Find the course of your interest

Courses
ETHICAL HACKING

Introduction

Basic terminology

Windows Hacking

Social Engineering Attacks

Phishing

Session hacking & Cookie grabbing

Charge/penalties against hacking in INDIA

Virtual Environment

Kali Linux Live Environment

Working on Linux Operating System

Wireless Attacks

DVWA

Password Cracking

Man-in-the-middle attack (MITM Attack) (Practical)

Cross site scripting attack (XSS) (Practical)

XSS Attack with cookie grabbing

Using Ettercap

Welcome        Follow us

Image Alt

ETHICAL HACKING

  /  TECHNICAL  /  ETHICAL HACKING

ETHICAL HACKING

£0
Instructor:
Categories:
Reviews:

Syllabus

Introduction

• Introduction to networking • Introduction to Internet • Introduction to Networking • Introduction to Ethical Hacking

Basic terminology

• white hat, gray hat, black hat • SQL injections, VPN, proxy, VPS, and keyloggers

Windows Hacking

• Phishing, Trojan & viruses • Introduction to windows batch commands • Creating Backdoor in Windows • Using Batch commands to create viruses • Steganography • Hiding and Locking Files in Windows using batch commands

Social Engineering Attacks

Phishing

Session hacking & Cookie grabbing

Charge/penalties against hacking in INDIA

Virtual Environment

• Virtual Box installation • Creating a virtual environment • Installing Virtual Box on Windows • Kali Linux installation/setup • Virtual Box Guest Additions installation

Kali Linux Live Environment

• Making a Kali Bootable USB Drive • Kali Linux Live USB Persistence

Working on Linux Operating System

• Linux terminal basics • Linux command line interface basics

• Tor browser setup • Proxy chains • Virtual private network • Changing your mac address with mac changer • Foot printing with network mapper (n map) and external resources

Wireless Attacks

• Attacking wireless networks cracking WPA/WPA2 • Ari cracking & crunch hacking example • Cracking WPS pins with reaver

DVWA

• Key Loggers • MITM attack • Performing denial of service attacks on wireless networks • SSL strip • SQL Injection

Password Cracking

• Brute force methods for cracking passwords – cracking hashes • Cracking Linux Passwords • Cracking windows passwords with john the ripper

Man-in-the-middle attack (MITM Attack) (Practical)

Cross site scripting attack (XSS) (Practical)

XSS Attack with cookie grabbing

Using Ettercap

• Hydra usage • Do’s attack • Intro to metasploit and reverse shells. • Metasploit starting from a two terminal setup. • Making reverse shells persistent on another system and escalating privileges. • Creating a persistent shell with metasploit. • Using netcat to make any kind of connection you may need. • How to upload a reverse shell onto a web server.

Reviews

Our course begins with the first step for generating great user experiences: understanding what people do, think, say, and feel. In this module, you’ll learn how to keep an open mind while learning.

0 Rated 0 out of 0 Ratings

5 stars 0

4 stars 0

3 stars 0

2 stars 0

1 stars 0

Members

Our course begins with the first step for generating great user experiences: understanding what people do, think, say, and feel. In this module, you’ll learn how to keep an open mind while learning.

Total numbers of students in course