Document From Ethical Hacking Training Center
Document From Ethical Hacking Training Center
Key Topics:
Key Topics:
• What is Network
• What is Networking
• Types of Networking
• Network Diagram & Structures
• What is IP Address
• Types of IP Address
• Classes of IP Address
• Types of Networking Devices (Routers, Switches, Access Point)
• What is OSI Model & TCP/IP Model
• Basics of Data Communication
• TCP vs UDP
• TCP/IP Three Way Handshake
• TCP Communication Flags
• What is MAC
• Types of MAC
• What is MAC Address
• What are Communication Ports
• Common Protocols (HTTP, HTTPS, FTP, DHCP, DNS, SMTP Etc.)
Key Topics:
Key Topics:
• Introduction of OS
• Types of OS
• Windows Vs Linux
• What is User Account
• Types of User Accounts
• Local Rights & Privileges
• Windows Security Architecture & Models
• Linux Security Architecture
• Logon Process in Windows NT
• Logon Process in Linux
• Windows NT Security Architecture Components (LSA, SAM, SRM)
• Overall Desktop Security
• Windows User Accounts Hacking
• Linux User Account Hacking
• Escalating User Accounts Privileges
• Cracking Passwords
• Types of Password Cracking Attacks
• Introduction of Windows Registry
• Registry Editing (Automatic & Manual)
• Steps to Creating Registry Values
• Group Policy Introduction
• Create Policy
• Windows Vulnerabilities & Threats
• Various Tools for Password Cracking
• Covering Tracks
Key Topics:
• Website Footprinting
o Technology Used in Websites
o Cloning/Mirroring of Entire Website
o Tools for Mirroring/Cloning Websites
o Extract Information i.e., Email or Phone No.
• Email Footprinting
o Email Header Analysis
o Email Tracking / Header Analysis Tools
• WHOIS Footprinting
o WHOIS Lookup online
o WHOIS Lookup Tools (Desktop Applications)
• DNS Footprinting
o Using NSLookup
o DNS Lookup Tools
• Network Footprinting
o Details in SCANNING Module
• Footprinting Tools
o Google
o Maltego
o Shodan
o NMAP
o Other Footprinting & Reconnaissance Tools
Key Topics:
Key Topics:
• NMAP
o What is NMAP
o Scanning Methods & Techniques of NMAP
o NMAP Advance / Script Scanning
• Check for Open Ports
o Types of Ports
o Most Common / Well Known Ports
o Different Methods to Check for Open Ports
▪ Three Way Handshake
▪ Full Open Scan (TCP Connect Scan)
▪ Stealth Scan (Half Open Scan)
▪ XMAS Scan
▪ FIN Scan
▪ NULL Scan
▪ UDP Scan
▪ Windows Scan Etc.
▪ Scan with Custom Flags
Module 08 – Enumeration
Enumeration is a Follow-On Steps once Scanning is complete & is used to identify Computer Names, Usernames
& Shares. This Module Covers various enumeration techniques, such as FTP (File Transfer Protocol), Network
File Sharing (NFS) Etc exploits, and associated countermeasures. Scanning & Enumerations are always discussed
together because many hacking tools perform both.
Key Topics:
• Enumeration Concepts
o Introduction of Enumeration
o Tools for Enumeration
• UNIX/Linux Enumeration
• Web Enumeration
• Subdomain Enumeration
• Enumeration Tools
Key Topics:
Key Topics:
• Introduction of Vulnerability
• What is Threat, Vulnerability, Payloads & Exploit
• Vulnerability Analysis Vs Vulnerability Assessment
• Vulnerability Assessment Concepts
• Vulnerability Assessment Solutions
• Vulnerability Scoring Systems
• Vulnerability Assessment Reports
• Nmap Vulnerability Scanning Techniques
• WPScan for WordPress Vulnerability
• Vulnerability Assessment Tools
o NMAP
o WPSCAN
o Acunetix Vulnerability Scanner (Windows)
o Uniscan (Linux)
o Nikto (Linux)
o Burp Suite Etc.
Key Topics:
Key Topics:
• Sniffing Concepts
o What is Sniffing
o How Sniffer Works
o Types of Sniffing
o Protocols Responsible for Sniffing
• MAC Attacks
o What is MAC Flooding
o MAC Flooding Tools
• DHCP Attacks
o What is DHCP
o How DHCP Works
• ARP Poisoning
o What is ARP
o Works of Address Resolution Protocol (ARP)
o What is ARP Poisoning
o APR (Address Resolution Protocol Poisoning Route) Attack
o Tools ARP Poisoning Attack
• Spoofing Attacks
o All Spoofing Methods covers in Module Web Security
• DNS Poisoning
o DNS Poisoning Techniques
o DNS Cache Poisoning
• Sniffing Tools
• Countermeasures
• Sniffing Detection Techniques
Key Topics:
Key Topics:
Learn different types of Malwares such as Trojans, viruses, and worms as well as system auditing for malware
attacks, malware analysis, and countermeasures.
Key Topics:
• Introduction to Malwares
• Types of Malwares
o Virus
o Worms
o Trojans (RAT – Remote Administration Tools)
o Spyware (Keyloggers)
o Botnet
o Logic Bombs
o Spyware
• What is VIRUS
o Types of Viruses
o Batch Virus
o Create Simple Virus
• What is Worm
• Virus Vs Worms
• Trojan Concepts
o What is Trojan
o Type of Trojan
o Create & Deploy Trojans on Windows & Linux Environment
o Detection & Protection from Trojans
• Spyware (Keylogger)
o Types of Spyware
o Practical Demonstration of Spyware
o Prevention from Spywares
• Installing Bots on Target Machines
• Working of Bots
• Malware Detection & Prevention
• Anti-malware Strategies
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools
used to audit a target and devise DoS and DDoS countermeasures and protections.
Key Topics:
• Botnet Distribution
o What is Botnet
o Botnet Planting Strategies
o How to detect Botnet
• DOS/D-DOS Tools
• Identification & Prevention Techniques & Tools
Learn about Protection of Data with the concept of Backup (Online/Offline), Restore, Erasing Techniques &
Cryptography Techniques that include Encryption algorithms, cryptography tools, Public Key Infrastructure
(PKI), Disk & Drive Encryption, Encryption/Decryption, Steganography, Hashing attacks, and Data Recovery
Tools.
Key Topics:
• Data Recovery
o What is Data Recovery
o Deleted Data Recovery
o Formatted Data Recovery
o Partition Recovery
• Data Erasing
• Cryptography Concepts
o Types of Cryptography
o Types of Encryptions
o Encryption Algorithms
▪ DES
▪ Triple DES (3DES)
▪ AES
▪ RSA
o Cryptography Tools
• Hashing
o Hashing Concepts
o Encryption Vs Hashing
o Types of Hashing
▪ MD5
▪ SHA
• Steganography
o Overview
o Steganography techniques
o Types of steganography
o Steganalysis
o Steganography detection tool
Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend
against SQL injection attempts. Perform an SQL Injection attack against MySQL to extract database & Detect
SQL Injection vulnerabilities using various SQL Injection detection tools.
Key Topics:
• Countermeasures
o Input Validation
o Escaping Inputs
o Sanitizing Inputs
Learn about web application attacks, including a comprehensive web application hacking methodology used to
audit vulnerabilities in web applications and countermeasures.
Key Topics:
Understand Different Types of Wireless Technologies, Including Encryption, Threats, Hacking Methodologies,
Hacking Tools, Wi-Fi Security Tools, And Countermeasures.
Key Topics:
Get introduced to firewall, intrusion detection system (IDS), intrusion prevention system (IPS) and honeypot
evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures. Bypass
Windows Firewall, firewall rules using tunnelling & antivirus.
Key Topics:
• Firewall
o Introduction of Firewall
o Working of Firewall
o Type of Firewall
▪ Host Based Firewall
▪ Network Based Firewall
o Firewall Evasion Techniques & Tools
• Honeypots
o Introduction of Honeypots
o Types of Honeypots
▪ Production Honeypot
▪ Research Honeypot
o Setup Honeypots
Learn how VPN works and discover protocols like PPTP, L2TP, IPsec and SSL. Build your own VPN network
by yourself.
Key Topics:
• Introduction to VPN
• Application & Requirements of VPN
• Protocols of VPN
• Tunnelling Mechanism in VPN
• Models of VPN
• OpenVPN
• Setup your own VPN Server
• VPN Security Issues
• VPN Threats
Module 23 – Router Configuration & Security
Understand the basics of Routers & their types with configuration of router by using static & dynamic routing
protocol. How to secure routers & security with routing.
Key Topics:
• Router Concepts
o Introduction of Router
o Working of Router
o Types of Routers
• Routing Protocols
o Default Routing Protocol
o Static Routing Protocol
o Dynamic Routing Protocol
• Simulators of Router
o Configuration of Router
o Create a Network Structure with Router
• Router Security
Understand the basics of Routers & their types with configuration of router by using static & dynamic routing
protocol. How to secure routers & security with routing.
Key Topics:
• Cyber Crime
o What is Cyber Crime
o Classification of Cyber Crime
o Prevention of Cyber Crime
• Cyber Forensics
o Cyber Forensics: Detailed View
o What is Digital Evidence
o Challenges of Forensic Science
o Preservation of Digital Evidence
o Forensic Tools & Software
o Basic Approach
Learn how Email works, components of email, email services & protocols. Understand the Email Clients & Their
Security. Email Spoofing, Email Tracking & Header Analysis Tools.
Key Topics:
• Introduction
• History of E-Mail
• Email Addresses
• How E-Mail Works?
• Various mail servers
• E-Mail Protocols
• Email Clients
• Setup & Secure Email Clients
• Analysis of Email Headers
• Email Tracking
• What is Spamming
• Ways to prevent spam
• Security threats to your email communications (recent updates)
• Setup Email Filter
• Security Policies
Learn Mobile platform attack vector, android hacking, mobile device management, mobile security guidelines,
and security tools.
Key Topics:
Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
Key Topics:
• IoT Concepts
• IoT Attacks
o Hacking CCTV Cameras
o IoT Hacking with Shodan
Learn different cloud computing concepts, such as container technologies and server less computing, various
cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.
Key Topics:
• Concepts of Cloud Computing
• Types of Cloud Computing Services
o Infrastructure as a Service (IaaS)
o Platform as a Service (PaaS)
o Software as a Service (SaaS)
Learn & Understand about Cyber Law that is also called IT Law is the law regarding Information-technology
including computers and the internet.
Key Topics: