1. Setting up the Hacking Lab
- Introduction to Virtualization
- Installing VMware
- Installing Kali Linux 2.0
- Getting Windows 10 Evaluation & Installation
- VMware Features : Adding Resources to Virtual Machines
- VMware Features : Snapshots
2. Vulnerability, Exploit , Payload
- Introduction to Vulnerability, Exploit and Payload
- VEP Practical – Hacking inside a test farm
- Understanding Denial of Service Attacks
- Performing Denial of Service Attacks – Practical
3. Our Favorite Networking
- Introduction to Protocols
- Introduction to Domain Name Systems
- DNS – Packet Level View
- Transmission Control Protocol ( TCP )
- Understanding Port Scanners
- Understanding versioned scans
4. Cryptography & Network Security
- Introduction to Cryptography
- Plain Text vs Encrypted Text based algorithms
- Disk Level Encryption Schemas
- Pretty Good Privacy ( PGP )
- Asymmetric Key Encryption
- Hashing
- Exercise – Hashing
- SSH Key Based Authentication
- Understanding working of HTTPS
5. Intermidary Nodes for Hacking
- The Proxy Servers
- Virtual Private Networks
6. The Metasploit Module
7. Hail The Dangerous Viruses
- Remote Access Trojans
- Most Dangerous Ransomwares
8. Windows Hacking
- Bypassing Windows Based Authentication Schemas
- Alternate Data Streams
- Group Policy Editor
- Creating Backdoors
- Changing Icons
- The Harvester
- Multi-Factor Authentication
9. Password Attacks
- The Stumbling Passwords
- Getting started with Password Cracking
- Password Attacks Practicals
- Customizing our Wordlist
10. Firewall
- Getting started with Firewall’s
- Firewall Kung-FU
- Rate Limiting with Firewalls