Jump to content
CoD3

Offensive Security Lab Exercise [E-Book]

Recommended Posts

Posted

1. Module 1 - BackTrack Basics
1.1 Finding your way around the tools
1.2 Basic Services
1.3 Basic Bash Environment
Overview
1.4 Netcat the Almighty
Overview
1.5 Using Wireshark (Ethereal)
Overview
2. Module 2- Information Gathering Techniques
2.1 Open W e b Information Gathering
Overview
2.2. Miscellaneous W e b Resources
2.3 Exercise 7
3. Module 3- Open Services Information Gathering
3.1 DNS Reconnaissance
3.2 SNMP reconnaissance
3.3 SMTP reconnaissance
3.4 Microsoft Netbios Information Gathering
4. Module 4- Port Scanning
A note from the authors
4.1 TCP Port Scanning Basics
4.2 UDP Port Scanning Basics
4.3 Port Scanning Pitfalls
4.4 Nmap
4.5 Scanning across the network
4.6 Unicornscan
5. Module 5- ARP Spoofing
A note from the authors
5.1 The Theory
5.2 Doing it the hard way
5.3 Ettercap
6. Module 6- Buffer overflow Exploitation (Win32)
Overview
6.1 Looking for Bugs
6.2 Fuzzing
6.3 Replicating the Crash
6.4 Controlling EIP
6.5 Locating Space for our She l l code
6.6 Redirecting the execution flow
6.7 Finding a return address
6.8 Basic She l l code creation
6.9 Getting our She l l
6.10 Improving exploit stability
7. Module 7- Working With Exploits
7.1 Looking for an exploit on BackTrack
7.2 Looking for exploits on the W e b
8. Module 8- Transferring Files
8.1 The non interactive She l l
8.2 Uploading Files
8.3 Exercise 16
9. Module 9 – Exploit frameworks
9.1 Met asploit
9.2 Core Impact
10. Module 10- Client Side Attacks
10.1 Client side attacks
10.2 MS07-017 – From PoC to She l l
10.3 MS06-001
10.4 Client side exploits in action
10.5 Exercise 21
11. Module 11- Port Fun
A note from the authors
11.1 Port Redirection
11.2 SSL Encapsulation - Stunnel
11.3 HTTP CONNECT Tunneling
11.4 ProxyTunnel
11.5 SSH Tunneling
11.6 What about content inspection?
12. Module 12- Password Attacks
A note from the authors
12.1 Online Password Attacks
12.2 Hydra
12.3 Password profiling
12.5 Physical Access Attacks
13. Module 13 - We B Application Attack vectors
13.1 SQL Injection
13.2 We b Proxies
13.3 Command injection Attacks
14. Module 14 - Trojan Horses
14.1 Binary Trojan Horses
14.2 Open source Trojan horses
14.3 World domination Trojan horses
15. Module 15 - Windows Oddities
15.1 Alternate NTFS data Streams
15.2 Registry Backdoors
16. Module 16 - Rootkits
16.1 Aphex Rootkit
16.2 HXDEF Rootkit
16.3 Exercise R.I.P
Final Challenges


Download ;;) = HeRe

Guest
This topic is now closed to further replies.


×
×
  • Create New...