f***@gmail.com
2005-09-05 13:46:09 UTC
Hi,
I am selling for the certifed Ethical Hacker Self-paced Training CDs.
These 7 CDs contains Instructor-led training and Study Guide materials.
The following is the screen capture and the content of these CDs:
[screen capture]
Loading Image...
Content
==============================-=====-======
Chapter 1.0 - Introduction to Ethical Hacking
Introduction to Ethical Hacking
Can Hacking be Ethical
What does a Malicious Hacker Do?
Classification of Hackers
What do Ethical Hackers Do?
Modes of Ethical Hacking
Demo - BlindSide
Chapter 2.0 - Footprinting
Footprinting
Revisiting Reconnaissance
Demo - Sam Spade & VisualRoute
Demo - Using Google
Network Range, Traceroute & Tools
Demo - Email Tracking
Information Gathering Methodology
Chapter 3.0 - Scanning
Scanning
War Dialers
TCP Three Way Handshake
Demo - SuperScan
Port Scanning Techniques
Port Scanning Tools
Scanning Tools
Demo - Cheops & nMap
Chapter 4.0 - Enumeration
Enumeration
Net Bios Null Sessions
Demo - Creating a Null User Session
Countermeasure to Null Sessions
Hacking Tools
Demo - Using SolarWinds
How to Identify Accounts
More Hacking Tools
Demo - Cain Enable
Chapter 5.0 - System Hacking
System Hacking
Password Guessing
Hacking Tool - KerbCrack
Demo - LoftCrack
Privilege Escalation
Password Cracking
Demo - Metasploit Project
SMBRelay
Man-In-The-Middle Scenario
More Hacking Tools
Countermeasures to Installing a Rootkit
Demo - Using an Alternate Data Stream
Demo - BlindSide
Chapter 6.0 - Trojans and Backdoors
Trojans & Different Types of Malware
Trojans & Backdoors
Demo - EliteWrap
Tools
BOSniffer and FireKiller
Chapter 7.0 - Sniffers
Sniffers Overview
Introduction to Sniffers
Demo - Ethereal
Passive & Active Sniffing Programs
Demo - Using SMAC
Sniffing HTTPS and SSH
Demo - Sniffing with Kaine Enable
Chapter 8.0 - Denial of Service
Denial of Service Overview
Denial of Service Attacks
IDS Companies & Firewalls
Demo - Ping of Death DOS Chapter 9.0 - Social Engineering
Social Engineering Overview
What is Social Engineering?
Adding Extra Security into your Corporation
Chapter 10.0 - Session Hijacking
Session Hijacking Overview
Understanding Session Hijacking
Demo - T-Sight
Protect against Session Hijacking
Chapter 11.0 - Hacking Web Servers
What is a Web Server?
Hacking Tools & Countermeasures
Demo - Simple Internet Client Attack
Unicode Attacks & IIS Log Files
Directory Traversal Tools
Demo - N-Stealth Security Scanner
Hacking Web Servers Review
Chapter 12.0 - Web Application Vulnerabilities
Web Application Vulnerabilities Overview
Understanding Web Application Security
Demo - BlackWidow and BurpSpider
Hidden Fields
Demo - Man-In-The-Middle Attack
XXS Web Application
Demo - Performing Reconnaissance
Chapter 13.0 - Web Based Password Cracking Techniques
Web Based Password Cracking Overview
Password Guessing
Demo - SnadBoy's Revelation
Chapter 14.0 - SQL Injection
What is SQL Injection?
Shutting Down SQL Server
Demo - SQL Injection
SQL Dictionary
Chapter 15.0 - Hacking Wireless Networks
Wireless Networking
Network Hacking Tools
Demo - "The Broken" Wireless Hacking & Cracking
Chapter 16.0 - Evading IDS, Firewalls and Honey Pots
Intrusion Detection Systems Overview
Application Protocol Verification
Demo - Engage Packet Builder
TCP Replay
Bypassing Firewalls
Demo - KFSensor
IDS, Firewall and Honey Pots Review
Chapter 17.0 - Linux Hacking
Linux Hacking Overview
Compiling Programs in Linux
Demo - Nmap Front End
Linux Hacking Tools
Linux Hacking Review
Chapter 18.0 - Buffer Overflows
Buffer Overflows Overview
Buffer Overflows
Demo - RPC Exploit
Preventing Buffer Overflows
Chapter 19.0 - Cryptography
Cryptography Overview
Different Types of Cryptography
RC5 & Rainbow Tables
Demo - How to Create Rainbow Tables
Ethical Hacker Course Closure
I am asking for $40 CDN(shipping included) through PayPal for all seven
CDs.
Items will deliver within 24 hours after the payment is received in
full.
If you have any questions or require other payment method,
please email me at ***@gmail.com
Best regard, Terrance
I am selling for the certifed Ethical Hacker Self-paced Training CDs.
These 7 CDs contains Instructor-led training and Study Guide materials.
The following is the screen capture and the content of these CDs:
[screen capture]
Loading Image...
Content
==============================-=====-======
Chapter 1.0 - Introduction to Ethical Hacking
Introduction to Ethical Hacking
Can Hacking be Ethical
What does a Malicious Hacker Do?
Classification of Hackers
What do Ethical Hackers Do?
Modes of Ethical Hacking
Demo - BlindSide
Chapter 2.0 - Footprinting
Footprinting
Revisiting Reconnaissance
Demo - Sam Spade & VisualRoute
Demo - Using Google
Network Range, Traceroute & Tools
Demo - Email Tracking
Information Gathering Methodology
Chapter 3.0 - Scanning
Scanning
War Dialers
TCP Three Way Handshake
Demo - SuperScan
Port Scanning Techniques
Port Scanning Tools
Scanning Tools
Demo - Cheops & nMap
Chapter 4.0 - Enumeration
Enumeration
Net Bios Null Sessions
Demo - Creating a Null User Session
Countermeasure to Null Sessions
Hacking Tools
Demo - Using SolarWinds
How to Identify Accounts
More Hacking Tools
Demo - Cain Enable
Chapter 5.0 - System Hacking
System Hacking
Password Guessing
Hacking Tool - KerbCrack
Demo - LoftCrack
Privilege Escalation
Password Cracking
Demo - Metasploit Project
SMBRelay
Man-In-The-Middle Scenario
More Hacking Tools
Countermeasures to Installing a Rootkit
Demo - Using an Alternate Data Stream
Demo - BlindSide
Chapter 6.0 - Trojans and Backdoors
Trojans & Different Types of Malware
Trojans & Backdoors
Demo - EliteWrap
Tools
BOSniffer and FireKiller
Chapter 7.0 - Sniffers
Sniffers Overview
Introduction to Sniffers
Demo - Ethereal
Passive & Active Sniffing Programs
Demo - Using SMAC
Sniffing HTTPS and SSH
Demo - Sniffing with Kaine Enable
Chapter 8.0 - Denial of Service
Denial of Service Overview
Denial of Service Attacks
IDS Companies & Firewalls
Demo - Ping of Death DOS Chapter 9.0 - Social Engineering
Social Engineering Overview
What is Social Engineering?
Adding Extra Security into your Corporation
Chapter 10.0 - Session Hijacking
Session Hijacking Overview
Understanding Session Hijacking
Demo - T-Sight
Protect against Session Hijacking
Chapter 11.0 - Hacking Web Servers
What is a Web Server?
Hacking Tools & Countermeasures
Demo - Simple Internet Client Attack
Unicode Attacks & IIS Log Files
Directory Traversal Tools
Demo - N-Stealth Security Scanner
Hacking Web Servers Review
Chapter 12.0 - Web Application Vulnerabilities
Web Application Vulnerabilities Overview
Understanding Web Application Security
Demo - BlackWidow and BurpSpider
Hidden Fields
Demo - Man-In-The-Middle Attack
XXS Web Application
Demo - Performing Reconnaissance
Chapter 13.0 - Web Based Password Cracking Techniques
Web Based Password Cracking Overview
Password Guessing
Demo - SnadBoy's Revelation
Chapter 14.0 - SQL Injection
What is SQL Injection?
Shutting Down SQL Server
Demo - SQL Injection
SQL Dictionary
Chapter 15.0 - Hacking Wireless Networks
Wireless Networking
Network Hacking Tools
Demo - "The Broken" Wireless Hacking & Cracking
Chapter 16.0 - Evading IDS, Firewalls and Honey Pots
Intrusion Detection Systems Overview
Application Protocol Verification
Demo - Engage Packet Builder
TCP Replay
Bypassing Firewalls
Demo - KFSensor
IDS, Firewall and Honey Pots Review
Chapter 17.0 - Linux Hacking
Linux Hacking Overview
Compiling Programs in Linux
Demo - Nmap Front End
Linux Hacking Tools
Linux Hacking Review
Chapter 18.0 - Buffer Overflows
Buffer Overflows Overview
Buffer Overflows
Demo - RPC Exploit
Preventing Buffer Overflows
Chapter 19.0 - Cryptography
Cryptography Overview
Different Types of Cryptography
RC5 & Rainbow Tables
Demo - How to Create Rainbow Tables
Ethical Hacker Course Closure
I am asking for $40 CDN(shipping included) through PayPal for all seven
CDs.
Items will deliver within 24 hours after the payment is received in
full.
If you have any questions or require other payment method,
please email me at ***@gmail.com
Best regard, Terrance