CD1
Section A: Introduction
· CD Tour
· Certifications
· Security Intro
· Resource Types
· Risk
Section B: Hacking Fundamentals
· Exploiting Weaknesses
· Exploit Process
· Threat/Vulnerability Types
· White-Hat vs. Black-Hat
· Persistent vs. Casual
· Motivations
Section C: Methodologies
· Overview
· Reconnaissance
· Scanning
· NMap Scan
· Enumeration
· Penetration
· System Elevation
· Network Elevation
Section D: Methodologies (cont.)
· Pilfer
· Expansion
· Housekeeping
· Common Tools
· Other Tools
Section E: Network Scanning Phases 1 & 2
· Overview
· Network Topology
· Network as a Target
· Discovery
· Scanning the Network
· Scanning Tools
Section F: Network Scanning Phases 3 & 4
· Enumerating
· Packet Analyzers
· CDP
· CDP Demo
· Weak Passwords
· Common Conventions
CD2
Section A: Management/Physical Threats
· Device Management
· Design Errors
· SolarWinds
· Physical Security
· Physical Tools
Section B: Routers
· Router Components
· Routers & Domains
· Dynamic Routing
· Tools
· Attacks
· RIP
Section C: Bridges & Switches
· Concepts
· Root Bridges
· Vulnerabilities/Attacks
· ARP Poisoning
Section D: Firewalls
· Firewall Concepts
· Vulnerabilities
· Design Vulnerabilities
· Firewall Setup
· Firewall Traversal
Section E: Wireless
· Wireless Concepts
· WEP
· Management Console
· Wireless Security
· Wireless Modes
· Wireless Vulnerabilities
· Attacks
· Warchalking/WarDriving
Section F: W2K Hacking Phases 1 & 2
· Overview
· Discovery/Reconnaissance
· Scanning
Section G: Enumerating Servers
· Overview
· Database Servers
· Mail/IM Servers
· Network/Web Servers
· Syslog/IAS Servers
CD3
Section A: Enumeration Strategies & Tools
· Tool Concepts
· Terminal Services
· General Banner Grabbing
· Assorted Tools
· Anonymous Connections
· Browser/Client
· Net Commands
· LDAP Query Tools
Section B: Using Enumeration Tools
· NetCat
· Cain & Abel
· Null Session
· DumpSec
Section C: Penetrating Windows 2000/NT
· Identification
· Weaknesses
· Default Configuration
· Default Accounts
· Account Management
· Inherent OS Weaknesses
· NetBIOS API
· Tools
Section D: Penetration Tools & Strategies
· LSA
· Sniffer
· Password Cracker
· Notepad Execution
Section E: Elevation on Windows 2000/NT
· Overview
· SAM Dump
· Tools/Vulnerabilities
· L0phtCrack
· SAM File
· Registry
Section F: Pilfering
· Permissions
· Use Data
· Targets
· More Targets
Section G: File Permission Auditing
· Folder Permissions
· Registry Permissions
· File Delete Child
· File Delete Child Process
CD4
Section A: Expansion
· Scanning/Enumeration
· Authentication
· Relays & Proxies
· Service Accounts
· User Rights
· Account Policies
· Local Policies
Section B: Housekeeping
· Cleaning Up
· Reentry
· File Header
· Tools
· Strategies
Section C: Event Log Management
· Log Utilities
· Set Up Audits
· Audit Object Access
Section D: Terminal Server
· Vulnerabilities
· Detection Tools
· Monitoring Tools
· Attack Applications
· Pipeupadmin
Section E: IIS
· Evaluation
· Weaknesses
· Input Validation
· Permissions
· Application Analysis
· Tools
Section F: Exploiting IIS
· File Traversal
· View Results
Section G: Securing IIS
· Directory Structure
· IDS
· Internet Service Manager
· DLLs
· ISAPI Filters
· Directory Browsing
· Authentication
· Lockdown
CD5
Section A: Securing Windows 2000/NT
· Analyze
· Best Practices
· Communication
· User Education
· Penetration Analysis
· Backups
· Tools
http://rapidshare.com/files/116148878/l
http://rapidshare.com/files/116385994/l
http://rapidshare.com/files/116386857/l
http://rapidshare.com/files/116617205/l
http://rapidshare.com/files/116617164/l
http://rapidshare.com/files/116617158/l
http://rapidshare.com/files/116617167/l
http://rapidshare.com/files/117868071/l
http://rapidshare.com/files/118119677/l
http://rapidshare.com/files/118119706/l
http://rapidshare.com/files/118119650/l
http://rapidshare.com/files/118119748/l
http://rapidshare.com/files/118119654/l
http://rapidshare.com/files/118148043/l
0 comments:
Post a Comment