Category: Tutorial   
Download Now

Network Attacks (THA - Paid Version - Member Area)

Network Attacks (THA - Paid Version - Member Area)
English | Size: 1.85 Gb
Category: Tutorials
In this lesson we will focus on how the network itself can be a target for penetration testing. Understanding how networks operate, how they are structured and how they communicate is vital knowledge for a penetration tester. We will focus on how we can make use of a wide range of tools and techniques to get more information about the machines on a network and how they are organized, to listen to what kind of data is being passed openly across the wire or in the air and ultimately how we can use all of that knowledge to plan and execute an attack on the network itself.

* Network Orientation
The first step to understanding a network comes down to one thing: network topography. In this module you'll learn how to effectively map out a network, unlocking information about access ports, firewalls, switches, control levels, and more.
* Sniffing
One of the most fundamental things you?re going to do as a hacker is to break out a network sniffer. The use of sniffing tools is one of the most important skills you can have. This module will teach you to use standard sniffing tools and teach you to analyze the network protocols you'?ve seen to this point.
* Denial of Service
The time has come; we are going to learn how todun dun dunshut things down. That's right, in this module you'll learn how to properly and effectively employ denial of service to disable network resources.
* Using Nessus
Nessus is one of the oldest and most widely used vulnerability scanners. Over the years, Nessus has grown beyond just a vulnerability scanner and into a Swiss army knife of sorts for scouting target networks. This module will expose students to what Nessus is, how to operate it, and how it can be used to augment other security testing tools.
* Passive OS Fingerprinting - Quietly Discovering Your Secrets
Passive operating system fingerprinting is a method for passively detecting the operating system of a remote host based on certain characteristics within that host's network stack. Due to the passive nature of this analysis, the remote system being fingerprinted cannot detect this style of reconnaissance. In this learning module we will examine several common metrics utilized to perform passive operating system fingerprinting and some of the most common applications and/or tools that can perform this type of reconnaissance.
* ARP Attacks and Intro to Ettercap
Address Resolution Protocol (ARP) attacks on a LAN are one of the most significant types of attacks employed by pentesters due to its ease of execution and the effects to other hosts on the LAN. In this module we'll review the basics of how ARP works, the reasons why ARP attacks are so successful, and introduce students to Ettercap, the "swiss army knife" of ARP poisoning attacks.
* Network Protocols - In-depth look at ICMP TCP and UDP
There are three main protocols you will run into as a penetration tester, security engineer or security analyst on a daily basis, as when combined these three protocols make up about 99% of the traffic on the Internet and within our network infrastructures. These three protocols are the Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). Before we can effectively look for anomalies, misbehavior's, attacks and other security related events occurring over and/or within these three protocols we have to understand what is actually normal or expected behavior of these protocols when in use.
* Network Analysis - Wireshark
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. This module will teach you how to apply filters in Wireshark to discover valuable and sensitive information hidden in packet data.
* Attacking the Network - Owning through Connectivity
This module focuses on demonstrating the ability to intercept and/or control communications between nodes on a network. In addition to becoming the man in the middle, you'll also learn about RIP route spoofing using Scapy.
* ProxyChains - The Ultimate Proxifier
The art of proxy chaining is merely connecting through more than one proxy and then to your intended destination or target. In general this technique can aid us in becoming tougher to trace and/or aid us in becoming more anonymous. ProxyChains is an easy to use program that forces any TCP connection made by any given TCP client to follow through a proxy or proxy chain. ProxyChains can be summed up as literally a ?Proxifier? for non-proxy aware applications. ProxyChains currently supports the following proxies: SOCKS4, SOCKS5 and HTTP(s) making it an extremely versatile tool for any pen tester.

Original Linl -
(Buy premium account for maximum speed and resuming ability)

Direct Download

Tags: Network, Attacks, Member

Network Attacks (THA - Paid Version - Member Area) Fast Download via Rapidshare Hotfile Fileserve Filesonic Megaupload, Network Attacks (THA - Paid Version - Member Area) Torrents and Emule Download or anything related.
Author: tnt1411  |  Comments: 0  |  Views: 227  
Dear visitor, welcome here, but you are visiting our website as an unregistered user.
We recommend you Register or login with your own username.
Members of Guest cannot leave comments.