• • • • •
Why Security? Essential Terminologies Elements of Security The Security, Functionality, and Ease of Use Triangle What Does a Malicious Hacker Do? o Reconnaissance o Scanning o Gaining access o Maintaining access o Covering Tracks
•
• • • • • • • • • • • • • • • • •
Types of Hacker Attacks o Operating System attacks o Application-level attacks o Shrink Wrap code attacks o Misconfiguration attacks Hacktivism Hacker Classes Hacker Classes and Ethical Hacking What Do Ethical Hackers Do? Can Hacking be Ethical? How to Become an Ethical Hacker? Skill Profile of an Ethical Hacker What is Vulnerability Research? Why Hackers Need Vulnerability Research? Vulnerability Research Tools Vulnerability Research Websites How to Conduct Ethical Hacking? Approaches to Ethical Hacking Ethical Hacking Testing Ethical Hacking Deliverables Computer Crimes and Implications Legal Perspective o U.S. Federal Law o Japan’s Cyber Laws o United Kingdom’s Cyber Laws
o o o
Australia’s Cyber Laws Germany’s Cyber Laws Singapore’s Cyber Laws
Module 2: Footprinting
• • • • • • • • • • • • • • •
Revisiting Reconnaissance Defining of Footprinting Information Gathering Methodology Unearthing Initial Information Finding a Company’s URL Internal URL Extracting Archive 0f a Website Google Search for Company’s Info. People Search Footprinting Through Job Sites Passive Information Gathering Competitive Intelligence Gathering Why Do You Need Competitive Intelligence? Companies Providing Competitive Intelligence Services Competitive Intelligence o When Did This Company Begin? o How Did It Develop? o What Are This Company's Plans? o What Does Expert Opinion Say About The Company? o Who Are The Leading Competitors?
• •
Public and Private Websites Tools o DNS Enumerator o SpiderFoot o Sensepost Footprint Tools BiLE.pl BiLE-weigh.pl tld-expand.pl vet-IPrange.pl qtrace.pl vet-mx.pl jarf-rev