Before the course |
|
(W00) Course Instructions |
|
00:00:00 |
|
(W38M00) Before the course - introduction |
|
00:00:00 |
Module 1 |
|
(W38M01) Module Introduction |
|
00:00:00 |
|
(W38M02) Methodology of Hacking |
|
00:00:00 |
|
(W38M03) Covering tracks and hiding |
|
00:00:00 |
|
(W38M04) Hiding evidence by altering event logs |
|
00:00:00 |
|
(W38M05) Attacking event logs in Windows |
|
00:00:00 |
|
(W38M06) Altering Event Logs in Windows |
|
00:00:00 |
|
(W38M07) Tool 1 - LCP |
|
00:00:00 |
|
(W38M08) Tool 2 - Winzapper |
|
00:00:00 |
|
(W38M09) Tool 3 - Event Viewer |
|
00:00:00 |
|
(W38M10) How to clear Event Logs |
|
00:00:00 |
|
(W38M11) Clearing Events from Command Prompt Part 1 |
|
00:00:00 |
|
(W38M12) Clearing Events from Command Prompt Part 2 |
|
00:00:00 |
|
(W38M13) Clear All Events Using PowerShell |
|
00:00:00 |
|
(W38M14) Linux / Unix Logs |
|
00:00:00 |
|
(W38M15) How to View Linux Logs? |
|
00:00:00 |
|
(W38M16) Brief History About Syslogs |
|
00:00:00 |
|
(W38M17) Attacking System Logs and Accounting Files in Linux / Unix |
|
00:00:00 |
|
(W38M18) Netcat |
|
00:00:00 |
|
(W38M00) Netcat |
|
00:00:00 |
|
(W38M19) Demonstration: Clearing Logs |
|
00:00:00 |
|
(W38M20) Demonstration: Linux Logs |
|
00:00:00 |
|
(W38M21) Demonstration: Lab Exercise 1 |
|
00:00:00 |
|
(W38A01) Module 1 Exercises and Practical Labs |
30, 00:00 |
Module 2 |
|
(W38M00) UBUNTU SERVER INSTALLATION (MODULE 2) |
|
00:00:00 |
|
(W38M23) Defences against Log and Accounting File Attacks |
|
00:00:00 |
|
(W38M00) UNIX / LINUX - SYSTEM LOGGING |
|
00:00:00 |
|
(W38M24) Active Logging |
|
00:00:00 |
|
(W38M25) Group Policy Objects |
|
00:00:00 |
|
(W38M26) Active Directory |
|
00:00:00 |
|
(W38M27) Microsoft Management Console |
|
00:00:00 |
|
(W38M28) Setting Proper Permissions |
|
00:00:00 |
|
(W38M29) Separate Logging Server |
|
00:00:00 |
|
(W38M30) Encrypting Log Files |
|
00:00:00 |
|
(W38M31) Append-only |
|
00:00:00 |
|
(W38M32) Write-once media |
|
00:00:00 |
|
(W38M33) UTMP, WTMP, BTMP filesv in Linux |
|
00:00:00 |
|
(W38M34) Demonstration: UTMP, WTMP, BTMP files |
|
00:00:00 |
|
(W38M35) Linux |
|
00:00:00 |
|
(W38M36) Shell History |
|
00:00:00 |
|
(W38M37) Syslog Services |
|
00:00:00 |
|
(W38M38) Demonstration: Microsoft Management Console |
|
00:00:00 |
|
(W38M39) Demonstration: ACL Enabling |
|
00:00:00 |
|
(W38A02) Module 2 Exercises and Practical Labs |
30, 00:00 |
Module 3 |
|
(W38M41) Creating hidden files and directories in UNIX |
|
00:00:00 |
|
(W38M42) Linux Links |
|
00:00:00 |
|
(W38M43) Creating Hidden Files in Windows |
|
00:00:00 |
|
(W38M44) Defenses from Hidden Files |
|
00:00:00 |
|
(W38M45) Alternate Stream View |
|
00:00:00 |
|
(W38M46) ADS Manager |
|
00:00:00 |
|
(W38M47) ADS Spy Tool |
|
00:00:00 |
|
(W38M48) Create a text file using a CAT command |
|
00:00:00 |
|
(W38M49) Hiding Files Demonstration |
|
00:00:00 |
|
(W38M50) NTFS Streaming Demonstration |
|
00:00:00 |
|
(W38M51) Tools Demonstration |
|
00:00:00 |
|
(W38M52) Port Scanning Demonstration |
|
00:00:00 |
|
(W38M53) Exercise Demonstration |
|
00:00:00 |
|
(W38A03) Module 3 Assignments |
30, 00:00 |
Module 4 |
|
(W38M57) Hiding Evidence on the network - covert channels |
|
00:00:00 |
|
(W38M55) Tunneling |
|
00:00:00 |
|
(W38M56) ICMP |
|
00:00:00 |
|
(W38M58) Loki - covert channel using ICMP |
|
00:00:00 |
|
(W38M59) Reverse WWW shell - covert channel using HTTP |
|
00:00:00 |
|
(W38M60) Covert channels and malware |
|
00:00:00 |
|
(W38M61) Defenses against covert channels |
|
00:00:00 |
|
(W38M62) Camouflage - demonstration |
|
00:00:00 |
|
(W38M63) Netstat |
|
00:00:00 |
|
(W38M64) ICMP & HTTP |
|
00:00:00 |
|
(W38M65) Practical demonstration |
|
00:00:00 |
|
(W38A04) Module 4 Assignment |
30, 00:00 |
Final Exam |
|
(W38Q01) Final Exam |
|
00:30:00 |