Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type of Ethical Hackers Hackers vs. Crackers o Classification of Hackers o Phases of Hacking o Basic Terminologies o Hacker Classes o Skills of Ethical Hacker o Vulnerability Research Networking and Basics o IP Address, Finding a Remote IP Address o Hiding Your IP Address o Tracing an IP Address o MAC Address o Internal VS External IP Addresses o MAC Addresses o MAC Addresses Spoofing Kali Linux o Introduction & Installation o Basic Linux Command o Installing Linux Application o Assigning IP Address in Kali o Changing the default password o Updating the applications and operating system o Virtual Box o VMware Workstation Google Hacking: Advisories and server vulnerabilities, finding Login Page, Using Cache and Google as Proxy,Hacking Live Webcam, Printer etc.
Foot printing o What is Foot printing? o Types of Foot printing o DNS brute forcing with fierce o Domain Information Groper o Ns Lookup it's there when you need it o Search for People o Search for Company s Information o Finding Internal URL of Website o Gather public information o DNS and WHOIS Lookups o Robots.txt o Network Reconnaissance o Archive Pages o Mirroring of Websites Scanning o Definition of Scanning o Types of Scanning o Difference between Port and Network Scanning o Ping and Ping Sweep o Network Scanning o Use of NMAP o Advanced Port Scanner o Port Scanning o Daemon Banner Grabbing o OS Fingerprinting o ID Server Tool o Vulnerability Scanning o Nessus Tool Attacking Phase : Exploit Vulnerability, Mestaploit -learn it and love it, Armitage, Net Cat, Learn Meter preter, Getting files to and from victim machines Android Phone Hacking: Introduction to Android, Gaining Access to Android Phone, APK File Package, Securing your Mobile
System Hacking o System Hacking Techniques o System Hacking Goal o Window Hacking & Security o Password Cracking o SysKey o Hiding Files o Ophcrack o Hiren Boot & Konboot o Concept of Auditing, Logs, Covering Tracks o What are Covering Tracks? o Techniques to clear Tracks o Covering Track Tools Sniffing o Network Sniffing o Active and passive Sniffing attacks o Session Hijacking Attacks o Tools : Hamster, Ferret, Urlsnarf o DNS Poisoning o Passive Sniffing & Active Sniffing o ARP Poisoning Attacks o Ettercap, Cain abel & Tcpdump o MAC Flooding Attacks o Tool : MACOF Trojan o Purpose of Trojan o Types of Trojan o Purpose of Trojan inventor o Detecting Trojan Attacks o Ports used by Trojans o Beast & Dark Comet o Wrapper o Icon Changer o Network Activity Detection o Process Monitoring Tools o Suspicious Files and Folders Detection
Virus & Worm o Working of Virus & Worm o Stages of Virus o Creating Virus by programming and automate tools o Virus Analysis o Difference between Worm & Virus o Virus Detection Method o Spyware o Internet and E-mail Spyware o Adware Wireless Hacking o Introduction of Wireless Network o Types of Wireless Network,Wireless Technology o Advantages and Disadvantages of Wireless Network o Wireless Cracking WEP,WPA,WPA2 o Wireless Security o Wireless Intrusion Detection System o Tips to Secure Wireless Network Email Hacking o Concept of Email Spam and Spam Laws o E-Mail Tracking By Header o Concept of Fake E-mails o Various Steps to send Fake mails Trace IP by PHP Script Phishing o Tabnapping o Desktop Phishing o Social Engineering Keylogger o What is Keylogger? o Categorization of Keystroke Loggers o Advanced Keylogger o Keylogger: Spytech SpyAgent o Keylogger: Perfect Keylogger o Hardware Keylogger
USB Hacking & Browser Hacking o USB Hacking USB for Coping Data o Blocking USB Devices o Browser Security o Manta Browser o Beef Stenography o Art of Hiding o How Steganography Works o Steganography Today o Steganography With CMD o Steganography Tools o Steganalysis Crypotography o Introduction to Cryptography o Advantages and uses of Cryptography o Symmetric Algorithms Asymmetric Algorithms o Encryption o Cipher o Disk Encryption o Hashing Algorithms DOS And DDOS o Concept: Denial of Service o Introduction to Distributed Denial of Service Attacks? o Working of Distributed Denial of Service Attacks? o Symptoms of a DOS Attack o Impact DDOS/DOS Attack Difference of DDOS & DOS o Intoduction to Botnet Social Engineering attacks Through SET - Set Social Engineering toolkit. SQL Injection Concepts o Basics of SQL o Web Application Working o Introduction to Server Side Technologies
o SQL injection o Identifying SQL Injection via Error Messages o Advanced SQL Injection Attacks o SQL Injection using Kali SQLMAP o Types of SQL Injection o Simple SQL Injection Attack o Union SQL Injection Example o SQL Injection Error Based Social Engineering o What is Social Engineering? o Techniques of Social Engineering o Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder surfing, Third Person Approach. o Spam Emails o Social Engineering with Computer Firewalls & Honeypots o What Does a Firewall Do? o What a Firewall cannot do o How does a Firewall work? o Types of Firewall o Working of Firewall o Advantages and Disadvantages of Firewall o Test firewall using fire walking tool o Concept of Honeypots o Purpose and working of Honeypots o Advantages and Disadvantages of Honeypots o Types and uses of Honeypots Penetration Testing o Pen Testing Concepts o Types of Pen Testing o Pen Testing Phases & Tools