Recent Popular Modules
  • Business Intelligence
    Reconnaissance

    The first step to good reconnaissance is to understand the nature of the business that you're targeting. Beyond just what they do, you need to know who they are, how they do it, and ultimately what technologies they use that you may be able to break in to.


  • Network Intelligence
    Reconnaissance

    It's important to understand the network of your target. That includes knowing where the network boundaries are and where the important systems are. This module teaches you to determine the shape and structure of the network itself.


  • Network Scanning
    Reconnaissance

    Now that we know what the network "looks" like; when we know our rules and boundaries - we can start to see what's "alive". In this module, you'll learn how to successfully scan the network to see where the live hosts are and what else is out there.


  • Exploitation of Buffer Overflows
    Server Attacks

    In this module you will learn the basics behind the buffer overflow as well as the exploitation of buffer overflows.


  • Social Engineering Toolkit
    Client Attacks

    In this module, you will learn about SET. Social-Engineer Toolkit is a versatile application for a variety of social engineering engagements.


  • ProxyChains - The Ultimate Proxifier
    Network Attacks

    The art of proxy chaining is merely connecting through more than one proxy and then to your intended destination or target. In general this technique can aid us in becoming tougher to trace and/or aid us in becoming more anonymous. ProxyChains is an easy to use program that forces any TCP connection made by any given TCP client to follow through a proxy or proxy chain. ProxyChains can be summed up as literally a “Proxifier” for non-proxy aware applications. ProxyChains currently supports the following proxies: SOCKS4, SOCKS5 and HTTP(s) making it an extremely versatile tool for any pen tester.


  • Passive OS Fingerprinting - Quietly Discovering Your Secrets
    Network Attacks

    Passive operating system fingerprinting is a method for passively detecting the operating system of a remote host based on certain characteristics within that host's network stack. Due to the passive nature of this analysis, the remote system being fingerprinted cannot detect this style of reconnaissance. In this learning module we will examine several common metrics utilized to perform passive operating system fingerprinting and some of the most common applications and/or tools that can perform this type of reconnaissance.


  • Messaging Security - Attacking the Client
    Client Attacks

    In many respects, the client represents the greatest risk to messaging security today, as attackers have grown very accustomed to combining client side attacks with social engineering. One of the key issues with client side security is to understand that when mail clients are developed security is not the main focus, as features tend to outweigh security. We as penetration testers and attackers should take full advantage of this key security weakness by attacking messaging security at the client level to fully demonstrate the real risk posed by this threat to our clients. In this lesson we will introduce some of the tools, techniques, and methodologies associated with attacking the client in messaging security.


  • Introduction to OSINT
    Reconnaissance

    In this module you will be introduced to Open Source Intelligence (OSINT) gathering and the techniques associated with it. Open Source Intelligence (OSINT): Consists of gathering, processing, and analyzing publicly available data and turning it into information that is actionable.


  • Password Cracking and John the Ripper
    Server Attacks

    In this module, you will be introduced to the cracking of user passwords using password hashes and John the Ripper. Obtaining password hashes is something you can do with physical or remote access to a system.

About THA Master Classes

Master Classes are not included with your Hacker Academy membership. They are instructor led, expert-level courses designed explore a specific subject area in-depth. Master Classes are held roughly once per calendar quarter. Check out our most recent Master Class on Registry Forensics, or Sign up to be notified of upcoming Master Classes.

Notify Me
About THA Deep Dives

THA Deep Dives are live webinar classes taught by Hacker Academy instructors. Deep Dives offer you a chance to explore concepts to obtain a more thorough understanding from an experts perspective.

Deep Dives are free and open to the public. Sign up to be notified of upcoming Deep Dive Sessions

Notify Me