Ethical Hacking - 241031 - 101542
Ethical Hacking - 241031 - 101542
Hands-On Training
Course Outline
• Introduction to Ethical • Session Hijacking
Hacking • Evading Firewalls
• Footprinting/Recon • Hacking Web Servers
• Scanning Networks • Hacking Web Applications
• System Hacking • SQL Injection
• Packet Sniffing • Hacking Wireless Networks
• Social Engineering • Cryptographic Basics
• Denial-of-Service
Building An Ethical Hacking LAB
• System Requirements • LAB Operating Systems
Intel Corei5 ➢Attacker Machines
8GB Ram Kali OS
4 CPUs Parrot OS
@3.0 ghz
500GB SSD ➢Vulnerable OS (Machines)
Owasp Broken Web APP
• Virtualization Platforms Metasploitable-2
➢VMware Workstation Player Windows 7 or higher
➢Microsoft Hyper-V
➢VirtualBox
Where to Get The Lab Software
➢VirtualBox Download - Downloads – Oracle VM VirtualBox
• Surprisingly, the Secret Service is the lead agency, but they are
primarily involved in coordinating the response, usually not in
investigating.
3. Military/Defense;
With advancements in technology, the military now uses sophisticated digital
equipment, like drones in the field. These improvements have created a need
for the use of ethical hackers in the field and on the frontline operations to
knock out or control the adversaries’ communications and other digital
equipment.
Professions for Ethical Hackers
4. Penetration Testing;
A pentest is essentially a form of legal hacking. A company can hire ethical hackers
or pentesters to try to hack into their systems to determine how secure they are.
It means that the information about the target can be gathered from third-party
sources, such as DNS, Wappalyzer, Shodan, Netcraft, Google, social networking
sites, etc.
Reconnaissance Tools
Passive Reconnaissance Tools: Active Reconnaissance Tools:
1. Wappalyzer 1. Nmap
2. Whois.domaintools.com 2. Zenmap
3. Crt.sh 3. Nitko
4. Haveibeenpwned.com
5. Builtwith.com
6. Hunter.io
7. Shodan.io
8. Google ducking
Information Gathering Lab Exercise
1. Use Wappalyzer to discover Website technologies on udemy.com
2. Use builtwith.com to discover Website technologies on udemy.com
3. Use crt.sh to discover subdomains
4. Used haveibeenpwned.com to discover data breaches
5. Use nmap to discover open ports on skullsecurity.com
6. Use nmap to discover running services on skullsecurity.com
7. Use nmap to discover Server Operating system on skullsecurity.com
System Hacking
Sniffing
Sniffing is a process of monitoring and
capturing all data packets passing through
given network. Sniffers are used by
network/system administrator to monitor
and troubleshoot network traffic.
Passive Sniffing –
This type of sniffing is generally carried out at the hub. Unlike active
sniffing, the hub may be immediately injected with a sniffer device to
simply collect data packets.
Spoofing Tools;
• BetterCap
• Zaproxy
• SslStrip
• BurpSuite
• MitmProxy