The following labs employ an ethical hacking methodology to introduce the learner to various techniques and tools to include, but not limited to: reconnaissance, scanning, enumeration, exploitation, and post-exploitation:
- Performing Reconnaissance from the WAN
- Scanning the Network on the LAN
- Enumeration Hosts using Wireshark, Windows, and Linux Commands
- Remote and Local Exploitation
- Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
- Capturing and Analyzing Network Traffic Using a Sniffer
- Social Engineering Using SET
- Performing a Denial of Service Attack from the WAN
- Using Browser Exploitation to Take Over a Host’s Computer
- Attacking Webservers from the WAN
- Exploiting a Vulnerable Web Application
- Performing SQL Injection to Manipulate Tables in a Database
- Breaking WEP and WPA and Decrypting the Traffic
- Attacking the Firewall and Stealing Data over and Encrypted Channel
- Using Public Key Encryption to Secure Messages
Additional Lab Exercises
- Provisioning a Web Server
- Exploring the HTML
- Provisioning a MySQL Database
- Provisioning PHP
- Dissecting the Login Process
- SQL Injections (SQLi)
- SQLi Vulnerability and Pentesting Steps
- HTML Injections (HTMLi)
- HTMLi Vulnerability and Mitigation
- Reflected XSS
- Reflected XSS Mitigation and URL Encoding
- PHP Sessions and Cookies
- Additional SCRIPT Elements
- Session Stealing (Remote Reflected XSS)
- Remote Reflected XSS Mitigation and URL Encoding
- Vulnerable Forum
- Pentesting the Forum
- Session Stealing (Stored XSS)
- Command Injection
- Stateless Firewall
- Abusing a Stateless Firewall
- Stateful Firewall
- Abusing a Stateful Firewall
- IDS, SYSLOG, and NTP
- Signature Detection and Alerting an Admin
- IPS, SYSLOG, and NTP
- Signature Detection and Remote Shells
- RemoteShell: Embedding Client-side Code into a Package
- Remote Shell Extracting Data
- Incident Response