Skip to content

Hacking Course

Liz Howard edited this page Apr 11, 2018 · 1 revision

This course is intended to train users in how hacking tools work, how a hacker approaches a target, identifying breaches and responding to incidents.

Proposed Standards & Learning Objectives

  • Analyze the structure of common attack techniques to evaluate an attacker's spread through a system and network, anticipating and thwarting further attacker activity

  • Gain access to a target machine using Metasploit, and then detecting the artifacts and impact of exploitation through process, file, memory, and log analysis

  • Analyze a system to see how malware is used to move files, create backdoors, and build relays through a target environment

  • Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments

  • Utilize tools and evidence to determine the kind of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each

    • Use built-in command-line tools such as Windows tasklist, wmic, and reg, as well as Linux netstat, ps, and lsof to detect an attacker's presence on a machine
    • Analyze router and system ARP tables along with switch CAM tables to track an attacker's activity through a network and identify a suspect
    • Use memory dumps and memory analysis tools to determine an attacker's activities on a machine, the malware installed, and other machines the attacker used as pivot points across the network
    • Run the nmap port scanner and Nessus vulnerability scanner to find openings on target systems, and apply tools such as tcpdump and netstat to detect and analyze the impact of the scanning activity
    • Apply the tcpdump sniffer to analyze network traffic generated by a covert backdoor to determine an attacker's tactics
    • Employ the netstat and lsof tools to diagnose specific types of traffic-flooding denial-of-service techniques, and choose appropriate response actions based on each attacker's flood technique
    • Analyze shell history files to find compromised machines, attacker-controlled accounts, sniffers, and backdoors
Clone this wiki locally