Course Outline
Total Page:16
File Type:pdf, Size:1020Kb
ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Summary Description This class will immerse the student into an interactive environment where they will be shown how to scan, Outline test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking. Course This course prepares you for Certified Network Defense Architect exam 312-99 Topics • Ethics and Legality • Web Based Password Cracking • Footprinting Techniques • Scanning • SQL injection • Enumeration • Hacking Wireless Networks • System Hacking • Virus and Worms • Trojans & Backdoors • Physical Security • Sniffers • Linux Hacking • Denial of Service • Evading Firewalls, IDS and Honeypots • Social Engineering • Buffer Overflows • Session Hijacking • Cryptography • Hacking Web Servers • Penetration Testing • Web Application Vulnerabilities Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course was specially designed for Government Agencies. Prerequisite There are no prerequisites for this course. Duration Five Days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline I. Ethics and Legality 13. GFI Languard A. Why Security? 14. ISS Security Scanner B. The Security, functionality and ease of use 15. Netcraft Outline Triangle 16. IPsec Scan C. Can Hacking be Ethical? 17. NetScan Tools pro 2003 D. Essential Terminology. 18. Super Scan E. Elements of Security. 19. Floppyscan F. What does a Malicious Hacker do? G. War Dialer G. Difference between Penetration Testing H. Hacking Tools and Ethical Hacking. 1. THC Scan H. Hacker Classes. 2. Friendly Pinger I. What do Ethical Hackers do? 3. Cheops J. Skill Profile of an Ethical Hacker. 4. Security Administrator’s Tool for Course K. Modes of Ethical Hacking. Analyzing Network (SATAN) L. Security Testing. 5. SAFEsuite Internet Scanner M. Deliverables. 6. IdentTCPScan N. Computer Crimes and Implications. 7. PortScan Plus O. Legal Perspective (US Federal Laws). 8. Strobe 9. Blaster Scan II. Footprinting I. OS Fingerprinting A. Defining Footprinting. J. Active Stack fingerprinting B. Information Gathering Methodology. K. Tool for Active Stack fingerprinting C. Locate the Network Range. 1. XPROBE2 D. Hacking Tools: L. Passive Fingerprinting 1. Whois M. Proxy Servers 2. Nslookup N. Hacking Tools 3. ARIN 1. Socks Chain 4. Traceroute 2. Anonymizers 5. NeoTrace 3. HTTP Tunnel 6. VisualRoute Trace 4. HTTPort 7. SmartWhois O. Countermeasures 8. Visual Lookout 9. VisualRoute Mail Tracker IV. Enumeration 10. eMailTrackerPro A. What is Enumeration? B. NetBios Null Sessions III. Scanning C. Hacking Tools A. Definition of Scanning. 1. DumpSec B. Types of scanning 2. Winfo C. Objectives of Scanning 3. NetBIOS Auditing Tool (NAT) D. Scanning Methodology D. Null Session Countermeasures E. Classification of Scanning E. NetBIOS Enumeration F. Hacking Tools F. Hacking Tool :NBTScan 1. Nmap G. Simple Network Management 2. XMAS Scan 1. Protocol (SNMP) Enumeration 3. FIN Scan H. Hacking Tools 4. Null Scan 1. Solarwinds 5. Windows Scan 2. Enum 6. Idle Scan SNScan 7. Nessus I. SNMP Enumeration Countermeasures 8. Retina J. Management Information Base (MIB) 9. Saint K. Windows 2000 DNS Zone Transfer 10. HPing2 L. Blocking Win 2k DNS Zone Transfer 11. Firewalk M. Enumerating User Accounts 12. NIKTO N. Hacking Tools Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline (cont.) 1. User2sid and Sid2user 1. GetAdmin 2. UserInfo 2. hk.exe 3. GetAcct AA. Keystroke Loggers Outline 4. DumpReg BB. Hacking Tools 5. Trout 1. IKS Software Keylogger 6. Winfingerprint 2. Ghost Keylogger 7. PsTools 3. Hardware Key Logger 8. (PSFile,PSLoggedOn,PSGetSid,PS 4. Spyware Spector Info,PSService,P SList,PSKill, 5. eBlaster 9. PSSuspend, PSLogList, PSExec, CC. Hiding Files PSShutdown) DD. Creating Alternate Data Streams O. Active Directory Enumeration and EE. ADS creation and detection Countermeasures FF. Hacking Tools Course 1. Makestream V. System Hacking 2. ads_cat A. Administrator Password Guessing 3. Streams B. Manual Password Cracking Algorithm 4. LADS (List Alternate Data Streams) C. Automated Password Cracking GG. NTFS Streams Countermeasures D. Password Types HH. Stealing Files Using Word Documents E. Types of Password Attacks II. Field Code Countermeasures F. Hacking Tool JJ. Steganography 1. NTInfoScan (CIS) KK. Spyware Tool - Desktop Spy G. Performing Automated Password LL. Hacking Tools Guessing 1. Steganography tools H. Hacking Tool A. DiSi-Steganograph I. Legion B. EZStego J. Password Sniffing C. Gif-It-Up v1.0 Gifshuffle K. Hacking Tools D. Hide and Seek JPEG-JSTEG 1. LOphtcrack MandelSteg and GIFExtract 2. pwdump2 and pwdump3 Mp3Stego 3. KerbCrack E. Nicetext 4. NBTdeputy F. Pretty Good Envelope L. NetBIOS DoS Attack G. OutGuess M. Hacking Tools H. SecurEngine 1. NBName I. Stealth 2. John the Ripper J. Steganos N. LAN Manager Hash K. Steghide O. Password Cracking Countermeasures L. Stegodos P. Syskey Utility M. Stegonosaurus Q. Cracking NT/2000 Passwords N. StegonoWav R. Hacking Tool O. wbStego 1. NTFSDOS 2. Image Hide S. SMB Logon 3. MP3Stego T. Hacking Tool: SMBRelay 4. StegonoWav U. SMBRelay Man-in-the-Middle Scenario Snow.exe V. Hacking Tool : SMBRelay2 1. Camera/Shy MM. Steganography Detection W. SMBRelay Weaknesses and NN. Hacking Tool Countermeasures 1. diskprobe.exe X. Hacking Tools OO. Covering Tracks 1. SMBGrind PP. Disabling Auditing and clearing Event 2. SMBDie Logs Y. Privilege Escalation QQ. Hacking Tool Z. Hacking Tools 1. Dump Event Log Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically. ProTech Professional Technical Services, Inc. EC-Council Certified Network Defense Architect (CNDA) Course Outline (cont.) 2. elsave.exe O. Hard Disk Killer (HDKP 4.0) 3. WinZapper P. ICMP Tunneling 4. Evidence Eliminator Q. Hacking Tool: Loki Outline RR. RootKit R. Loki Countermeasures SS. Planting the NT/2000 RootKit S. Reverse WWW Shell – Covert Channels TT. Hacking Tools using HTTP 1. Fu T. Hacking Tools 2. Vanquish 1. fPort UU. Rootkit Countermeasures 2. TCP View VV. Hacking Tool U. Tripwire 1. Patchfinder 2.0 V. Process Viewer W. Inzider-Tracks Processes and Ports VI. Trojans and Backdoors X. System File Verification Course A. Effect on Business Y. Trojan horse Construction Kit B. What is a Trojan? Z. Anti-Trojan C. Overt and Covert Channels AA. Evading Anti-Trojan/Anti-Virus using D. Working of Trojans Stealth Tools v 2.0 E. Different Types of Trojans BB. Reverse Engineering Trojans F. What Trojan Creators look for? CC. Backdoor Countermeasures G. Different ways a Trojan can get into a system VII. Sniffers H. Indications of a Trojan Attack A. Definition of sniffing I. Some famous Trojans and ports used by B. How a Sniffer works? them C. Passive Sniffing J. How to determine which ports are D. Active Sniffing “Listening”? E. Hacking Tool: EtherFlood K. Different Trojans found in the Wild F. Man-in-the-Midle Attacks 1. Beast 2.06 G. Spoofing and Sniffing Attacks 2. Phatbot H. ARP Poisoning and countermeasures 3. Senna Spy 1. Hacking Tools 4. CyberSpy 2. Ethereal 5. Remote Encrypted Callback UNIX 3. Dsniff Backdoor (RECUB) 4. Sniffit 6. Amitis 5. Aldebaran 7. QAZ 6. Hunt 8. Back Orifice 7. NGSSniff 9. Back Orifice 2000 8. Ntop pf 10. Tini 9. IPTraf Etherape Netfilter Network 11. NetBus Probe 12. SubSeven 10. Windump 13. Netcat 11. Etherpeek 14. Subroot 12. Ettercap 15. Let me Rule 2.0 Beta 9 13. SMAC 16. Donald Dick 14. Mac Changer 17. Graffiti.exe 15. Iris 18. EliteWrap 16. NetIntercept 19. IconPlus 17. WinDNSSpoof 20. Restorator 18. NetIntercept 21. Whack-a-mole 19. Win DNSpoof 22. Firekiller 2000 20. TCPDump L. BoSniffer 21.