Table Of Contents
Lesson 1: Being a Hacker
- 1.0 Introduction
- 1.1 Resources
- 1.1.1 Books
- 1.1.2 Magazines and Newspapers
- 1.1.3 Zines and Blogs
- 1.1.4 Forums and Mailing Lists
- 1.1.5 Newsgroups
- 1.1.6 Websites
- 1.1.7 Chat
- 1.1.8 P2P
- 1.2 Further Lessons
Lesson 2: Basic Commands in Linux and Windows
- 2.1. Introduction and Objectives
- 2.2. Requirements and Setup
- 2.2.1 Requirements
- 2.2.2 Setup
- 2.3. System Operation: WINDOWS
- 2.3.1 How to open an MS-DOS window
- 2.3.2 Commands and tools (Windows)
- 2.4. System Operations: Linux
- 2.4.1 How to open a console window
- 2.4.2 Commands and tools (Linux)
Lesson 3: Ports and Protocols
- 3.1 Introduction
- 3.2 Basic concepts of networks
- 3.2.1 Devices
- 3.2.2 Topologies
- 3.3 TCP/IP model
- 3.3.1 Introduction
- 3.3.2 Layers
- 3.3.2.1 Application
- 3.3.2.2 Transport
- 3.3.2.3 Internet
- 3.3.2.4 Network Access
- 3.3.3 Protocols
- 3.3.3.1 Application layer protocols
- 3.3.3.2 Transport layer Protocols
- 3.3.3.3 Internet layer Protocols
- 3.3.4 IP Addresses
Lesson 4: Services and Connections
- 4.0 Introduction
- 4.1 Services
- 4.1.1 HTTP and The Web
- 4.1.2 E-Mail – POP and SMTP
- 4.1.3 IRC
- 4.1.4 FTP
- 4.1.5 Telnet and SSH
- 4.1.6 DNS
- 4.1.7 DHCP
- 4.2 Connections
- 4.2.1 ISPs
- 4.2.2 Plain Old Telephone Service
- 4.2.3 DSL
- 4.2.4 Cable Modems
Lesson 5: System Identification
- 5.0 Introduction
- 5.1 Identifying a Server
- 5.1.1 Identifying the Owner of a domain
- 5.1.2 Identifying the IP address of a domain
- 5.2 Identifying Services
- 5.2.1 Ping and TraceRoute
- 5.2.2 Banner Grabbing
- 5.2.3 Identifying Services from Ports and Protocols
- 5.3 System Fingerprinting
- 5.3.1 Scanning Remote Computers
Lesson 6: Malware
- 6.0 Introduction
- 6.1 Viruses (Virii)
- 6.1.1 Introduction
- 6.1.2 Description
- 6.1.2.1 Boot Sector Viruses
- 6.1.2.2 The Executable File Virus
- 6.1.2.3 The Terminate and Stay Resident (TSR) Virus
- 6.1.2.4 The Polymorphic Virus
- 6.1.2.5 The Macro Virus
- 6.2 Worms
- 6.2.1 Introduction
- 6.2.2 Description
- 6.3 Trojans and Spyware
- 6.3.1 Introduction
- 6.3.2 Description
- 6.4 Rootkits and Backdoors
- 6.4.1 Introduction
- 6.4.2 Description
- 6.5 Logicbombs and Timebombs
- 6.5.1 Introduction
- 6.5.2 Description
- 6.6 Countermeasures
- 6.6.1 Introduction
- 6.6.2 Anti-Virus
- 6.6.3 NIDS
- 6.6.4 HIDS
- 6.6.5 Firewalls
- 6.6.6 Sandboxes
- 6.7 Good Safety Advice
Lesson 7: Attack Analysis
- 7.0 Introduction
- 7.1 Netstat and Host Application Firewalls
- 7.1.1 Netstat
- 7.1.2 Firewalls
- 7.2 Packet Sniffers
- 7.2.1 Sniffing
- 7.2.2 Decoding Network Traffic
- 7.2.3 Sniffing Other Computers
- 7.2.4 Intrusion Detection Systems
- 7.3 Honeypots and Honeynets
- 7.3.1 Types of Honeypots
- 7.3.2 Building a Honeypot
Lesson 8: Digital Forensics
- 8.0 Introduction
- 8.1 Forensic Principals
- 8.1.0 Introduction
- 8.1.1 Avoid Contaminiation
- 8.1.2 Act Methodically
- 8.1.3 Chain of Evidence
- 8.1.4 Conclusion
- 8.2 Stand-alone Forensics
- 8.2.0 Introduction
- 8.2.1 Hard Drive and Storage Media Basics
- 8.2.2 Encryption, Decryption and File Formats
- 8.2.3 Finding a Needle in a Haystack
- 8.2.3.1 find
- 8.2.3.2 grep
- 8.2.3.3 strings
- 8.2.3.4 awk
- 8.2.3.5 The Pipe “|”
- 8.2.4 Making use of other sources
- 8.3 Network Forensics
- 8.3.0 Introduction
- 8.3.1 Firewall Logs
Lesson 9: Email Security
- 9.0 Introduction
- 9.1 How E-mail Works
- 9.1.1 E-mail Accounts
- 9.1.2 POP and SMTP
- 9.1.3 Web Mail
- 9.2 Safe E-mail Usage Part 1: Receiving
- 9.2.1 Spam, Phishing and Fraud
- 9.2.2 HTML E-Mail
- 9.2.3 Attachment Security
- 9.2.4 Forged headers
- 9.3 Safe E-mail Usage Part 2: Sending
- 9.3.1 Digital Certificates
- 9.3.2 Digital Signatures
- 9.3.3 Getting a certificate
- 9.3.4 Encryption
- 9.3.5 How does it work?
- 9.3.6 Decryption
- 9.3.7 Is Encryption Unbreakable?
- 9.4 Connection Security
Lesson 10: Web Security
- 10.1 Fundamentals of Web Security
- 10.1.1 How the web really works
- 10.1.2 Rattling the Locks
- 10.1.3 Looking through Tinted Windows - SSL
- 10.1.4 Having someone else do it for you – Proxies
- 10.2 Web Vulnerabilities
- 10.2.1 Scripting Languages
- 10.2.2 Top Ten Most Critical Web Application Vulnerabilities
- 10.2.3 Security Guidelines for Building Secure Web Applications
- 10.3 HTML Basics – A brief introduction
- 10.3.1 Reading HTML
- 10.3.2 Viewing HTML at its Source
- 10.3.3 Links
- 10.3.4 Proxy methods for Web Application Manipulation
- 10.4 Protecting your server
- 10.4.1 Firewall
- 10.4.2 Intrusion Detection System (IDS)
- 10.5 Secure Communications
- 10.5.1 Privacy and Confidentiality
- 10.5.2 Knowing if you are communicating securely
- 10.6 Methods of Verification
- 10.6.1 OSSTMM
- 10.6.2 OWASP
Lesson 11: Passwords
- 11.0 Introduction
- 11.1 Types of Passwords
- 11.1.1 Strings of Characters
- 11.1.2 Strings of Characters plus a token
- 11.1.3 Biometric Passwords
- 11.2 History of Passwords
- 11.3 Build a Strong Password
- 11.4 Password Encryption
- 11.5 Password Cracking (Password Recovery)
- 11.6 Protection from Password Cracking
Lesson 12: Legalities and Ethics
- 12.1. Introduction
- 12.2. Foreign crimes versus local rights
- 12.3. Crimes related to the TICs
- 12.4. Prevention of Crimes and Technologies of double use
- 12.4.1. The global systems of monitoring: concept "COMINT"
- 12.4.2. "ECHELON" System
- 12.4.3. The "CARNIVORE" system
- 12.5. Ethical Hacking
- 12.6. The 10 most common internet frauds
No comments:
Post a Comment