Hacking Course Plan 1
Hacking Course Plan 1
Discover the hacker in you as you dive into the exciting realms of ethical hacking and unearth loopholes in mobile networks, social networking and e-mail websites, all this only to be topped by learning how to hack your own mail accounts and mobile networks! The concepts to be covered in the workshop are: Cyber Ethics Hackers & hacking methodologies Types of hackers Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking Hiding your identity while performing attacks Information Gathering and Scanning methodologies Get to know how hacker gather information about victim on internet Information gathering of websites & networks Scanning & Structuring of websites Finding Admin Panel of websites Trojans & Backdoors How to control victims computer using Trojans Binding Trojans with another file Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus Google Hacking Using Google as hacking tool Advanced operators of Google Finding Vulnerable websites using Google Finding Target networks using Google Wireless Hacking & Security Wireless Protocols Wireless Routers-Working Attacks on Wireless Routers Cracking Wireless routers password(WEP) Securing routers from Hackers Countermeasures
Mobile, VoIP Hacking & Security SMS & SMSC Introduction SMS forging & countermeasures Sending & Tracking fake SMSes VoIP Introduction Installing VoIP Server Forging Call using VoIP Web Application Attacks Web Application Overview Web Application Attacks OWASP Top 10 Vulnerabilities Putting Trojans on websites SQL injection attacks Executing Operating System Commands Getting Output of SQL Query Getting Data from the Database Using ODBC Error Message How to Mine all Column Names of a Table How to Retrieve any Data How to Update/Insert Data into Database SQL Injection in Oracle SQL Injection in MySql Database Attacking Against SQL Servers SQL Server Resolution Service (SSRS) SQL Injection Automated Tools Blind SQL Injection Preventing SQL Injection Attacks XSS attacks Finding & Fixing XSS in websites Local File inclusion attacks Remote file inclusion attacks Buffer Overflow attacks Session Hijacking attacks 20 Hands on Demonstrations on real websites
System and Network Hacking Hacking Administrators password Enumeration of networks Use of Sniffers to sniff network data. Email Hacking Making fake pages How to use keyloggers to hack mail ids Social Engineering Techniques Introduction to Cyber Crime Investigation Types of Cyber Crimes Report Cyber Crimes Investigation Methodologies Different Logging Systems Investigating Emails ( Email Tracing) Ahmedabad Bomb Blasts Terror Mail case study Investigating Phishing Cases Investigating Data Theft Cases Investigating Orkut Profile Impersonation Cases Cyber Law & IT Act, 2000 Difficulty Handling Session and Exam Total workshop duration: 16 hours The following course material will be given FREE to all registered participants of this workshop: Comprehensive course material Ethical hacking toolkit containing: Hacking tools Videos Ebooks Presentations