ExperTeach Networking Logo

Hacking I

Understanding Network Attacks

ExperTeach Networking Logo
In the context of cyber security, effective protection against attacks from the internet or your own network can only be guaranteed if the people responsible for security know and understand the motivation and approach of the various attackers. In this seminar, the methodical approach of a hacker is presented, from information gathering and planning to the execution of an attack. Another important aspect is the analysis of a security incident with the help of digital forensics. The course content is deepened by means of practical exercises. In a test environment, you will learn the methodology of a hacker and then simulate active attacks in a test network. This enables you to check your own network for vulnerabilities and secure it against attacks.

Course Contents

  • Motivation and methodology of attacks
  • Tools used by hackers
  • Malware - from viruses to rootkits
  • Sniffing and man-in-the-middle attacks
  • LAN and WLAN attacks
  • Abusing protocols
  • Information gathering - reconnaissance and enumeration
  • Exploring networks
  • Portscan and fingerprinting
  • Vulnerability checks
  • Exploitation with Metasploit
  • Password attacks
  • Digital forensics methods
  • Securing attack traces
  • Analyzing security incidents

The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.

Premium Course Documents

In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.

  • High-quality color prints of the ExperTeach documentation
  • Exclusive folder in an elegant design
  • Document pouch in backpack shape
  • Elegant LAMY ballpoint pen
  • Practical notepad
Premium Print
The Premium Print Package can be added during the ordering process for € 200,- plus VAT (only for classroom participation).

Request in-house training now

Target Group

This training is aimed at people who are responsible for securing the network and connected servers against hacker attacks.

Knowledge Prerequisites

Good IP knowledge and basic knowledge of router networks are required. Practical experience in dealing with networks is very helpful. The course TCP/IP - Protocols, Addressing, Routing is a good preparation.

Alternatives

This course provides an introduction to the topics of attacks and protective measures from a technical and practical perspective. The Cyber Security course takes a more solution-oriented approach.

You can also purchase this course at a reduced price as part of this qualification package.

Complementary and Continuative Courses

Hacking II – Angriffe auf Endgeräte und Applikationen
1 Netzwerkangriffe – Ein Überblick
1.1 Angriffsziele
1.1.1 Angriff auf Clients
1.1.2 Mobile Endgeräte angreifen
1.1.3 Angriff auf Netzwerke
1.1.4 Angriff auf Server
1.2 Klassifizierung von Angreifern
1.2.1 Freizeithacker
1.2.2 Professionelle Angreifer
1.2.3 Politische Motive
1.2.4 Wirtschaftliche Interessen
1.2.5 Cyberterrorismus
1.2.6 Bedrohungen kennen
1.3 Struktur eines Angriffs
1.4 Quellen für Hackertools
1.4.1 Pen Testers Framework – PTF
1.4.2 Linux-Hacking-Distributionen
1.4.3 Kali -Linux anpassen
1.4.4 Mobile Endgeräte als Angriffswerkzeug
   
2 Informationsbeschaffung
2.1 Unternehmensinformationen sammeln
2.1.1 Das WWW als Informationsquelle
2.1.2 Soziale Plattformen ausnutzen
2.1.3 Suchmaschinen verwenden
2.2 Zielnetze lokalisieren
2.2.1 RIPE & Co. – Wem gehört das Netz?
2.2.2 WHOIS – Wer hat die Domain registriert
2.2.3 Verräterische Mails
2.3 Footprinting durch DNS
2.3.1 Nslookup, dig und Co.
2.3.2 Zonentransfers
2.3.3 Wörterbuchangriff auf die Zone
2.3.4 Reverse Lookups
2.4 Discover Scripts
2.5 Netzwerke auskundschaften
2.5.1 Passiv – Einfach nur lauschen
2.5.2 Aktiv-Ping Varianten
2.5.3 Traceroute ermittelt den Aufbau
2.5.4 Firewallregeln ermitteln
   
3 Sniffing in LAN und WLAN
3.1 Pakete mitlesen
3.1.1 Sniffing im LAN
3.1.2 Netzwerksniffer
3.2 Sniffing in geswitchten Netzen
3.2.1 Flooding des Switches
3.2.2 Port Stealing
3.2.3 IPv4 – ARP Cache Poisoning
3.2.4 Ettercap
3.2.5 IPv6 – NDP-Angriffe
3.3 Paketinformationen auswerten
3.4 Schutz gegen Sniffing-Angriffe
3.4.1 Port Security
3.4.2 ARP Inspection
3.4.3 Authentisierung mit IEEE 802.1X
   
4 Netzwerke angreifen
4.1 Gefahren im LAN
4.1.1 VLAN Hopping
4.1.2 Autokonfiguration von Trunks
4.1.3 Spanning-Tree-Angriffe
4.1.4 VRRP und HSRP-Angriffe
4.2 IPv4-Angriffe
4.2.1 ICMP-Angriffe
4.2.2 DHCP-Angriffe
4.3 Tools für Layer2/3-Angriffe
4.3.1 Hyenae
4.3.2 Yersinia
4.3.3 Scapy
4.4 IPv6 – Das Protokoll und seine Schwächen
4.4.1 ICMPv6-Angriffe
4.4.2 Sicherheit von DHCPv6
   
5 WLAN-Angriffe
5.1 Sicherheit im WLAN
5.1.1 Verschlüsselung und Integrität
5.1.2 Authentisierung
5.1.3 WEP – Wired Equivalent Privacy
5.1.4 WPA – Wi-Fi Protected Access
5.1.5 IEEE 802.11i – WPA2
5.2 Angriffe im WLAN
5.3 Ein WLAN-Netz auskundschaften
5.3.1 Die SSID ermitteln
5.3.2 Kismet und Giskismet
5.3.3 WLAN-Sniffing
5.4 Authentisierungsangriffe
5.4.1 WLAN-Cracking-Tools
5.4.2 Wifite
5.4.3 Fern-Wifi-Cracker
5.4.4 WPS-Angriffe – Reaver, Bully und Co.
5.5 MDK3 – DoS auf WLANs
5.6 Wifi Honeypots
   
6 Port Scanning
6.1 Grundlagen des Port Scanning
6.1.1 Dienste erforschen
6.1.2 Ports von Interesse
6.2 Scanning Varianten
6.2.1 Direct Scanning
6.2.2 Indirect Scanning
6.2.3 TCP Scanning
6.2.4 UDP Scanning
6.3 Advanced Scanning
6.3.1 OS Detection
6.3.2 Version Detection
6.4 Port Scanning in der Praxis
6.4.1 Einfach aber schnell
6.4.2 Nmap
6.4.3 Shares scannen
6.4.4 LAN- Scanning
6.4.5 Scanning Apps
6.4.6 Scans verschleiern
   
7 Schwachstellenanalyse
7.1 Mehr als nur Port Scan
7.1.1 Mehrwert der Schwachstellenanalyse
7.1.2 Arten von Schwachstellenanalysen
7.1.3 Grenzen der Schwachstellenanalyse
7.2 Hintergründe der Schwachstellenanalyse
7.2.1 Mit oder ohne Anmeldung
7.2.2 Auf Patches scannen
7.3 Tools zur Schwachstellenanalyse
7.3.1 Nessus
7.3.2 OpenVAS
7.3.3 Nexpose
7.3.4 GFI – LanGuard
7.3.5 Retina Network Security Scanner
7.3.6 Qualys Guard
   
8 Metasploit – Ein Einstieg
8.1 Überblick über Metasploit
8.1.1 Exploits
8.1.2 Payloads
8.1.3 Weitere Module
8.2 Arbeiten mit dem Framework
8.2.1 Exploitation mit Metasploit
8.2.2 Msfconsole
8.3 Armitage
8.3.1 Vorbereitung zum Start
8.3.2 Die GUI
8.3.3 Targets suchen
8.3.4 Schwachstellen lokalisieren
8.3.5 Exploitation
8.4 Post Exploitation
8.4.1 Meterpreter – Shell mit Erweiterungen
8.4.2 Der Shell Payload
8.5 Hail Mary
   
9 Passwortangriffe im Überblick
9.1 Default Passwords
9.2 Angriffsvarianten
9.2.1 Password Cracking (offline)
9.2.2 Password Cracking (online)
9.2.3 Password Sniffing
9.3 Tools für Kennwortangriffe
9.3.1 Offline Cracking Tools
9.3.2 Online cracking Tools
9.3.3 Tools zum Password Sniffing
   
10 Digitale Forensik
10.1 Forensik und Digitale Forensik
10.2 Forensik-Modelle
10.2.1 Secure – Beweissicherung
10.2.2 Analyse – Daten auswerten
10.2.3 Present – Bericht erstellen
10.2.4 Das BSI Modell für Digitale Forensik
10.3 Computer und Laptops
10.3.1 Live Response und Post Mortem Analyse
10.3.2 Die Festplatte auswerten
10.3.3 Computer Forensik Tools
10.4 Mobile Devices
10.4.1 Informationssicherung mobiler Endgeräte
10.4.2 Interaktion hinterfragen
10.4.3 Die SIM-Karte auswerten
10.4.4 Tools für Mobile-Device-Forensik
10.5 Betriebssysteme
10.5.1 Windows
10.5.2 Linux
10.5.3 Mac OS X
10.5.4 Android
10.5.5 iOS
10.6 Anwendungen
10.6.1 Browser-Artefakte
10.6.2 Chat und Instant Messaging
10.6.3 E-Mail
10.7 Netzwerk Forensik
10.7.1 Netzwerkverkehr aufzeichnen
10.7.2 Netzwerk Analyse Tools
10.7.3 Log-Dateien auswerten
10.7.4 Cloud Forensik
10.8 Linux-Forensik-Distributionen

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

In the context of cyber security, effective protection against attacks from the internet or your own network can only be guaranteed if the people responsible for security know and understand the motivation and approach of the various attackers. In this seminar, the methodical approach of a hacker is presented, from information gathering and planning to the execution of an attack. Another important aspect is the analysis of a security incident with the help of digital forensics. The course content is deepened by means of practical exercises. In a test environment, you will learn the methodology of a hacker and then simulate active attacks in a test network. This enables you to check your own network for vulnerabilities and secure it against attacks.

Course Contents

  • Motivation and methodology of attacks
  • Tools used by hackers
  • Malware - from viruses to rootkits
  • Sniffing and man-in-the-middle attacks
  • LAN and WLAN attacks
  • Abusing protocols
  • Information gathering - reconnaissance and enumeration
  • Exploring networks
  • Portscan and fingerprinting
  • Vulnerability checks
  • Exploitation with Metasploit
  • Password attacks
  • Digital forensics methods
  • Securing attack traces
  • Analyzing security incidents

The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.

Premium Course Documents

In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.

  • High-quality color prints of the ExperTeach documentation
  • Exclusive folder in an elegant design
  • Document pouch in backpack shape
  • Elegant LAMY ballpoint pen
  • Practical notepad
Premium Print
The Premium Print Package can be added during the ordering process for € 200,- plus VAT (only for classroom participation).

Request in-house training now

Target Group

This training is aimed at people who are responsible for securing the network and connected servers against hacker attacks.

Knowledge Prerequisites

Good IP knowledge and basic knowledge of router networks are required. Practical experience in dealing with networks is very helpful. The course TCP/IP - Protocols, Addressing, Routing is a good preparation.

Alternatives

This course provides an introduction to the topics of attacks and protective measures from a technical and practical perspective. The Cyber Security course takes a more solution-oriented approach.

You can also purchase this course at a reduced price as part of this qualification package.

Complementary and Continuative Courses

Hacking II – Angriffe auf Endgeräte und Applikationen

1 Netzwerkangriffe – Ein Überblick
1.1 Angriffsziele
1.1.1 Angriff auf Clients
1.1.2 Mobile Endgeräte angreifen
1.1.3 Angriff auf Netzwerke
1.1.4 Angriff auf Server
1.2 Klassifizierung von Angreifern
1.2.1 Freizeithacker
1.2.2 Professionelle Angreifer
1.2.3 Politische Motive
1.2.4 Wirtschaftliche Interessen
1.2.5 Cyberterrorismus
1.2.6 Bedrohungen kennen
1.3 Struktur eines Angriffs
1.4 Quellen für Hackertools
1.4.1 Pen Testers Framework – PTF
1.4.2 Linux-Hacking-Distributionen
1.4.3 Kali -Linux anpassen
1.4.4 Mobile Endgeräte als Angriffswerkzeug
   
2 Informationsbeschaffung
2.1 Unternehmensinformationen sammeln
2.1.1 Das WWW als Informationsquelle
2.1.2 Soziale Plattformen ausnutzen
2.1.3 Suchmaschinen verwenden
2.2 Zielnetze lokalisieren
2.2.1 RIPE & Co. – Wem gehört das Netz?
2.2.2 WHOIS – Wer hat die Domain registriert
2.2.3 Verräterische Mails
2.3 Footprinting durch DNS
2.3.1 Nslookup, dig und Co.
2.3.2 Zonentransfers
2.3.3 Wörterbuchangriff auf die Zone
2.3.4 Reverse Lookups
2.4 Discover Scripts
2.5 Netzwerke auskundschaften
2.5.1 Passiv – Einfach nur lauschen
2.5.2 Aktiv-Ping Varianten
2.5.3 Traceroute ermittelt den Aufbau
2.5.4 Firewallregeln ermitteln
   
3 Sniffing in LAN und WLAN
3.1 Pakete mitlesen
3.1.1 Sniffing im LAN
3.1.2 Netzwerksniffer
3.2 Sniffing in geswitchten Netzen
3.2.1 Flooding des Switches
3.2.2 Port Stealing
3.2.3 IPv4 – ARP Cache Poisoning
3.2.4 Ettercap
3.2.5 IPv6 – NDP-Angriffe
3.3 Paketinformationen auswerten
3.4 Schutz gegen Sniffing-Angriffe
3.4.1 Port Security
3.4.2 ARP Inspection
3.4.3 Authentisierung mit IEEE 802.1X
   
4 Netzwerke angreifen
4.1 Gefahren im LAN
4.1.1 VLAN Hopping
4.1.2 Autokonfiguration von Trunks
4.1.3 Spanning-Tree-Angriffe
4.1.4 VRRP und HSRP-Angriffe
4.2 IPv4-Angriffe
4.2.1 ICMP-Angriffe
4.2.2 DHCP-Angriffe
4.3 Tools für Layer2/3-Angriffe
4.3.1 Hyenae
4.3.2 Yersinia
4.3.3 Scapy
4.4 IPv6 – Das Protokoll und seine Schwächen
4.4.1 ICMPv6-Angriffe
4.4.2 Sicherheit von DHCPv6
   
5 WLAN-Angriffe
5.1 Sicherheit im WLAN
5.1.1 Verschlüsselung und Integrität
5.1.2 Authentisierung
5.1.3 WEP – Wired Equivalent Privacy
5.1.4 WPA – Wi-Fi Protected Access
5.1.5 IEEE 802.11i – WPA2
5.2 Angriffe im WLAN
5.3 Ein WLAN-Netz auskundschaften
5.3.1 Die SSID ermitteln
5.3.2 Kismet und Giskismet
5.3.3 WLAN-Sniffing
5.4 Authentisierungsangriffe
5.4.1 WLAN-Cracking-Tools
5.4.2 Wifite
5.4.3 Fern-Wifi-Cracker
5.4.4 WPS-Angriffe – Reaver, Bully und Co.
5.5 MDK3 – DoS auf WLANs
5.6 Wifi Honeypots
   
6 Port Scanning
6.1 Grundlagen des Port Scanning
6.1.1 Dienste erforschen
6.1.2 Ports von Interesse
6.2 Scanning Varianten
6.2.1 Direct Scanning
6.2.2 Indirect Scanning
6.2.3 TCP Scanning
6.2.4 UDP Scanning
6.3 Advanced Scanning
6.3.1 OS Detection
6.3.2 Version Detection
6.4 Port Scanning in der Praxis
6.4.1 Einfach aber schnell
6.4.2 Nmap
6.4.3 Shares scannen
6.4.4 LAN- Scanning
6.4.5 Scanning Apps
6.4.6 Scans verschleiern
   
7 Schwachstellenanalyse
7.1 Mehr als nur Port Scan
7.1.1 Mehrwert der Schwachstellenanalyse
7.1.2 Arten von Schwachstellenanalysen
7.1.3 Grenzen der Schwachstellenanalyse
7.2 Hintergründe der Schwachstellenanalyse
7.2.1 Mit oder ohne Anmeldung
7.2.2 Auf Patches scannen
7.3 Tools zur Schwachstellenanalyse
7.3.1 Nessus
7.3.2 OpenVAS
7.3.3 Nexpose
7.3.4 GFI – LanGuard
7.3.5 Retina Network Security Scanner
7.3.6 Qualys Guard
   
8 Metasploit – Ein Einstieg
8.1 Überblick über Metasploit
8.1.1 Exploits
8.1.2 Payloads
8.1.3 Weitere Module
8.2 Arbeiten mit dem Framework
8.2.1 Exploitation mit Metasploit
8.2.2 Msfconsole
8.3 Armitage
8.3.1 Vorbereitung zum Start
8.3.2 Die GUI
8.3.3 Targets suchen
8.3.4 Schwachstellen lokalisieren
8.3.5 Exploitation
8.4 Post Exploitation
8.4.1 Meterpreter – Shell mit Erweiterungen
8.4.2 Der Shell Payload
8.5 Hail Mary
   
9 Passwortangriffe im Überblick
9.1 Default Passwords
9.2 Angriffsvarianten
9.2.1 Password Cracking (offline)
9.2.2 Password Cracking (online)
9.2.3 Password Sniffing
9.3 Tools für Kennwortangriffe
9.3.1 Offline Cracking Tools
9.3.2 Online cracking Tools
9.3.3 Tools zum Password Sniffing
   
10 Digitale Forensik
10.1 Forensik und Digitale Forensik
10.2 Forensik-Modelle
10.2.1 Secure – Beweissicherung
10.2.2 Analyse – Daten auswerten
10.2.3 Present – Bericht erstellen
10.2.4 Das BSI Modell für Digitale Forensik
10.3 Computer und Laptops
10.3.1 Live Response und Post Mortem Analyse
10.3.2 Die Festplatte auswerten
10.3.3 Computer Forensik Tools
10.4 Mobile Devices
10.4.1 Informationssicherung mobiler Endgeräte
10.4.2 Interaktion hinterfragen
10.4.3 Die SIM-Karte auswerten
10.4.4 Tools für Mobile-Device-Forensik
10.5 Betriebssysteme
10.5.1 Windows
10.5.2 Linux
10.5.3 Mac OS X
10.5.4 Android
10.5.5 iOS
10.6 Anwendungen
10.6.1 Browser-Artefakte
10.6.2 Chat und Instant Messaging
10.6.3 E-Mail
10.7 Netzwerk Forensik
10.7.1 Netzwerkverkehr aufzeichnen
10.7.2 Netzwerk Analyse Tools
10.7.3 Log-Dateien auswerten
10.7.4 Cloud Forensik
10.8 Linux-Forensik-Distributionen

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.