0% found this document useful (0 votes)
26 views66 pages

Comprehensive Guide to Penetration Testing

The document outlines various aspects of penetration testing, including steps, tools, and deliverables, as well as security assessments related to wireless and web application vulnerabilities. It covers topics such as buffer overflow, SQL injection, web server attacks, and different hacking techniques. Additionally, it discusses methods for password cracking, privilege escalation, and social engineering attacks.

Uploaded by

smitparthe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views66 pages

Comprehensive Guide to Penetration Testing

The document outlines various aspects of penetration testing, including steps, tools, and deliverables, as well as security assessments related to wireless and web application vulnerabilities. It covers topics such as buffer overflow, SQL injection, web server attacks, and different hacking techniques. Additionally, it discusses methods for password cracking, privilege escalation, and social engineering attacks.

Uploaded by

smitparthe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Unit 3

Pen Testing Steps:


Penetration Testing Tools:
Pen Testing Deliverables:
Security Assessment:

WEP and WPA:


Wireless Sniffer and Mac Spoofing:
Rouge Access Point:
Wireless Hacking Techniques:
Bufferflow and Its types:
Stack Based Buffer Overflow:
SQL Injection:
SQL Vulnerabilities:-------------

Password Cracker:
Web Application Hacking
Unit 2
Web Server Attacks
Web Server Hardening:
Sequence Prediction:
Spoofing vs Hijacking and its types:
Denial of Service
BOT/BOTNET

Smurf Attack:
SYN Flooding:
Protocols Susceptible to Sniffing

Sniffing and its types


ARP Poisoning/Flooding
MAC Flooding:
DNS Spoofing
Prevent against Sniffing
Password Cracking Techniques
Types of Passwords:
Keyloggers:
Escalating Privileges
Rootkits and its Types
Unit 1
What is Scanning? Port Network Vulnerabilities Scanning
CEH Scanning Methodology
5 Phases of EH
Hacker class
Ways to conduct EH

Traceroute in Footprint
DNS Enumeration
Social Engineering Attack & its types
SNMP Enumeration
Tunneling
Footprintng and its types

You might also like