Knowledge Required to Program Buffer Overflow Exploits
Buffer Overflow Steps
Attacking a Real Program
Format String Problem
Overflow using Format String
Smashing the Stack
Once the Stack is Smashed...
Simple Uncontrolled Overflow
Simple Buffer Overflow in C
Code Analysis
Exploiting Semantic Comments in C (Annotations)
How to Mutate a Buffer Overflow Exploit?
Identifying Buffer Overflows
How to Detect Buffer Overflows in a Program?
BOU (Buffer Overflow Utility)
Testing for Heap Overflow Conditions: heap.exe
Steps for Testing for Stack Overflow in OllyDbg Debugger
Testing for Stack Overflow in OllyDbg Debugger
Testing for Format String Conditions using IDA Pro
BoF Detection Tools
Defense Against Buffer Overflows
Preventing BoF Attacks
Programming Countermeasures
Data Execution Prevention (DEP)
Enhanced Mitigation Experience Toolkit (EMET)
EMET System Configuration Settings
EMET Application Configuration Window
/GS http://microsoft.com
BoF Security Tools
BufferShield
Buffer Overflow Penetration Testing
Eğitim 18 - Cryptography
Cryptography
Types of Cryptography
Government Access to Keys (GAK)
Ciphers
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
RC4, RC5, RC6 Algorithms
The DSA and Related Signature Schemes
RSA (Rivest Shamir Adleman)
Example of RSA Algorithm
The RSA Signature Scheme
Message Digest (One-way Bash) Functions
Message Digest Function: MD5
Secure Hashing Algorithm (SHA)
What is SSH (Secure Shell)?
MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
Cryptography Tool: Advanced Encryption Package
Cryptography Tools
Public Key Infrastructure (PKI)
Certification Authorities
Digital Signature
SSL (Secure Sockets Layer)
Transport Layer Security (TLS)
Disk Encryption
Disk Encryption Tool: TrueCrypt
Disk Encryption Tools
Cryptography Attacks
Code Breaking Methodologies
Brute-Force Attack
Meet-in-the-Middle Attack on Digital Signature Schemes
Cryptanalysis Tool: CrypTool
Cryptanalysis Tools
Online MD5 Decryption Tool
Eğitim 19 - Penetration Testing
Introduction to Penetration Testing
Security Assessments
Vulnerability Assessment
Limitations of Vulnerability Assessment
Penetration Testing
Why Penetration Testing?
What Should be Tested?
What Makes a Good Penetration Test?
ROI on Penetration Testing
Testing Points
Testing Locations
Types of Penetration Testing
External Penetration Testing
Internal Security Assessment
Black-box Penetration Testing
Grey-box Penetration Testing
White-box Penetration Testing
Announced / Unannounced Testing
Automated Testing
Manual Testing
Common Penetration Testing Techniques
Using DNS Domain Name and IP Address Information
Enumerating Information about Hosts on Publicly-Available Networks
Phases of Penetration Testing
Pre-Attack Phase
Attack Phase
Activity: Perimeter Testing
Enumerating Devices
Activity: Acquiring Target
Activity: Escalating Privileges
Activity: Execute, Implant, and Retract
Post-Attack Phase and Activities
Penetration Testing Deliverable Templates
Penetration Testing Methodology
Application Security Assessment
Web Application Testing - I
Web Application Testing - II
Web Application Testing - III
Network Security Assessment
Wireless/Remote Access Assessment
Wireless Testing
Telephony Security Assessment
Social Engineering
Testing Network-Filtering Devices
Denial of Service Emulation
Outsourcing Penetration Testing Services
Terms of Engagement
Project Scope
Project Scope
Penetration Testing Consultants
i>
Denial of Service Emulation
Evaluating Different Types of Pentest Tools
Application Security Assessment Tool
Webscarab
Network Security Assessment Tool
Angry IP scanner
GFI LANguard
Wireless/Remote Access Assessment Tool
Kismet
Telephony Security Assessment Tool
Omnipee
Testing Network-Filtering Device Tool
Traffic IQ Professional
Cisco eğitimleri alırken nelere dikkat edilmeli?: Eğitim alacağınız kurum ve eğitmenin referansları, eski katılımcıların yorumları mutlaka dinlenmelidir. Eğitim merkezindeki gerçek cihazları görmek ve eğitmenin verdiği derslere konuk olmak doğru karar vermenizde yardımcı olacaktır.