Hacking
Introduction
Definition of Hacking
History of Hacking
Motivations for Hacking
Types of Hackers
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
Hacking Web
Servers
Examples: Unpatched software, misconfigured settings, default credentials.
Examples: Exploiting input validation flaws, abusing authentication/authorization mechanisms.
Malware
Virus
Worm
Definition: A worm is a type of malware that replicates itself over a network.
Spyware
Adware
Trojan Horse
Grayware
Potentially Unwanted Program (PUP)
Footprinting and
Reconnaissance
Social Engineering
Hacking Wireless Networks
Wireless Encryption Vulnerabilities
Wireless Intrusion Detection and Prevention
Mobile Platform Hacking
Gathering Information
about
Sniffing and
Evasion
Evading IDS, Firewalls, and Honeypots
Intrusion Detection Systems (IDS): Techniques to bypass IDS systems
Honeypots: Techniques to avoid detection by honeypot systems
Denial of Service (DoS) Attacks
Flooding Attacks
Vulnerability Exploitation
Protocol Attacks
Distributed DoS (DDoS) Attacks
Techniques: Using botnets to amplify the attack
Network-based Mitigation
Host-based Mitigation
Session Hijacking
Techniques: Session sniffing and session fixation
Session Sniffing
Session Fixation
Countermeasures against Session Hijacking
Session Timeouts
Session Tokens
Two-Factor Authentication
Ethical Hacking
Tools
Reconnaissance Tools
Vulnerability Scanning Tools
Exploitation Tools
Wireless Hacking Tools