+91- 84000 84111
Summer Training Program 2017

Ethical Hacking Level -3

Recomended for: Students , Working Professionals Entrepreneurs , Job Seekars

Course Objectives
    The Course will allow learners
  • Improve your CV & Apply for more right job interviews.
  • Learn what others will learn later.
  • High career growth with advanced skills.
  • Work part time as a freelancer along with your studies
  • Have increased self esteem and respect from fellows.
  • Give companies extra reasons to hire you.
  • Secure your personal data.

Syllabus Overview
    Introduction
  • Hacking History
  • What is hacking, hackers, ethical hacking, ethical hackers
  • Classes Of Hackers
  • Hacking Terms And Terminologies
  • Cyberlaws
  • Security Triangle
  • Steps In Ethical Hacking

  • Windows Hacking
  • Windows Security Architecture.
  • Sam File And Services Files Location Under Windows
  • Vmware Virtualization Configuration
  • Security Account Manager
  • Breaking Windows Administrator Account using Konboot
  • Breaking Windows Administrator Account Using Ophcrack
  • Breaking Windows Administrator Using NT-Offline Cracker
  • Creating Backdoor In Windows
  • Deploying Windows Security
  • Making Your Own Computer As Hosting Server
  • Blocking Website Locally On Your System
  • Customizing Window Using Registry Editing
  • Syskey Protection
  • Breaking Syskey Protection

  • Footprinting And Google Hacking
  • What is Footprinting
  • Tools of Extract Data
  • People Search Online Services
  • Footprinting through Search engines
  • People Search on Social Networking Sites
  • Gather Information from Financial Services
  • Monitoring Target Using Alert
  • People Search through Job sites
  • Competitive Intelligence
  • Whois
  • Find Website details using Command prompt
  • Extracting DNS Information
  • Trace Route
  • Website Mirroring Tools
  • Extract Website Information
  • Email Tracking Tool
  • Maltego Tool Usage
  • Accessing Online Cameras
  • Accessing Secret Information Using Google

  • Networking And Scanning
  • Network
  • Topologies Types Of Network
  • Networking Devices
  • Ipv4 And Ipv6 Versions
  • Sharing data in lan
  • Cmd Commands tracert, ping, ipconfig, arp-a, nslookup etc
  • Banner grabbing
  • Using Zenmap to find open ports, services, Os Detection
  • Angry Ip Scanner

  • Viruses, Worms And Trojans
  • Virus, worm, Trojan, timebomb, logic bomb difference
  • Some viruses getting wild earlier
  • Creating Your own undetectable batch viruses
  • Coverting batch file to exe file
  • Creating viruses using virus construction kit.
  • Creating Worms
  • Creating Your Own Trojan To Control victim pc’s
  • Keyloggers
  • Creating Your own keylogger to monitor victim’s keystrokes
  • Configuring Remote Keylogger
  • Making Your malware undetectable(A/V Evasion)

  • Sql Injection Attacks
  • Introduction to SQL
  • Sql Injection
  • Checking SQL Injection Vulnerability
  • Basic Strategy Of SQL Injection
  • Getting Login Credentials using Sql Injection
  • SQL Queries
  • Mysql Injection Manually Without Using Any Tool
  • Sqlinjection Using Tools
  • Admin Authentication Bypass Vulnerability
  • Sql CheatSheet
  • Sql Injection Countermeaseures

  • Cross Site Scripting
  • What is XSS Attack
  • Loopholes Causing Xss Attacks
  • Locating Xss Vulnerbility In Web Application
  • Preperation For Xss Attack
  • Introduction To Javascript
  • Javascript for XSS Attack
  • Attacking On Live Website Using XSS
  • Xss Damages
  • Xss Countermeasures

  • Session Hijacking And Cookie Grabbing
  • Understanding Sessions
  • What Are Cookies
  • Reading And Writing Cookies
  • Stealing Cookies using XSS vulnerability
  • Sniffers
  • Spoofing

  • Penetration Testing Using Backtrack
  • Introduction To Backtrack OS
  • Creating Virtual Lab For Pentesting Using Vmware Workstation
  • Backtrack Commands
  • Introduction To Metasploit
  • Metasploit Commands Usage
  • Introduction To Armitage
  • Armitage Usage
  • Information Gathering Using Backtrack Tools
  • Scanning Using Backtrack

  • Live Practicals To Be Covered
  • 1. SAM File And Services Location In Windows.
  • 2. VmWare Windows Installation/Configuration.
  • 3. Hacking Windows User Account Using:-
  • > Kon Boot.
  • >Nt Offline Cracker.
  • > Ophcrack.
  • > Sethc Backdoor Creation.
  • 4. Deploying Syskey,Bios,Device Priority Protection.
  • 5. Breaking Syskey Protection Using NTOffline Cracker.
  • 6. Making Your Desktop Computer As A Web Server.
  • 7. Sending Phished Passwords Directly To your mailbox.
  • 8. Blocking Websites Locally On Your Desktop/Pc.
  • 9. Creating Viruses And Its CounterMeasures.
  • 10. Customizing Window using Registery Editor.
  • 11. Using Access Manager Tool.
  • 12. CMD Commands:-
  • >Ip Release/Renew
  • >Ping,Ipconfig,Getmac,Nslookup
  • >Banner Grabbing Using Telnet
  • >Tracert
  • >Nslookup
  • 13. Sending Spoofed Emails.
  • 14. Tracing Mail Origination.
  • 15. Desktop Phishing.
  • 16. Making Your Pc As Phishing Remote Host.
  • 17. Uploading Phished Page To Web Server.
  • 18. Whois And Information Gathering
  • >Who.is
  • >Angry Ip-Scanner
  • >Nmap
  • >Maltego
  • 19. Sending Fake Mail And Tracing it.
  • 20. Usage Of Phish Tank And Netcraft Toolbar
  • 21. Accessing Any Computer Remotely Online Using RAT.
  • 22. MITM Attack.
  • 23. Sniffing Passwords in LAN.
  • 24. Linux Commands Usage.
  • 25. Creating Backdoor Using Metasploit to exploit Win7 Machine.
  • 26. Exploiting Windows XP Machine.
  • 27. DDosing Website
  • 28. Stealing Passwords.
  • 29. Java Drive By.
  • 30. Using Netcat As Backdoor.
  • 31. Making Your Keyloggers/Rat FUD.
  • 32. Using Keylogger To Record Keystrokes Of Victims PC.
  • 33. Creating Your Own Botnet.
  • 34. Hacking Website Database
  • >Admin Authentication Bypass.
  • >My-Sql Injection.
  • > Manual Sqlinjection Using Tools.
  • 35. Exploiting XSS Vulnerability And Cookie Stealing.
  • 36.Cracking Wifi Password
  • 37. Reverse Engineering
  • 38. Using Anonymizer To Block Website
  • 39. Cryptography And Steganography
  • 40. Recovering Files Deleted From Recycle-Bin.
  • 41. Making Dynamic Ip Static.
  • 42. Kicking Anyone from wireless network.
  • 43. Website Vulnerability Scanning.
  • 44. Email Spamming And Bombing.
  • 45. Creating Macro-undetectable virus for windows.
  • 46. Desktop Phishing
  • 47.Sharing Data On LAN Manually

Close
Select Your Training Location

Type your e-mail address and we'll send you new password

Submit