One of the most fundamental things youre going to do as a hacker is to break out a network sniffer. The use of sniffing tools is one of the most important skills you can have. This module will teach you to use standard sniffing tools and teach you to analyze the network protocols you've seen to this point.
Nessus is one of the oldest and most widely used vulnerability scanners. Over the years, Nessus has grown beyond just a vulnerability scanner and into a Swiss army knife of sorts for scouting target networks. This module will expose students to what Nessus is, how to operate it, and how it can be used to augment other security testing tools.
Passive operating system fingerprinting is a method for passively detecting the operating system of a remote host based on certain characteristics within that host's network stack. Due to the passive nature of this analysis, the remote system being fingerprinted cannot detect this style of reconnaissance. In this learning module we will examine several common metrics utilized to perform passive operating system fingerprinting and some of the most common applications and/or tools that can perform this type of reconnaissance.
Address Resolution Protocol (ARP) attacks on a LAN are one of the most significant types of attacks employed by pentesters due to its ease of execution and the effects to other hosts on the LAN. In this module we'll review the basics of how ARP works, the reasons why ARP attacks are so successful, and introduce students to Ettercap, the "swiss army knife" of ARP poisoning attacks.
There are three main protocols you will run into as a penetration tester, security engineer or security analyst on a daily basis, as when combined these three protocols make up about 99% of the traffic on the Internet and within our network infrastructures. These three protocols are the Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). Before we can effectively look for anomalies, misbehavior's, attacks and other security related events occurring over and/or within these three protocols we have to understand what is actually normal or expected behavior of these protocols when in use.
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. This module will teach you how to apply filters in Wireshark to discover valuable and sensitive information hidden in packet data.
Want to be the first to know about new modules?
Our instructor led videos guide you step-by-step through new concepts and skills. Hacker Academy members have access to our entire library of content so they can learn at their own pace.
Hands-on labs are the best way to test your skills and try new things. Hacker Academy members have on-demand access to interactive labs to get their hands dirty.
Skills assessment quizzes are a great way to track your progress. Hacker Academy members have access skills quizzes and completion certificates that can be submitted for continuing education credits.
Hands-on labs are the best way to test your skills and try new things. This lab is part of a private Master Class.
Skills assessment quizzes are a great way to track your progress. This quiz is part of a private Master Class.