[ult_tab_element tab_style=”Style_3″ tab_animation=”Slide-Horizontal” tab_title_color=”#333333″ tab_background_color=”#ededed” tab_hover_title_color=”#ededed” tab_hover_background_color=”#333333″ acttab_title=”#ffffff” acttab_background=”#c5202e” tabs_border_radius=”0″ tab_describe_color=”#333333″ enable_bg_color=”#fcfcfc” container_border_style1=”border-style:none;|border-width:1px;border-radius:3px;|border-color:#e2e2e2;” title_font_style=”font-weight:bold;” title_font_size=”desktop:16px;” main_heading_font_family=”font_family:|font_call:”][single_tab icon=”none” title=”Day 1 | Session 1 & 2″ tab_id=”01″]
Introduction Ethical Hacking
- What is Hacking?
- CanhackingbeEthical?
- Terms we usein Hacking
- Hackers &HackingMethodologies
- Types Of Hacker
- Cyber LawinIndia
- NeedofEthical Hacking
- Some Big Cases ofHacking inIndiaandacross the Globe
- HidingYourIdentity While Performing Attack
Information Gathering (Foot Printing & Scanning Methodologies)
- Get Know How Hacker Gather Information aboutVictim on Internet
- Information Gathering of Websites & Networks
- Scanning Ports, Network, Vulnerability & Structure of Website
- Finding Admin Panel of Websites
System and Windows Hacking
- Window Password Cracking
- Convert Guest To Admin
- Bypass Login Password
- View System Account
- Reset Syskey Password
- Security Against Windows Hacking
- What Is Enumeration
- Use of Enumeration
- Enumerates Username And Password of Victim
- Cracking Password Techniques
Data Hiding Techniques (Steganography and Cryptography)
- Hide Data Tips, Folder Security and others Tips Hide Data behind Image, Video, pdf files.
Hacking By Key loggers, Trojans, Backdoors and Viruses.
- What is an Antivirus?
- How antivirus works
- Bypassing various Antivirus
- How we Control friend system remotely
- Live demo of key loggers
- What Is Trojan?
- How it Work
- Trojans Attack cases
- Types of Trojans
- Different Way a Trojan Can get Into A system
- Analysis of Trojans/Virus
- Security Issues Against Trojans Attack
- Removing Trojans
Manually
Automatic
Proxy Server and VPN Technologies- Be Invisible
- What is Proxy?
a. Types of proxy
b. How proxy works
- Gaining access to blocked sites
- Why proxy Open Any website
- Advantage And Disadvantage of proxy
- Online Best Proxy
- What Is VPN?
- Why We Use VPN
- Advantage and Disadvantage of VPN
- Free VPN
- Countermeasures
[/single_tab][single_tab icon=”none” title=”Day 2 | Session 1 & 2″ tab_id=”02″]
Google Hacking (What Big Brother Knows)
- How Google work
- Crawlers and spiders
- Google operators
- Find Full Version Software By Google
- Finding usernames and password by using Google
- How to access CCTV cameras
- How to find Hackable php and asp sites
Hacking Email Accounts & Email Security
- E-mail Sending Process
- Vulnerabilities in Mail Severs
- Email Account Hacking Methods
- Email Spoofing
- Fake Emails
- Phishing ,
- Desktop
- Phishing
- Identity Theft
- Email Security
- Detecting Fake Emails
- Strong Password Setup
- Designing Account Recovery Mechanism
- Secure Logout
- Browser Security Tips
Social Networking Websites (Facebook, Twitter) Hacking and Security Policies
- Cases of Orkut, Face book etc.
- Identity Theft Cases
- Virus on Social Sites
- Identity Hacking of Facebook & Yahoo Etc
- Security Tips against Social Websites
- Privacy Option
- Countermeasures
WebsiteHacking and Security Standards
- Introduction ofWebsite &Database
- Mechanism Behind Website
- Where Website Store theirPasswords
- Differenttypes oftechnologyusedincreating websites
- Differenttechniques ofWebsite Hacking
- HackingBySQL Query
- Database HackingUsing ODBCError
- Retrieve Data FromWebsite
- SQL Injection inMySqlDatabase
- Howto make websites secure
- Attack On Website &WebApplication
- Authentication Bypassing
- Countermeasures
Social Engineering
- Introduction to Social Engineering
- Some Big Cases ofSocial Engineering
- HowHacker HackYouwithin in secondbySocial
Engineering
- Howto deceive people
- How you canbe safe
Case study
THIS WORKSHOP IS ONLY FOR EDUCATIONAL PURPOSE NOT FOR HACKING PURPOSE