Backtrack, Penetration Testing Certification Training Courses in Pune
Slideshow Image 1 Slideshow Image 2 Slideshow Image 3

QUICK CONTACT

Backtrack



Contents


  • Module 1 - Backtrack Basics
  • Module 2 - Information Gathering Techniques
  • Module 3 - Open Services Information Gathering
  • Module 4 - Port Scanning
  • Finding your way around Backtrack
  • Open Web Information Gathering
  • DNS Reconnaissance
  • TCP Port Scanning Basics
  • Exercise
  • Google Hacking
  • Interacting with a DNS server
  • UDP Port Scanning Basics
  • Backtrack Services
  • Miscellaneous Web Resources
  • Automating lookups
  • Port Scanning Pitfalls
  • DHCP
  • Other search engines
  • Forward lookup bruteforce
  • Nmap
  • Static IP assignment
  • Netcraft
  • Reverse lookup bruteforce
  • Network Sweeping
  • SSHD
  • Whois Reconnaissance
  • DNS Zone Transfers
  • OS fingerprinting
  • Apache
  • Exercise
  • Exercise
  • Banner Grabbing / Service Enumeration
  • FTP
  • SNMP reconnaissance
  • Nmap Scripting Engine
  • TFTPD
  • Enumerating Windows Users
  • PBNJ
  • VNC Server
  • 3.2.2 Enumerating Running Services
  • Unicornscan
  • Additional Resources
  • Enumerating open TCP ports
  • Exercise
  • Exercise
  • Enumerating installed software
  • The Bash Environment
  • Exercise
  • Simple Bash Scripting
  • SMTP reconnaissance
  • Sample Exercise
  • Microsoft Netbios Information Gathering
  • Sample Solution
  • Null sessions
  • Additional Resources
  • Scanning for the Netbios Service
  • Exercise
  • Enumerating Usernames/ Password policies
  • Netcat the Almighty
  • Exercise
  • Connecting to a TCP/UDP port with Netcat
  • Maltego
  • Listening on a TCP/UDP port with Netcat
  • Network Infrastructure
  • Transferring files with Netcat
  • Social Infrastructure
  • Remote Administration with Netcat
  • Exercise
  • Using Wireshark
  • Peeking at a Sniffer
  • Capture and Display filters
  • Following TCP Streams
  • Additional Resources
  • Exercise
  • Module 5 - ARP Spoofing
  • Module 6 - Buffer Overflow Exploitation
  • Module 7 - Working With Exploits
  • Module 8 - Transferring Files
  • The Theory
  • Looking for Bugs
  • Looking for an exploit on BackTrack
  • The non interactive shell
  • Doing it the hard way
  • Fuzzing
  • Looking for exploits on the web
  • Uploading Files
  • Ettercap
  • Exploiting Windows Buffer Overflows
  • Using TFTP
  • Replicating the Crash
  • Using FTP
  • Locating Space for our Shellcode
  • Inline Transfers
  • Redirecting the execution flow
  • Exercise
  • Finding a return address
  • Basic shellcode creation
  • Getting our shell
  • Exercise
  • Exploiting Linux Buffer Overflows
  • Setting things up
  • Controlling EIP
  • Landing the Shell
  • Avoiding ASLR
  • Module 9 – Exploit frameworks
  • Module 10 - Client Side Attacks
  • Module 11 - Port Fun
  • Module 12 - Password Attacks
  • Metasploit
  • Client side attack
  • Port Redirection
  • Online Password Attacks
  • Interesting Payloads
  • CVE-2009-0927
  • SSL Encapsulation - Stunnel
  • Hydra
  • Meterpreter Payload
  • MS07-017 – From PoC to Shell
  • HTTP CONNECT Tunneling
  • FTP Bruteforce
  • Binary Payloads
  • MS06-001
  • ProxyTunnel
  • POP3 Bruteforce
  • Other Framework v3.x features
  • Client side exploits in action
  • SSH Tunneling
  • SNMP Bruteforce
  • Core Impact
  • Exercise
  • What about content inspection?
  • Microsoft VPN Bruteforce
  • Hydra GTK
  • Password profiling
  • CeWL
  • Offline Password Attacks
  • Windows SAM
  • Windows Hash Dumping – PWDump / FGDump
  • John the Ripper
  • Rainbow Tables
  • Windows does WHAT?
  • Exercise
  • Physical Access Attacks
  • Resetting Microsoft Windows
  • Resetting a password on a Domain Controller
  • Resetting Linux Systems
  • Resetting a Cisco Device
  • Module 13 - Web Application Attack vectors
  • Module 14 - Trojan Horses
  • Module 15 - Windows Oddities
  • Module 16 - Rootkits
  • Cross Site Scripting
  • Binary Trojan Horses
  • Alternate NTFS data Streams
  • Aphex Rootkit
  • Browser redirection / iframe injection
  • Open source Trojan horses
  • Registry Backdoors
  • HXDEF Rootkit
  • Stealing Cookies / Abusing Sessions
  • World domination Trojan horses
  • Exercise R.I.P
  • Local and Remote File Inclusion
  • SQL Injection in PHP / MySQL
  • Authentication Bypass
  • Enumerating the Database
  • Code Executio
  • SQL Injection in ASP / MSSQL
  • Identifying SQL Injection Vulnerabilities
  • Enumerating Table Names
  • Enumerating the column types
  • Fiddling with the Database
  • Microsoft SQL Stored Procedures
  • Code execution
  • Web Proxies
  • Exercise