EthicalHacking Offensive

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Workshop on

Ethical Hacking

Day 1 Day 2
1. Introduction to Networking 1. DDoS
2. Types of IP address 2. VyoS
3. Introduction to Ethical Hacking 3. Web Hacking with Burp
4. Scanning a Network and Finding Out Vulnerabilities 4. Browser in The Browser Attack
5. Hacking a Windows System 5. IP Spoo ng
6. Hacking a Linux system 6. Wi Hacking
7. Social Media Hacking 7. Bluetooth Hacking
8. Google Hacking Database 8. Hacking Radio Signals
9. Database Hacking through Sql Injection 9. Listen to FM from Computer
10. Creating a Payload 10. Keylogger
11. IoT Search Engine 11. Wi De-Auth
12. Privilege Escalations 12. Bypassing a RFID Access control
13. Bypassing an Antivirus 13. Ransomware Attack simulation
14. Web App Attacks 14. How to stay safe in the present era
15. Reverse Tunneling 15. Cyber Risk Quanti cation
16. Hacking a Intranet
fi
fi

fi

fi

You might also like