O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

White Hat Hacking and Penetration Testing

Video Description

In this Ethical Hacking - White Hat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.
Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial.
By the time you have completed this video tutorial for White Hat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.

Table of Contents

  1. Introduction
    1. What You Should Expect From The Video 00:04:13
    2. What Is Hacking? 00:03:28
    3. Why Do We Hack? 00:05:25
    4. Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc) 00:06:05
    5. Being Ethical 00:03:24
    6. Legal Issues Around Hacking 00:06:30
    7. Methodology 00:06:56
    8. Types Of Attacks 00:08:19
    9. Skills Necessary And Skills To Be Learned 00:06:03
    10. What Is Penetration Testing/Scope? 00:08:38
  2. Getting The Background - Footprinting And Reconnaissance
    1. What Is Footprinting? 00:04:16
    2. History Lessons - Way Back Machine 00:05:38
    3. Using Your Resources - Job Listings, People Searches, Social Networks 00:04:42
    4. Using Whois Lookups 00:06:35
    5. Using DNS To Extract Information 00:07:07
    6. Finding Network Ranges 00:05:15
    7. Google Hacking 00:03:41
    8. Mining For Information Using Google Hacking 00:05:06
    9. Google Hacking Database 00:04:44
  3. Networking Fundamentals
    1. History Of TCP/IP 00:07:06
    2. Using Wireshark To Examine Packets 00:05:40
    3. OSI And IP Models 00:08:46
    4. Addressing 00:03:43
    5. UDP 00:05:15
    6. TCP 00:08:06
    7. Services 00:05:47
    8. Using Wireshark For Deep Analysis 00:08:44
    9. DHCP 00:09:24
    10. Using ARP 00:09:34
  4. Cryptography
    1. History Of Cryptography 00:07:26
    2. Types Of Cryptography 00:07:02
    3. Public Key 00:04:35
    4. Certificates 00:08:18
    5. Hashing 00:05:35
    6. AES, DES, 3DES 00:05:54
    7. SSL/TLS 00:07:47
    8. SSH 00:06:56
    9. Disk Encryption 00:04:19
    10. Cryptographic Analysis 00:03:44
  5. Scanning And Enumeration
    1. Types Of Scans 00:07:45
    2. Using NMAP 00:03:49
    3. Other Types Of Scans 00:07:04
    4. Using hping And Its Uses 00:06:28
    5. War Dialing 00:03:55
    6. IDS Evasion 00:06:54
    7. Banner Grabbing 00:08:42
    8. Vulnerability Scanning 00:05:51
    9. Using Nessus 00:08:56
    10. Enumeration Techniques 00:06:47
    11. SNMP 00:09:07
    12. LDAP 00:08:40
    13. Using Proxies 00:05:43
    14. Tor And Anonymizers 00:05:20
    15. Tunneling 00:06:40
  6. Penetration
    1. Goals 00:07:49
    2. Password Cracking And Complexity 00:07:12
    3. Password Attacks - Chapter 6 00:05:43
    4. Password Storage Techniques 00:04:34
    5. Privilege Escalation 00:06:13
    6. Spyware, Rootkits And Key Loggers 00:07:52
    7. Metasploit Basics 00:04:55
    8. Auditing/Logging 00:08:04
    9. Metasploit Again 00:04:24
  7. Malware - Trojans, Backdoors, Viruses And Worms
    1. Definitions And History 00:05:04
    2. Detection Of Malware 00:06:19
    3. Anti-Virus Evasion 00:04:32
    4. Deployment Of Malware 00:04:59
    5. Virus Types 00:06:05
    6. Malware Analysis 00:06:01
    7. Windows ADS And Hiding Malware 00:05:42
    8. Doing Debugging - OllyDbg 00:09:00
    9. Packing And Automated A/V Maker Tools 00:03:37
    10. More Malware Analysis 00:06:07
  8. Denial Of Service Attacks
    1. What Is DoS? DDoS? 00:04:52
    2. DoS Attacks 00:06:05
    3. Cyber Crime 00:06:48
    4. Botnets 00:06:59
    5. Attack Countermeasures - Flooding 00:08:57
  9. Web Application Hacking
    1. What Is Web Application Testing? 00:04:56
    2. Web Application Architecture 00:05:13
    3. Web Testing Tools 00:05:26
    4. Cross Site Scripting 00:04:13
    5. SQL Injection 00:05:02
    6. Cross Site Request Forgery 00:04:53
    7. Session Hijacking And Attacks And Cookies 00:06:56
    8. Password Attacks - Chapter 9 00:05:26
    9. Encoding 00:03:48
  10. Wireless Networking
    1. Wireless Networking 00:04:57
    2. Encryption Techniques - WEP, WPA, WPA2 00:06:43
    3. Finding Hotspots 00:07:23
    4. Breaking WEP Encryption 00:06:41
    5. Rogue Access Points And Attacks 00:04:52
    6. Wireless Sniffing 00:04:44
    7. Protecting Wireless Networks 00:06:43
  11. Detection Evasion
    1. What Is Evasion And Why Do We Use It? 00:03:59
    2. Steganography 00:05:08
  12. Programming Attacks
    1. Stacks And Heaps 00:05:18
    2. Buffer Overflows 00:07:48
    3. Protecting Against Buffer Overflow Attacks 00:08:09
    4. Format String 00:04:57
    5. De-Compilation 00:04:22
    6. Reverse Engineering 00:05:09
  13. About The Author
    1. About Me 00:02:13