Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
Overview
Syllabus
Introduction
- Scan the LAN
- What you should know
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Scanning techniques
- Scanning vs. penetration testing
- Scanning IPv6 networks
- Port scanning countermeasures
- Challenge: Compare pen test from a vulnerability scan
- Solution: Compare pen test from a vulnerability scan
- The three-way handshake
- TCP flags
- Idle scans
- Scan and query DNS
- Scan using ICMP
- Banner grabbing
- Challenge: Using online tools for discovery
- Solution: Using online tools for discovery
- Map a network with Nmap
- Passive operating system discovery
- SSDP for discovery
- Other network mapping tools
- Scanning for vulnerabilities
- Discovering vulnerabilities with Acunetix
- Using commercial and free scanners
- Use hping
- Scan with Nikto
- Exploring NetScan Tools
- Intrusion detection systems
- Use IP fragmentation scan
- Staying anonymous
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Hiding with onion routing
- Obscuring with Proxifier and SocksChain
- IP addresses spoofing countermeasures
- IP spoofing detection techniques
- HTTP
- SSH
- Defend against tunneling
- Next steps
Taught by
Lisa Bock