MaHaReT Posted November 6, 2006 Report Posted November 6, 2006 Module 1: Ethics and LegalityWhat is an Exploit?The security functionality triangleThe attacker's processPassive reconnaissanceActive reconnaissanceTypes of attacksCategories of exploitsGoals attackers try to achieveEthical hackers and crackers - who are theySelf proclaimed ethical hackingHacking for a cause (Hacktivism)Skills required for ethical hackingCategories of Ethical HackersWhat do Ethical Hackers do?Security evaluation planTypes of Ethical HacksTesting TypesEthical Hacking ReportCyber Security Enhancement Act of 2002Computer CrimesOverview of US Federal LawsSection 1029Section 1030Hacking PunishmentModule 2: FootprintingWhat is FootprintingSteps for gathering informationWhoisCODECode:http://tucows.comHacking Tool: Sam SpadeAnalyzing Whois outputNSLookupFinding the address range of the networkARINTracerouteHacking Tool: NeoTraceVisual RouteVisual LookoutHacking Tool: Smart WhoisHacking Tool: eMailTracking ProHacking Tool: MailTracking.comModule 3: ScanningDetermining if the system is alive?Active stack fingerprintingPassive stack fingerprintingHacking Tool: PingerHacking Tool: WS_Ping_ProHacking Tool: Netscan Tools Pro 2000Hacking Tool: Hping2Hacking Tool: icmpenumDetecting Ping sweepsICMP QueriesHacking Tool: netcraft.comPort ScanningTCPs 3-way handshakeTCP Scan typesHacking Tool: IPEyeHacking Tool: IPSECSCANHacking Tool: nmapPort Scan countermeasuresHacking Tool: HTTrack Web CopierNetwork Management ToolsSolarWinds ToolsetNeoWatchWar DialingHacking Tool: THC-ScanHacking Tool: PhoneSweep War DialerHacking Tool: QuesoHacking Tool: CheopsProxy ServersHacking Tool: SocksChainSurf the web anonymouslyTCP/IP through HTTP TunnelingHacking Tool: HTTPortModule 4: EnumerationWhat is EnumerationNetBios Null SessionsNull Session CountermeasuresNetBIOS EnumerationHacking Tool: DumpSecHacking Tool: NATSNMP EnumertionSNMPUtilHacking Tool: IP Network BrowserSNMP Enumeration CountermeasuresWindows 2000 DNS Zone transferIdentifying Win2000 AccountsHacking Tool: User2SIDHacking Tool: SID2UserHacking Tool: EnumHacking Tool: UserInfoHacking Tool: GetAcctActive Directory EnumerationModule 5: System HackingAdministrator Password GuessingPerforming Automated Password GuessingLegionNTInfoScanDefending Against Password GuessingMonitoring Event Viewer LogsVisualLastEavesdroppin on Network Password ExchangeHacking Tool: L0phtCrackHacking Tool: KerbCrackPrivilege EscalationHacking Tool: GetAdminHacking Tool: hkManual Password Cracking AlgorithmAutomatic Password Cracking AlgorithmPassword TypesTypes of Password AttacksDictionary AttackBrute Force AttackDistributed Brute Force AttackPassword Change IntervalHybrid AttackCracking Windows 2000 PasswordsRetrieving the SAM fileRedirecting SMB Logon to the AttackerSMB RedirectionHacking Tool: SMBRelayHacking Tool: SMBRelay2SMBRelay Man-in-the-Middle (MITM)SMBRelay MITM CountermeasuresHacking Tool: SMBGrinderHacking Tool: SMBDieHacking Tool: NBTDeputyNetBIOS DoS AttackHacking Tool: nbnameHacking Tool: John the RipperLanManager HashPassword Cracking CountermeasuresKeystroke LoggerHacking Tool: SpectorAntiSpectorHacking Tool: eBlasterHacking Tool: SpyAnywhereHacking Tool: IKS Software LoggerHardware Tool: Hardware Key LoggerHacking Tool: RootkitPlanting Rootkit on Windows 2000 Machine_rootkit_ embedded TCP/IP StackRootkit CountermeasuresMD5 Checksum utilityTripwireCovering TracksDisabling AuditingAuditpolClearing the Event LogHacking Tool: ElslaveHacking Tool: WinzapperHacking Tool: Evidence EliminatorHidding FilesNTFS File StreamingHacking Tool: makestrmNTFS Streams CountermeasuresLNSSteganographyHacking Tool: ImageHideHacking Tool: MP3StegoHacking Tool: SnowHacking Tool: Camera/ShySteganography DetectionStegDetectEncrypted File SystemHacking Tool: dskprobeHacking Tool: EFSViewBuffer OverflowsCreating Buffer Overflow ExploitOutlook Buffer OverflowHacking Tool: OutoutlookModule 6: Trojans and BackdoorsWhat is a Trojan Horse?Overt and CovertHacking Tool: QAZHacking Tool: TiniHacking Tool: NetcatHacking Tool: Donald dickHacking Tool: SubSevenHacking Tool: BackOrifice 2000Back Oriffice Plug-insHacking Tool: NetBusWrappersHacking Tool: GraffitiHacking Tool: Silk Rope 2000Hacking Tool: EliteWrapHacking Tool: IconPlusPackaging Tool: Microsoft WordPadHacking Tool: Whack a MoleTrojan Construction KitBoSnifferHacking Tool: FireKiller 2000Covert ChannelsICMP TunnelingHacking Tool: LokiReverse WWW ShellBackdoor CountermeasuresBO Startup and Registry EntriesNetBus Startup and Registry KeysPort Monitoring ToolsfPort TCPViewProcess ViewerInzider - Tracks Processes and PortsTrojan MakerHacking Tool: Hard Disk KillerMan-in-the-Middle AttackHacking Tool: dsniffSystem File VerificationTripWireModule 7: SniffersWhat is a Sniffer?Hacking Tool: EtheralHacking Tool: SnortHacking Tool: WinDumpHacking Tool: EtherPeekPassive SniffingActive SniffingHacking Tool: EtherFloodHow ARP Works?Hacking Tool: DSniffHacking Tool: MacofHacking Tool: mailsnarfHacking Tool: URLsnarfHacking Tool: WebspyHacking Tool: EttercapHacking Tool: SMACMAC ChangerARP Spoofing CountermeasuresHacking Tool: WinDNSSpoofHacking Tool: WinSnifferNetwork Tool: IRISNetwork Tool: NetInterceptorSniffDetHacking Tool: WinTCPKillModule 8: Denial of ServiceWhat is Denial of Service Attack?Types of DoS AttacksHow DoS Work?What is DDoS?Hacking Tool: Ping of DeathHacking Tool: SSPingHacking Tool: LandHacking Tool: SmurfHacking Tool: SYN FloodHacking Tool: CPU HogHacking Tool: Win NukeHacking Tool: RPC LocatorHacking Tool: Jolt2Hacking Tool: BubonicHacking Tool: TargaTools for Running DDoS AttacksHacking Tool: TrinooHacking Tool: WinTrinooHacking Tool: TFNHacking Tool: TFN2KHacking Tool: StacheldrahtHacking Tool: ShaftHacking Tool: mstreamDDoS Attack SequencePreventing DoS AttackDoS Scanning ToolsFind_ddosSARADDoSPingRIDZombie ZapperModule 9: Social EngineeringWhat is Social Engineering?Art of ManipulationHuman WeaknessCommon Types of Social EngineeringHuman Based ImpersonationImportant UserTech SupportThird Party AuthorizationIn PersonDumpster DivingShoulder SurfingComputer ImpersonationMail AttachmentsPopup WindowWebsite FakingReverse Social EngineeringPolicies and ProceduresSocial Engineering Security PoliciesThe Importance of Employee EducationModule 10: Session HijackingWhat is Session Hijacking?Session Hijacking StepsSpoofing Vs HijackingActive Session HijackingPassive Session HijackingTCP Concepts - 3 way HandshakeSequence NumbersSequence Number ExampleGuessing the Sequence NumbersHacking Tool: JuggernautHacking Tool: HuntHacking Tool: TTYWatcherHacking Tool: IP WatcherHacking Tool: T-SightRemote TCP Session Reset UtilityDangers Posed by Session HijackingProtection against Session HijackingModule 11: Hacking Web ServersApache VulnerabilityAttacks against IISIIS ComponentsISAPI DLL Buffer OverflowsIPP Printer Overflowmsw3prt.dllOversized Print RequestsHacking Tool: Jill32Hacking Tool: IIS5-KoeiHacking Tool: IIS5HackIPP Buffer Overflow CountermeasuresISAPI DLL Source DisclosureISAPI.DLL ExploitDefacing Web PagesIIS Directory TraversalUnicodeDirectory ListingClearing IIS LogsNetwork Tool: LogAnalyzerAttack SignatureCreating Internet Explorer (IE) TrojanHacking Tool: IIsexploitHacking Tool: UnicodeUploader.plHacking Tool: cmdasp.aspEscalating Privilages on IISHacking Tool: IISCrack.dllHacking Tool: ispc.exeUnspecified Executable Path VulnerabilityHacking Tool: CleanIISLogFile System Traversal CountermeasuresMicrosoft HotFix ProblemsUpdateExpertCacls utilityNetwork Tool: WhiskerN-Stealth ScannerHacking Tool: WebInspectNetwork Tool: Shadow Security ScannerModule 12: Web Application VulnerabilitiesDocumenting the Application StructureManually Inspecting ApplicationsUsing Google to Inspect ApplicationsDirectory StructureHacking Tool: Instant SourceJava Classes and AppletsHacking Tool: JadHTML Comments and ContentsHacking Tool: LynxHacking Tool: WgetHacking Tool: Black WidowHacking Tool: WebSleuthCross Side ScriptingSession Hijacking using XSSCookie StealingHacking Tool: IEENModule 13: Web Based Password Cracking TechniquesBasic AuthenticationMessage Digest AuthenticationNTLM AuthenticationCertificate based AuthenticationDigital CertificatesMicrosoft Passport AuthenticationForms based AuthenticationCreating Fake CertificatesHacking Tool: WinSSLMiMPassword GuessingHacking Tool: WebCrackerHacking Tool: BrutusHacking Tool: ObiWanHacking Tool: Munga BungaPassword dictionary FilesAttack TimeHacking Tool: VarientHacking Tool: PassListQuery StringsPost dataHacking Tool: cURLStealing CookiesHacking Tool: CookieSpyHacking Tool: ReadCookiesHacking Tool: SnadBoyModule 14: SQL InjectionWhat is SQL Injection Vulnerability?SQL Insertion DiscoveryBlank sa PasswordSimple Input ValidationSQL InjectionOLE DB Errors1=1blah' or 1=1Stealing Credit Card InformationPreventing SQL InjectionDatabase Specific SQL InjectionHacking Tool: SQLDictHacking Tool: SQLExecHacking Tool: SQLbfHacking Tool: SQLSmackHacking Tool: SQL2.exeHacking Tool: Oracle Password BusterModule 15: Hacking Wireless Networks802.11 StandardsWhat is WEP?Finding WLANsCracking WEP keysSniffing TraficWireless DoS AttacksWLAN ScannersWLAN SniffersMAC SniffingAccess Point SpoofingSecuring Wireless NetworksHacking Tool: NetTumblerHacking Tool: AirSnortHacking Tool: AiroPeekHacking Tool: WEP CrackerHacking Tool: KismetWIDZ- Wireless IDSModule 16: Virus and WormsCherobylExploreZipI Love YouMelissaPretty ParkCode Red WormW32/KlezBugBearW32/Opaserv WormNimdaCode RedSQL SlammerHow to write your own Virus?Worm Construction KitModule 17: Novell HackingCommon accounts and passwordsAccessing password filesPassword crackersNetware Hacking ToolsChknullNOVELBFHNWPCRACKBinderyBinCrackSETPWD.NLMKockuserdumpBurglarGetitSpooflogGobblerNovelffsPandoraModule 18: Linux HackingWhy Linux ?Linux BasicsCompiling Programs in LinuxScanning NetworksMapping NetworksPassword Cracking in LinuxLinux VulnerabilitiesSARATARASniffingA Pinger in DisguiseSession HijackingLinux RootkitsLinux Security CountermeasuresIPChains and IPTablesModule 19: IDS, Firewalls and HoneypotsIntrusion Detection SystemSystem Integrity VerifiersHow are Intrusions Detected?Anomaly DetectionSignature RecognitionHow does IDS match Signatures with Incoming Traffic?Protocol Stack VerificationApplication Protocol VerificationWhat Happens after an IDS Detects an Attack?IDS Software VendorsSNORTEvading IDS (Techniques)Complex IDS EvasionHacking Tool: fragrouterHacking Tool: TCPReplayHacking Tool: SideStepHacking Tool: NIDSbenchHacking Tool: ADMutateIDS DetectionTools to Detect Packet SniffersTools to inject strangely formatted packets onto the wireHacking Through FirewallsPlacing Backdoors through FirewallsHiding behind Covert ChannelsWhat is a Honeypot?Honeypots EvasionHoneypots vendorsModule 20: Buffer OverflowsWhat is a Buffer Overflow?ExploitationAssembly Language BasicsHow to Detect Buffer Overflows in a Program?Skills RequiredCPU/OS DependencyUnderstanding StacksStack Based Buffer OverflowsBuffer Overflow Technical ImplementationWriting your own Buffer Overflow Exploit in CDefense against Buffer OverflowsType Checking Tools for Compiling ProgramsStackGuardImmunixModule 21: CryptographyWhat is PKI?Digital CertificatesRSAMD-5RC-5SHASSLPGPSSHEncryption Cracking Techniqueshttp://rapidshare.de/files/14217966/KELCYRA4EVER.sfv.htmlhttp://rapidshare.de/files/14221669/KELCYRA4EVER__01.rar.htmlhttp://rapidshare.de/files/14221666/KELCYRA4EVER__02.rar.htmlhttp://rapidshare.de/files/14221819/KELCYRA4EVER__03.rar.htmlhttp://rapidshare.de/files/14225922/KELCYRA4EVER__04.rar.htmlhttp://rapidshare.de/files/14225662/KELCYRA4EVER__05.rar.htmlhttp://rapidshare.de/files/14228342/KELCYRA4EVER__06.rar.htmlhttp://rapidshare.de/files/14229172/KELCYRA4EVER__07.rar.htmlhttp://rapidshare.de/files/14230566/KELCYRA4EVER__08.rar.htmlhttp://rapidshare.de/files/14230299/KELCYRA4EVER__09.rar.htmlhttp://rapidshare.de/files/14231341/KELCYRA4EVER__10.rar.htmlhttp://rapidshare.de/files/14231179/KELCYRA4EVER__11.rar.html Quote