Ethical Hacking Syllabus: Advance Level

In the previous post of Learn Hacking we shared the Beginners Level Ethical Hacking syllabus. In this post we are going to take it to the next level and share the Advance Level Ethical Hacking Syllabus with you all.

This Ethical Hacking syllabus is an amalgam of various advance level Ethical Hacking syllabus like Penetration Tester Syllabus , Network Security Expert Syllabus , Web Application Security ExpertExploit Writing Syllabus etc. It is not easy to categorize all of them separately however I will try to draw a fine line between the Ethical Hacking Syllabus for each one of them.

The Advance Level Hacking Syllabus is as follows:-

Network Security Expert Syllabus

• Security testing methodologies

• The Ethical Hacking Profession

• Passive Intelligence Gathering – 2007 Version

• Network Sweeps

• Stealthily Network Recon

• Passive traffic identification

• Identifying system vulnerabilities

• Abusing Domain Name System (DNS)

• Abusing Simple Network Management Protocol

(SNMP)

Exploit Writing Syllabus

• Introduction to Remote Exploits

• Engineering remote exploits

• Running shellcode in RAM vs. on disk

• Heap Buffer Overflows

• Compromising Windows 2003 Server Systems

• Compromising Solaris Unix and Linux Systems

• Attacking RDP (Remote Desktop Protocol) in

Windows XP, 2003 & Vista

• Windows password weaknesses & Rainbow Tables

• Unix password weaknesses

• Attacking Cisco’s IOS password weaknesses

Trojan genres

• Windows, Unix and Linux Trojans

• Kernel Mode Windows Rootkits – System Call

Hijacking and Direct Kernel Object Modification

• Kernel Mode Linux Rootkits

• Covert communication channels

• Spoofing endpoints of communication tunnels

• Tunneling through IPSec VPNs by abusing ESP

• Steganographic Tunnels

• Remote command execution

• Sniffing and hijacking SSL encrypted sessions

• Installing sniffers on low privilege account in

Windows 2003 Server

• Stealthy Remote keylogger installation

• Circumventing Antivirus

Cyber Forensics Expert

 

• Raw binary editing to prevent forensic

investigations

• Editing the Windows Event Log

• Abusing Windows Named Pipes for Domain

Impersonation

• Impersonation of other Users- Hijacking kernel

tokens

• Disguising network connections

• Attacking Cisco IOS

• Attacking STP & BGP protocols

• Wireless Insecurity

• Breaking Wireless Security – WEP, WPA, WPA2

• Blinding IDS & IPS

• Attacking IDS & IPS

 

 

The above Advance Level Ethical Hacking Syllabus is very diversified and you can choose the topics you want to start with. The topics are a little bit time consuming but if you start with dedication you will surely cover each one of them and take your knowledge to the advance level.

Use this knowledge wisely and for good only.

Learn Hacking won’t be responsible for and damage or illicit activity caused by any person reading this post. Please read our Disclaimer for more.

Want to learn more from us, if yes then make sure that you subscribe to Learn Hacking and get regular updates on your email id..:)

Or you may also follow Learn Hacking on Twitter by clicking over here and our Facebook Fanpage by click over here to learn how to hack.

LearnHacking.in – Ethical Hacking was never so easy and interesting.

 

People who read this also read:

Leave a Reply

Your email address will not be published. Required fields are marked *