Security & HackingTraining
We open an opportunity for everyone, especially network administrators and IT Professionals to join our Security & Hacking class, contained following learning materials:
Chapter 1 : Introduction
- Basic Service, Static IP Assignment, Apache, SSHD, Tftpd, VNC Server, Basic Bash, Environment, Simple Bash Scripting, Netcat, Backdoor, Writing File With NC, Remote Administrator With Netcat, Wireshark, Sniffer, Capture File
Chapter 2 : Information Gathering Techniques
- Google Hacking, Email Harvesting, Finding Vulnerable Servers, NetCraft
Chapter 3 : Open Service Information Gathering
- DNS Reconnaissance, MX Queries, NS Queries, Bruteforce, DNS Zone Transfers, SNMP Reconnaissance, Enumeration Windows, Open TCP Ports, Null Session, Scanning Netbios Service, Enumerating Usernames.
Chapter 4 : Port Scanning
- TCP Port Scanning basic, Nmap, scanning across the network
Chapter 5 : ARP Spoofing
- Victim Packet, Gateway Packet, Ettercap, DNS Spoffing
Chapter 6 : Buffer Overflow Exploitation (win32)
- Buffer Overflow Exploitation (win32), Fuzzing, Replicating the Crash, Sending a unique string, shellcode, OllyDbg, Getting Our Shell
Chapter 7 : Working With Exploits and Transferring File
- Working with exploits, wingate, looking exploits on the web, Security Focus
Chapter 8 : Exploit Frameworks
- Metasploit, Metasploit command line interface, Metasploit console, Metasploit web interface, Interesting Payload, Meterpreter Payload, PassLveX Payload, Binary Payload, Framework Kung Fu, Kernel Payload, Core Impact
Chapter 9 : Client Side Attacks and Port Fun
- Client Side Attacks and Port Fun, Client Side exploits in action, Port Redirection, Stunnel, HTTP Connect Tunneling, Proxy Tunnel, SSH Tunneling
Chapter 10 : Password Attacks
- Online Password Attacks, FTP BruteForce, POP3 BruteForce, SNMP BruteForce, Microsoft VPN BruteForce, Password Profiling, Offline Password Attacks, Windows Hash Dumping, Jhon The Ripper, Rainbow Table, Physical Access Attacks, Resetting Microsoft Windows, Resetting Password Domain Controller, Resetting Linux System
Chapter 11 : Web Application Attack Vector
- SQL Injection, Enumeration Table Name, Code Execution, Web Proxies, Command Injection Attacks
Chapter 12 : Trojan Horses Windows Oddities and Rootkits
- Trojan Horses, Binary Trojan Horses, Spybot, insider, Rxbot, Windows Oddities, Registry Backdoor, Rootkits, Aphex Rootkit, HXDEF Rootkit
Tutor: DR. Desmond Alexander Devendran (CEO of Foresec Academy of Information Security & Assurance, Coreskill Advisory )
Class will be held on June 20 - 24, 2011. Registration will be opened until May 31, 2011
Contact Person :
Yuka (+62 8975 404041)
Davit (+62 8975 736689)
Labels:
News
Langganan:
Posting Komentar (Atom)
0 comments:
Posting Komentar