One of the most fundamental things youre going to do as a hacker is to break out a network sniffer. The use of sniffing tools is one of the most important skills you can have. This module will teach you to use standard sniffing tools and teach you to analyze the network protocols you've seen to this point.
Nessus is one of the oldest and most widely used vulnerability scanners. Over the years, Nessus has grown beyond just a vulnerability scanner and into a Swiss army knife of sorts for scouting target networks. This module will expose students to what Nessus is, how to operate it, and how it can be used to augment other security testing tools.
Address Resolution Protocol (ARP) attacks on a LAN are one of the most significant types of attacks employed by pentesters due to its ease of execution and the effects to other hosts on the LAN. In this module we'll review the basics of how ARP works, the reasons why ARP attacks are so successful, and introduce students to Ettercap, the "swiss army knife" of ARP poisoning attacks.
There are three main protocols you will run into as a penetration tester, security engineer or security analyst on a daily basis, as when combined these three protocols make up about 99% of the traffic on the Internet and within our network infrastructures. These three protocols are the Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). Before we can effectively look for anomalies, misbehavior's, attacks and other security related events occurring over and/or within these three protocols we have to understand what is actually normal or expected behavior of these protocols when in use.
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. This module will teach you how to apply filters in Wireshark to discover valuable and sensitive information hidden in packet data.
The art of proxy chaining is merely connecting through more than one proxy and then to your intended destination or target. In general this technique can aid us in becoming tougher to trace and/or aid us in becoming more anonymous. ProxyChains is an easy to use program that forces any TCP connection made by any given TCP client to follow through a proxy or proxy chain. ProxyChains can be summed up as literally a Proxifier for non-proxy aware applications. ProxyChains currently supports the following proxies: SOCKS4, SOCKS5 and HTTP(s) making it an extremely versatile tool for any pen tester.
Want to be the first to know about new modules?
Our instructor led videos guide you step-by-step through new concepts and skills. Hacker Academy members have access to our entire library of content so they can learn at their own pace.
Hands-on labs are the best way to test your skills and try new things. Hacker Academy members have on-demand access to interactive labs to get their hands dirty.
Skills assessment quizzes are a great way to track your progress. Hacker Academy members have access skills quizzes and completion certificates that can be submitted for continuing education credits.
Hands-on labs are the best way to test your skills and try new things. This lab is part of a private Master Class.
Skills assessment quizzes are a great way to track your progress. This quiz is part of a private Master Class.