Unit 3
Pen Testing Steps:
Penetration Testing Tools:
Pen Testing Deliverables:
Security Assessment:
WEP and WPA:
Wireless Sniffer and Mac Spoofing:
Rouge Access Point:
Wireless Hacking Techniques:
Bufferflow and Its types:
Stack Based Buffer Overflow:
SQL Injection:
SQL Vulnerabilities:-------------
Password Cracker:
Web Application Hacking
Unit 2
Web Server Attacks
Web Server Hardening:
Sequence Prediction:
Spoofing vs Hijacking and its types:
Denial of Service
BOT/BOTNET
Smurf Attack:
SYN Flooding:
Protocols Susceptible to Sniffing
Sniffing and its types
ARP Poisoning/Flooding
MAC Flooding:
DNS Spoofing
Prevent against Sniffing
Password Cracking Techniques
Types of Passwords:
Keyloggers:
Escalating Privileges
Rootkits and its Types
Unit 1
What is Scanning? Port Network Vulnerabilities Scanning
CEH Scanning Methodology
5 Phases of EH
Hacker class
Ways to conduct EH
Traceroute in Footprint
DNS Enumeration
Social Engineering Attack & its types
SNMP Enumeration
Tunneling
Footprintng and its types