?

Anti-Phishing Toolbar: Netcraft

Demo - Netcraft Anti-Phishing Toolbar

Anti-Phishing Toolbar: PhishTank

Identity Theft Countermeasures

Module Flow: Penetration Testing

Social Engineering Pen Testing

Social Engineering Pen Testing: Using Emails

Social Engineering Pen Testing: Using Phone

Social Engineering Pen Testing: In Person

Quotes

Module 09 Review 

Module 10 - Denial of Service

Module Flow: DoS/DDoS Concepts

Security News

What is a Denial of Service Attack?

What are Distributed Denial of Service Attacks?

How Distributed Denial of Service Attacks Work?

Symptoms of a DoS Attack

Cyber Criminals

Organized Cyber Crime: Organizational Chart

Internet Chat Query (ICQ)

Internet Relay Chat (IRC)

Module Flow: DoS/DDoS Attack Techniques

DoS Attack Techniques

Bandwidth Attacks

Service Request Floods

SYN Attack

Demo - SynFlooding with hping2

SYN Flooding

ICMP Flood Attack

Peer-to-Peer Attacks

Permanent Denial-of-Service Attack

Application Level Flood Attacks

Module Flow: Botnets

Botnet

Botnet Propagation Technique

Botnet Ecosystem

Botnet Trojan: Shark

Poison Ivy: Botnet Command Control Center

Botnet Trojan: PlugBot

Module Flow: DDoS Case Study

Wikileaks

DDoS Attack

DDoS Attack Tool: LOIC

Denial of Service Attack Against MasterCard, Visa, and Swiss Banks

Hackers Advertise Links to Download Botnet

Module Flow: DoS/DDoS Attack Tools

DoS Attack Tools

Module Flow: Countermeasures

Detection Techniques

Activity Profiling

Wavelet Analysis

Sequential Change-Point Detection

DoS/DDoS Countermeasure Strategies

DDoS Attack Countermeasures

DoS/DDoS Countermeasures: Project Secondary Victims

DoS/DDoS Countermeasures: Detect and Neutralize Handlers

DoS/DDoS Countermeasures: Detect Potential Attacks

DoS/DDoS Countermeasures: Deflect Attacks

DoS/DDoS Countermeasures: Mitigate Attacks

Post-Attack Forensics

Techniques to Defend against Botnets

DoS/DDoS Countermeasures

DoS/DDoS Protection at ISP Level

Enabling TCP Intercept on Cisco IOS Software

Advanced DDoS Protection: IntelliGuard DDoS Protection System (DPS)

Module Flow: DoS/DDoS Protection Tools

DoS/DDoS Protection Tool: NetFlow Analyzer

DoS/DDoS Protection Tools

Module Flow: DoS/DDoS Penetration Testing

Denial of Service (DoS) Attack Penetration Testing

Denial of Service (DoS) Attack Pen Testing

Quotes

Module 10 Review

Pasted: Sep 12, 2012, 10:00:06 am
Views: 24