ETHICAL HACKING TRAINING 

Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Sed molestie, velit ut eleifend sollicitudin, neque orci tempor nulla, id sagittis nisi ante nec arcu.

INTRODUCTION

  • What is hacking? And what is Ethical about it?
  • Types of Hackers.
  • The terminology of Hacking [Vulnerability, Exploit, 0-Day]
  • 5 Steps of Hacking [Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks]
  • Discussing Information Gathering [Active, Passive]
  • Information Gathering Practical [who.is, yougetsignal.com]
  • Google Hacking
  • Types of malicious files [virus, worm, rootkit etc]
  • Introduction to Kali/Linux OS
  • Social Engineering

INSTALLATION

  • According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali 1.1.0a/Backbox, Windows XP SP2
  • Install VMware, OSs on it using Bridge Connection
  • Completion of the Lab setup.

EXPLANATION OF THE TOOLS

  • Ping a Website to get IP Addon:-server spy, Passive recon, Flagfox, Ghostery, Cryptofox, Wapplazer (Mozilla Firefox), Tamper data
  • Network Scan, Port Scan, Service Scan, OS Fingerprint Scan [Nmap/Zenmap]
  • Network Vulnerability Scanning [Nessus/Open VAS]
  • Metasploit, SE Toolkit
  • Web Vulnerability Scanning [Acunetix/Zap]
  • SQL-Injection [Havij, Sqlmap]
  • Cryptography
  • Steganography

SYSTEM HACKING

  • System Hacking using Kon-Boot, Live CD
  • Prevention of System Hacking
  • Types of Passwords
  • Password Cracking
  • Dictionary, brute force attack, Rule-Based attack
  • Keylogger, Spyware, Rootkits
  • Defending Keylogger, Spyware and Rootkits

NETWORK PENETRATION TESTING

  • Remote Administration Tool {RAT}
  • Scanning with NMAP
  • Installing of Nessus
  • Vulnerability Scanning using Nessus/Qualys Free Scan/ GFI Lan Guard
  • Metasploit
  • Set toolkit
  • Protect System from RAT
  • Protect System from Metasploit
  • What is Sniffing and what is the mechanism of Sniffing
  • How to use Wireshark and Cain and Able as a sniffer
  • What is netscan and how it works in Real-time and practical
  • Malware threats and prevention
  • Denial Of Service/ Distributed Denial Of Service
  • Session Hijacking
  • Hacking Wireless Network
  • MAC Spoofing
  • IP Spoofing
  • Tor Browser and VPN

WEB APPLICATION PENETRATION

  • Web Application and its basics (Understanding HTML and its response and a website works)
  • OWASP Top 10 Vulnerability
  • SQL-Injection [Basic, Advance, Blind]
  • Practical of SQL-Injection using Havij/Sqlmap
  • Prevention of SQL-Injection
  • Cross Site Scripting and Its effect
  • Prevention of Cross-site scripting
  • Data-tampering on E-commerce Sites
  • Prevention of Data-tampering
  • Website Defacement and Prevention
  • E-mail hacking using phishing
  • Hacking Web Servers

CONTACT US

Free Courses

Duis egestas aliquet aliquet. Maecenas erat eros, fringilla et leo eget, viverra pretium nulla. Quisque sed augue tincidunt, posuere dui tempor.

Premium Courses

Duis egestas aliquet aliquet. Maecenas erat eros, fringilla et leo eget, viverra pretium nulla. Quisque sed augue tincidunt, posuere dui tempor.