Ethical Hacking

1. Setting up the Hacking Lab

  • Introduction to Virtualization
  • Installing VMware
  • Installing Kali Linux 2.0
  • Getting Windows 10 Evaluation & Installation
  • VMware Features : Adding Resources to Virtual Machines
  • VMware Features : Snapshots

2. Vulnerability, Exploit , Payload

  • Introduction to Vulnerability, Exploit and Payload
  • VEP Practical – Hacking inside a test farm
  • Understanding Denial of Service Attacks
  • Performing Denial of Service Attacks – Practical

3. Our Favorite Networking

  • Introduction to Protocols
  • Introduction to Domain Name Systems
  • DNS – Packet Level View
  • Transmission Control Protocol ( TCP )
  • Understanding Port Scanners
  • Understanding versioned scans

4. Cryptography & Network Security

  • Introduction to Cryptography
  • Plain Text vs Encrypted Text based algorithms
  • Disk Level Encryption Schemas
  • Pretty Good Privacy ( PGP )
  • Asymmetric Key Encryption
  • Hashing
  • Exercise – Hashing
  • SSH Key Based Authentication
  • Understanding working of HTTPS

5. Intermidary Nodes for Hacking

  • The Proxy Servers
  • Virtual Private Networks

6. The Metasploit Module

  • The Big Metasploitable 2

7. Hail The Dangerous Viruses

  • Remote Access Trojans
  • Most Dangerous Ransomwares

8. Windows Hacking

  • Bypassing Windows Based Authentication Schemas
  • Alternate Data Streams
  • Group Policy Editor
  • Creating Backdoors
  • Changing Icons
  • The Harvester
  • Multi-Factor Authentication

9. Password Attacks

  • The Stumbling Passwords
  • Getting started with Password Cracking
  • Password Attacks Practicals
  • Customizing our Wordlist

10. Firewall

  • Getting started with Firewall’s
  • Firewall Kung-FU
  • Rate Limiting with Firewalls
Menu