Ethical Hacking

  1. Advanced Evasion and Anti-Forensics
    1. Firewall Evasion Techniques
      1. Packet Manipulation
        1. Packet Fragmentation
          1. IP Fragmentation Attacks
            1. TCP Segmentation
            2. Protocol Manipulation
              1. Protocol Tunneling
                1. Covert Channels
                  1. Protocol Misuse
                  2. Traffic Obfuscation
                    1. Encryption and Encoding
                      1. Traffic Padding
                        1. Timing Manipulation
                        2. Firewall Bypass Methods
                          1. Port Hopping
                            1. Source Routing
                              1. Proxy Chaining
                            2. Intrusion Detection System Evasion
                              1. Signature Evasion
                                1. Payload Encoding
                                  1. Polymorphic Shellcode
                                    1. Metamorphic Code
                                    2. Anomaly Detection Evasion
                                      1. Behavioral Mimicry
                                        1. Slow and Low Attacks
                                          1. Legitimate Traffic Blending
                                          2. Network-Based IDS Evasion
                                            1. Packet Timing Manipulation
                                              1. Traffic Fragmentation
                                                1. Protocol Anomalies
                                                2. Host-Based IDS Evasion
                                                  1. File System Manipulation
                                                    1. Registry Evasion
                                                      1. Process Hiding Techniques
                                                    2. Anti-Forensics Techniques
                                                      1. Data Destruction
                                                        1. Secure File Deletion
                                                          1. Disk Wiping Techniques
                                                            1. Metadata Removal
                                                            2. Data Hiding
                                                              1. Steganography
                                                                1. Image Steganography
                                                                  1. Audio Steganography
                                                                    1. Network Steganography
                                                                    2. Alternate Data Streams
                                                                      1. Hidden Partitions
                                                                      2. Timestamp Manipulation
                                                                        1. File Timestamp Modification
                                                                          1. System Clock Manipulation
                                                                            1. Log Timestamp Alteration
                                                                            2. Evidence Elimination
                                                                              1. Log File Manipulation
                                                                                1. Event Log Clearing
                                                                                  1. Artifact Removal
                                                                                2. Rootkit Technologies
                                                                                  1. User-Mode Rootkits
                                                                                    1. Application-Level Hooks
                                                                                      1. DLL Injection
                                                                                        1. Process Replacement
                                                                                        2. Kernel-Mode Rootkits
                                                                                          1. System Call Hooking
                                                                                            1. Direct Kernel Object Manipulation
                                                                                              1. Filter Drivers
                                                                                              2. Bootkit Technologies
                                                                                                1. Master Boot Record Modification
                                                                                                  1. UEFI Rootkits
                                                                                                    1. Hypervisor-Based Rootkits
                                                                                                    2. Rootkit Detection Evasion
                                                                                                      1. Anti-Detection Techniques
                                                                                                        1. Rootkit Communication
                                                                                                          1. Persistence Mechanisms
                                                                                                        2. Advanced Persistent Threat Techniques
                                                                                                          1. Initial Compromise
                                                                                                            1. Spear Phishing Campaigns
                                                                                                              1. Watering Hole Attacks
                                                                                                                1. Supply Chain Attacks
                                                                                                                2. Persistence and Stealth
                                                                                                                  1. Living off the Land Techniques
                                                                                                                    1. Fileless Malware
                                                                                                                      1. Memory-Only Attacks
                                                                                                                      2. Lateral Movement
                                                                                                                        1. Credential Harvesting
                                                                                                                          1. Pass-the-Hash Attacks
                                                                                                                            1. Remote Service Exploitation
                                                                                                                            2. Data Exfiltration
                                                                                                                              1. Covert Communication Channels
                                                                                                                                1. Data Staging
                                                                                                                                  1. Encrypted Exfiltration