i
Introduction of Hacking
Phases Of Hacking
Types Of Hackers
CIA Triad
Vulnerability Assessment
Phases Of Vulnerability Assessment
Penetration Testing
Phases Of Penetration Testing
What is Footprinting
Phases Of Footprinting
Footprinting Through Search Engines
Footprinting Through Archives
Email Footprinting
Footprinting Through Whois
Footprinting Through TraceRoute
Footprinting IP Address
Footprinting Through Social Engineering
Gathering Information Using Websites and Applications
IP Mapping and Tracing IP address
Active and Passive Methods
Detecting Web Server
Find weaknesses using Google
Hacking Using Google and other Search Engines
What is Scanning
TCP Communication Flags
TCP Three Way Handshake
TCP Connect/Full Open Scanning
Stealth/Half Open Scanning
Inverse TCP Flag Probe Scanning
XMAS Scanning
ACK Scanning
UDP Scanning
OS Authentication Architecture
OS Hash BruteForcing
OS Password Cracking
Windows Login Bypass
OSX Login Bypass
Data Stealing Techniques
Kali Linux Vs Other Pen Testing OS
Installation and setup of Kali Linux
System Architecture of Kali Linux
Network Configuration of Kali Linux
Essential Commands of Kali Linux
Malware
Types Of Malware
Worms
Type Of Worms
Protecting Yourself From Worms
Symptoms of Worms
Removal of Worms
Virus
Types of Virus
Damage Caused By Virus
Cause of Virus
Symptoms Of Virus
Removal of Virus
Different Type of Trojans
Making of Trojan(RAT)
Right Way to Configure Trojan
Online Trojan propagation
Analysis and Removal of Trojan
Introduction to Network Sniffing
Man in the Middle Attacks
MAC spoofing & Flooding
ARP Poisoning
Rogue DHCP
SSL Stripping
Session Hijacking
Introduction to SQL Database
Types of SQL Injections
Authentication Bypass Injection
Blind Injections
Error Based Injection
Union Based Injection
Stacked Query Injection
Time Based Injection
Wi-Fi Technical Details
Types of Encryptions
MAC Spoofing
Attacks on WEP, WPA, WPA2
Forged Authentication Attack
Replay Attack
De-Synchronization Attack
Evil Twin and Fake AP Attack
Types of Steganography
Techniques of Steganography
How Steganography Works
Image Steganography
Working with Tools
How XSS Attacks Work
XSS Attack via Email
Stealing Cookies via XSS
XSS Attack in Comment Field
Blog Post via XSS Attack
CSRF Attacks
Understanding an iFrame Attack
New iFrame Injection Method
Ads in hidden iFrame and pop-ups
Redirecting to a malicious server
Malicious script execution
How DoS Attack Works
Indications of DoS Attacks
DoS Attack Techniques
Tools for DDoS Attacks
Detection of DoS Attacks
Need of Penetration Testing?
Types of Pen Testing
Pen Testing Techniques
Security Audit
Vulnerability Assessments
Black Box Pen Testing
Gray Box Pen Testing
Monitoring Events and Exceptions
Inspecting Processes and Modules
Introduction to Reverse Engineering
Tools and Commands
Introduction to Firewalls
Network Firewalls
Web Application Firewalls
Weakness in Firewalls
Honey Pots and Security Misconfiguration
Configure Rule sets
Setup Network IDS/IPS
Writing Custom Rules
Setup Network IDS or IPS
Logs Analysis
DMZ Configuration
Intrusion Detection Systems and weakness
Intrusion Prevention Systems and weakness
Introduction To Cryptography
History of Ciphers
Symmetric And Asymmetric Ciphers
Block Ciphers
Data Encryption Standard
DES-X
Advanced Encryption Standards
Block Cipher Modes
Stream Ciphers - RC4
Asymmetric-Key Algorithms
RSA
ELGAMAL
HASH Functions
Digital Signature
Hybrid Schemes
Public Key Infrastructure
Implementing Public Key Infrastructure
What Will PKI Allow You?
EXERCISE: Certificates
Certificate life cycle
Planning the PKI
PKI Administration
Threat Modelling and Classification
There is a method to perform a vulnerability assessment. In this method there are six phases which are used to find the vulnerability in proper manner.
Scoping:-Scoping is the primary step of any security assessment activity. In order to execute a vulnerability assessment the first step is to identify the scope of the assessment in terms of infrastructure against which the assessment is to be conducted, for example, servers,network devices, security devices, databases, and applications.
Information gathering:- Information gathering is second and most important phase of vulnerability assessment. in this phase we try to find the more information of our target system using technical and non-technical method. It helps in getting a better picture of target system. By using this method we find the actual topology of network,server type and its version,running services. Example https://punkspider.org.cutestat.com you can put target website url and see the details given by this site.
Vulnerability scanning:-This stage involves the actual scanning of the target infrastructure to identify existing vulnerabilities of the system. This is done using vulnerability scanners such as Nessus, NMAP Prior to scanning, the tool should be configured optimally as per the target infrastructure information captured during the initial phases. When we have enough information about target then we go for vulnerability scanning. In which we find the vulnerabilities of current network,server,device,database of the target.
False positive analysis:-As an output of the scanning phase, one would obtain a list of vulnerabilities of the target infrastructure. One of the key activities to be performed with the output would be false positive analysis, that is, removing any vulnerability that is falsely reported by the tool and does not exist in reality.
Vulnerability exploitation:-In case system owners require proof of existing vulnerabilities or exploits to understand the extent to which an attacker can compromise a vulnerable system, testers will be required to demonstrate exploits in a controlled environment with out actually making the infrastructure unavailable, unless that’s a requirement. In this phase tester exploit the vulnerability using proper process.
Report generation:- This is the last phase of vulnerability assessment. In which tester make a brief report of all above phase and cover each and every point of assessment.
Don't miss out!