hello Geeks,
sorry for writing after so many days. I was busy somewhere in these days.
But i Have something new for you guys!!!!
Here I am starting My free course of ethical hacking!!!!!!
what ethical hacking free of cost!
so yes it totally free of cost.
In this series of course I will teach you From the very basics of hacking and Security. you will learn via articles and videos. i will make all the practicals snapshots in articles and and also make video of that practical.
sorry for writing after so many days. I was busy somewhere in these days.
But i Have something new for you guys!!!!
Here I am starting My free course of ethical hacking!!!!!!
what ethical hacking free of cost!
so yes it totally free of cost.
In this series of course I will teach you From the very basics of hacking and Security. you will learn via articles and videos. i will make all the practicals snapshots in articles and and also make video of that practical.
Module 1:Introduction to Ethical Hacking
- Who is a Hacker?
 - Hacker Classes
 - Hacktivism
 - What Does a Hacker Do?
 
Basics of
Networking
·        
Network Terminologies
·        
Ip Addressing
·        
Ports
·        
Proxy Servers
·        
NAT
Virtualization
·        
Introduction Of Virtualization
·        
Need & Use Of Virtualization
·        
Virtualbox
·        
Installing OS On Virtual Machines
·        
Networking In Virtual Machines
·        
Troubleshooting 
 Phase 1 - Reconnaissance 
Phase 2 -
Scanning 
Phase 3 –
Gaining Access 
Phase 4 –
Maintaining Access 
Phase 5 –
Covering Tracks 
Types of
Attacks on a System 
Why Ethical
Hacking is Necessary? 
Defense in Depth
Scope and
Limitations of Ethical Hacking 
What Do
Ethical Hackers Do? 
Skills of an
Ethical Hacker 
Vulnerability
Research 
Vulnerability
Research Websites 
What is
Penetration Testing? 
Why
Penetration Testing? 
Penetration
Testing Methodology 
Module 2: Foot printing and Reconnaissance
Foot printing Terminologies 
What is Foot printing?
Objectives of Foot printing
Foot printing Threats 
Finding a Company’s URL
Locate Internal URLs
Public and Restricted Websites 
Search for Company’s Information 
Tools to Extract Company’s Data 
WHOIS Lookup 
WHOIS Lookup Result Analysis 
WHOIS Lookup Tools: SmartWhois 
WHOIS Lookup Tools 
WHOIS Lookup Online Tools 
Extracting DNS
Information 
DNS Interrogation Tools 
DNS Interrogation Online Tools
Locate the
Network Range 
Trace route 
Module 03: Scanning Networks
•  Network Scanning 
•  Types of Scanning 
•  Checking for Live Systems - ICMP Scanning 
•  Ping Sweep 
•  Ping Sweep Tools 
Three-Way
Handshake 
TCP
Communication Flags 
•  Create Custom Packet using TCP Flags 
Hping2 /
Hping3 
Hping Commands
Scanning
Techniques 
•  TCP Connect / Full Open Scan 
•  Stealth Scan (Half-open Scan) 
•  Xmas Scan 
•  FIN Scan 
•  NULL Scan 
•  IDLE Scan 
•  IDLE Scan: Step 1 
•  IDLE Scan: Step 2.1 (Open Port) 
•  IDLE Scan: Step 2.2 (Closed Port) 
•  IDLE Scan: Step 3 
•  ICMP Echo Scanning/List Scan 
•  SYN/FIN Scanning Using IP Fragments 
•  UDP Scanning 
•  Inverse TCP Flag Scanning 
•  ACK Flag Scanning 
Scanning: IDS
Evasion Techniques 
IP
Fragmentation Tools 
Scanning Tool:
Nmap 
Scanning Tool:
NetScan Tools Pro 
Scanning Tools
Do Not Scan
These IP Addresses (Unless you want to get into trouble) 
Scanning
Countermeasures 
War Dialing 
Why War
Dialing?
War Dialing
Tools 
War Dialing
Countermeasures 
•  War Dialing Countermeasures: SandTrap Tool 
OS
Fingerprinting 
•  Active Banner Grabbing Using Telnet 
Banner
Grabbing Tool: ID Serve 
GET REQUESTS 
Banner
Grabbing Tool: Netcraft 
Banner
Grabbing Tools 
Banner
Grabbing Countermeasures: Disabling or Changing Banner 
Hiding File
Extensions 
Vulnerability
Scanning 
•  Vulnerability Scanning Tool: Nessus 
•  Vulnerability Scanning Tool: SAINT 
•  Vulnerability Scanning Tool: GFI LANGuard 
Network
Vulnerability Scanners 
LANsurveyor 
Network
Mappers 
Proxy Servers 
Why Attackers
Use Proxy Servers? 
Use of Proxies
for Attack 
How Does
MultiProxy Work? 
Free Proxy
Servers 
Proxy
Workbench 
Proxifier
Tool: Create Chain of Proxy Servers 
SocksChain 
TOR (The Onion
Routing) 
TOR Proxy
Chaining Software 
HTTP Tunneling
Techniques 
Why do I Need
HTTP Tunneling? 
Super Network
Tunnel Tool 
Httptunnel for
Windows 
Additional
HTTP Tunneling Tools 
SSH Tunneling 
SSL Proxy Tool
How to Run SSL
Proxy? 
Proxy Tools 
Anonymizers 
Types of
Anonymizers
Text
Conversion to Avoid Filters 
Censorship
Circumvention Tool: Psiphon 
How Psiphon
Works? 
How to Check
if Your Website is Blocked in China or Not? 
G-Zapper 
Anonymizer
Tools 
Spoofing IP
Address 
IP Spoofing
Detection Techniques: Direct TTL Probes
IP Spoofing
Detection Techniques: IP IdentificationNumber 
IP Spoofing
Detection Techniques: TCP Flow Control Method 
IP Spoofing
Countermeasures 
Module 04: Enumeration
•  What is Enumeration? 
•  Techniques for Enumeration 
•  Netbios Enumeration 
•  NetBIOS Enumeration Tool: SuperScan 
•  NetBIOS Enumeration Tool: NetBIOS Enumerator 
Enumerating
User Accounts 
Enumerate
Systems Using Default Passwords 
SNMP (Simple
Network Management Protocol) Enumeration
•  Management Information Base (MIB) 
•  SNMP Enumeration Tool: OpUtils Network
Monitoring Toolset 
•  SNMP Enumeration Tool: SolarWinds 
•  SNMP Enumeration Tools 
SMTP
Enumeration 
•  SMTP Enumeration Tool: NetScanTools Pro 
DNS Zone
Transfer Enumeration Using nslookup 
•  DNS Analyzing and Enumeration Tool: The Men
& Mice Suite 
Enumeration
Countermeasures 
•  SMB Enumeration Countermeasures 
Enumeration
Pen Testing 
Module 5:System Hacking
•  Information at Hand Before System Hacking
Stage 
•  System Hacking: Goals 
•  CEH Hacking Methodology (CHM) 
•  Password Cracking 
•  Password Complexity 
•  Password Cracking Techniques 
•  Types of Password Attacks 
•  Passive Online Attacks: Wire Sniffing 
•  Password Sniffing 
•  Passive Online Attack: Man-in-the-Middle and
Replay Attack 
•  Active Online Attack: Password Guessing 
•  Active Online Attack:
Trojan/Spyware/Keylogger 
•  Active Online Attack: Hash Injection Attack 
•  Rainbow Attacks: Pre-Computed Hash 
•  Distributed Network Attack 
•  Elcomsoft Distributed Password Recovery 
•  Non-Electronic Attacks 
•  Default Passwords 
•  Manual Password Cracking (Guessing) 
•  Automatic Password Cracking Algorithm 
•  Stealing Passwords Using USB Drive 
Microsoft
Authentication 
How Hash
Passwords are Stored in Windows SAM? 
What is LAN
Manager Hash? 
•  LM “Hash” Generation 
•  LM, NTLMv1, and NTLMv2 
•  NTLM Authentication Process 
Kerberos
Authentication 
Salting 
PWdump7 and
Fgdump 
L0phtCrack /Ophcrack
Cain &
Abel 
RainbowCrack 
Password
Cracking Tools 
LM Hash
Backward Compatibility 
•  How to Disable LM HASH? 
How to Defend
against Password Cracking? 
•  Implement and Enforce Strong Security Policy 
Privilege
Escalation 
•  Escalation of Privileges 
Active@
Password Changer 
Privilege
Escalation Tools 
EHP Contents 
How to Defend
against Privilege Escalation? 
Executing
Applications 
Alchemy Remote
Executor 
RemoteExec 
Keylogger 
Types of
Keystroke Loggers 
Acoustic/CAM
Keylogger 
•  Keylogger: Advanced Keylogger 
•  Keylogger: Spytech SpyAgent 
•  Keylogger: Perfect Keylogger 
•  Keylogger: Powered Keylogger 
•  Keylogger for Mac: Aobo Mac OS X KeyLogger 
•  Keylogger for Mac: Perfect Keylogger for Mac 
•  Hardware Keylogger: KeyGhost 
Spyware 
•  What Does the Spyware Do? 
•  Types of Spywares 
•  Desktop Spyware 
•  Desktop Spyware: Activity Monitor 
•  Email and Internet Spyware 
•  Email and Internet Spyware: eBLASTER 
•  Internet and E-mail Spyware 
•  Child Monitoring Spyware 
•  Child Monitoring Spyware: Advanced Parental
Control
•  Screen Capturing Spyware 
•  Screen Capturing Spyware: Spector Pro 
•  USB Spyware 
•  USB Spyware: USBDumper 
•  Audio Spyware 
•  Audio Spyware: RoboNanny, Stealth Recorder
Pro and Spy Voice 
Recorder 
•  Video Spyware 
•  Video Spyware: Net Video Spy 
•  Print Spyware 
•  Print Spyware: Printer Activity Monitor 
•  Telephone/Cellphone Spyware 
•  Cellphone Spyware: Mobile Spy 
•  GPS Spyware 
EHP Contents 
•  GPS Spyware: GPS TrackMaker 
How to Defend
against Keyloggers? 
•  Anti-Keylogger 
•  Anti-Keylogger: Zemana AntiLogger 
•  Anti-Keyloggers 
How to Defend
against Spyware? 
•  Anti-Spyware: Spyware Doctor 
Rootkits 
Types of Rootkits
How Rootkit
Works? 
Rootkit: Fu 
Detecting
Rootkits 
•  Steps for Detecting Rootkits 
How to Defend
against Rootkits? 
Anti-Rootkit:
RootkitRevealer and McAfee Rootkit Detective 
No comments:
Post a Comment