Advance Ethical Hacking & Cyber Security in Ahmedabad
Be the Ultimate Master of Ethical Hacking & Cyber Security.
Advance Ethical Hacking & Cyber Security
1) what is cyber security?
introduction to the concept of cybersecurity and its importance in protecting digital assets.
2) Setting up Attacker’s Environment.
Guide to setting up a virtual environment for practicing ethical hacking techniques.
3) Familiarizing with Linux
3.1) Navigating Through Terminal
3.2) Editing Files & Installing Packages
3.3) File Permissions
3.4) Users and Groups
4) Understanding Networking
4.1) IP Address
4.2) TCP Vs UDP
4.3) Important Ports and Services
5) Touchup on Languages
5.1) Touch up of HTML
5.2) Touch up of PHP
5.3) Touch up of JavaScript
5.4) Touch up of SQL
6) Learning Tools
6.1) Create Custom Wordlist (Method 1)
6.2) Create Custom Wordlist (Method 2)
6.3) Wireshark
7) OWASP
7.1) OWASP Top 10
7.2) Setting up Vulnerable Environment
7.3) Setting up Burp Suite
7.4) Using Burp Suite
7.5) HTTP Status Codes
8) Methodology & Web Attacks - 1
8.1) Phases of Hacking
8.2) Google Dorks
8.3) HTML Injection
8.4) Broken Authentication & Session Management
9) Web Attacks - 2
9.1) Command Injection
9.2) Cross Site Scripting (XSS)
9.3) Cross Site Request Forgery (CSRF)
10) MiTM attacks & Malwares
10.1) Malwares
10.2) Bind Shell Vs Reverse Shell
10.3) ARP Poisoning – 1
10.4) ARP Poisoning – 2
11) Wireless Attacks
11.1) Hacking WiFi (Method – 1)
11.2) Hacking WiFi (Method – 2) – The Evil Twin
12) Essentials
12.1) Setting up the Target Environment
12.2) Types of Nmap Scans
12.3) Hands on Zenmap
12.4) Learning Nikto
13) Attacking/Enumerating Services + Metasploit
13.1) Exploiting FTP : Techniques for exploiting vulnerabilities in FTP services.
13.2) Exploiting SSH : Methods for exploiting SSH services.
13.3) Exploiting SMB : Techniques for attacking SMB services.
14) Advance Exploitation In Two Phase
14.1) Buffer Overflow : Introduction to buffer overflow attacks and their exploitation process.
15) Testing your Skills
Hands-on challenges to test your hacking skills and knowledge.
16) Report Writing
16.1) How to write a VAPT Report : Guide to writing vulnerability assessment and penetration testing (VAPT) reports.
17) Interview Preparation
Preparing for interviews in the cybersecurity and ethical hacking domain.
18) UNION Based SQL injection
Advanced SQL injection using UNION queries for data extraction.
19. Automating SQL injection
Using tools and techniques to automate SQL injection attacks.
20. Cracking Password Hashes for Files
Techniques for cracking password-protected files.
21. Hacking Android Device
Introduction to Android device hacking and exploitation methods.
22. AMSI - Anti Malware Scan Interface
Overview of AMSI and how it detects malware.
23. AMSI Bypass
Techniques for bypassing AMSI detection.
24. Creating your first Rubber Ducky
Introduction to the Rubber Ducky and how to create your first payload.
25. Advanced Rubber Ducky (FUD)
Creating fully undetectable (FUD) Rubber Ducky payloads for advanced attacks.