Security & HackingTraining


We open an opportunity for everyone, especially network administrators and IT Professionals to join our  Security & Hacking class, contained following learning materials:

Chapter 1 : Introduction
- Basic Service, Static IP Assignment, Apache, SSHD, Tftpd, VNC Server, Basic Bash, Environment, Simple Bash Scripting, Netcat, Backdoor, Writing File With NC, Remote Administrator With Netcat, Wireshark, Sniffer, Capture File

Chapter 2 : Information Gathering Techniques
- Google Hacking, Email Harvesting, Finding Vulnerable Servers, NetCraft

Chapter 3 : Open Service Information Gathering
- DNS Reconnaissance, MX Queries, NS Queries, Bruteforce, DNS Zone Transfers, SNMP Reconnaissance, Enumeration Windows, Open TCP Ports, Null Session, Scanning Netbios Service, Enumerating Usernames.

Chapter 4 : Port Scanning
- TCP Port Scanning basic, Nmap, scanning across the network

Chapter 5 : ARP Spoofing
- Victim Packet, Gateway Packet, Ettercap, DNS Spoffing

Chapter 6 : Buffer Overflow Exploitation (win32)
- Buffer Overflow Exploitation (win32), Fuzzing, Replicating the Crash, Sending a unique string, shellcode, OllyDbg, Getting Our Shell

Chapter 7 : Working With Exploits and Transferring File
- Working with exploits, wingate, looking exploits on the web, Security Focus

Chapter 8 : Exploit Frameworks
- Metasploit, Metasploit command line interface, Metasploit console, Metasploit web interface, Interesting Payload, Meterpreter Payload, PassLveX Payload, Binary Payload, Framework Kung Fu, Kernel Payload, Core Impact

Chapter 9 : Client Side Attacks and Port Fun
- Client Side Attacks and Port Fun, Client Side exploits in action, Port Redirection, Stunnel, HTTP Connect Tunneling, Proxy Tunnel, SSH Tunneling

Chapter 10 : Password Attacks
- Online Password Attacks, FTP BruteForce, POP3 BruteForce, SNMP BruteForce, Microsoft VPN BruteForce, Password Profiling, Offline Password Attacks, Windows Hash Dumping, Jhon The Ripper, Rainbow Table, Physical Access Attacks, Resetting Microsoft Windows, Resetting Password Domain Controller, Resetting Linux System

Chapter 11 : Web Application Attack Vector
- SQL Injection, Enumeration Table Name, Code Execution, Web Proxies, Command Injection Attacks

Chapter 12 : Trojan Horses Windows Oddities and Rootkits
- Trojan Horses, Binary Trojan Horses, Spybot, insider, Rxbot, Windows Oddities, Registry Backdoor, Rootkits, Aphex Rootkit, HXDEF Rootkit

Tutor: DR. Desmond Alexander Devendran (CEO of Foresec Academy of Information Security & Assurance, Coreskill Advisory )

Class will be held on June 20 - 24, 2011. Registration will be opened until May 31, 2011

Contact Person :
Yuka (+62 8975 404041)
Davit (+62 8975 736689)

0 comments:

Posting Komentar

Design by BlogSpotDesign | Ngetik Dot Com