Ethical Hacking Syllabus
Concept of Ethical Hacking
What Is Hacking
Types of hacker
Why hackers hack?
Preventions from hacker
Steps Performed by hackers
Working of an Ethical hacker
Information Gathering and Scanning
Why Information gathering?
Whois lookup
Reverse IP mapping
Information Gathering Using Search Engine
Email Hacking
How Email Works?
Email service protocols
Email spoofing
PHP Mail sending script
Email Spamming
Phishing
Prevention from phishing
Email Tracing
Keystroke loggers
Securing Your Email account
Windows Hacking and Security
Security Architecture of Windows
Windows user account Architecture
Cracking Windows User Account password
Windows User Account Attack
Counter Measures of Windows Attack
To hide a file behind a image
To run net user in Vista and Windows 7
Brute Force Attack
Rainbow table attack
Counter Measures for Windows Attack
Trojans in Brief
Knowing the Trojan
Different Types of Trojans
Components of Trojans
Mode of Transmission for Trojans
Detection and Removal of Trojans
Countermeasures for Trojan attacks
Mobile Hacking – SMS & Call forging
What Does It Involve
Call Spoofing / Forging
SMS Forging
Bluesnarfing
Attacks on web servers and Security
Introduction to Web Servers
The Basic Process: How Web servers work
Attacks on Web servers
Web Ripping
Google Hacking
Protecting Your Files from Google
Directory Traversal Attack
Database Servers
Login Process on the websites
SQL injection
PHP Injection: Placing PHP backdoors
Directory Access controls
How Attackers Hide Them While Attacking
Types of Proxy Servers
Hacking Wordpress, Drupal & Joomla
Wireless hacking
Wireless Standards
Services provided by Wireless Networks
MAC address filtering
WEP key encryption
Wireless attacks
MAC spoofing
WEP cracking
Bug Bounty (Earning from Hacking)
How to earn from Hacking?
What is Bug Bounty.
Bug Bounty Platforms
How much can we earn from Bug Bounty.
How to participate on Bug Bounty Programs
Working with Burp Suite
Web Application Vulnerabilities
Injections
Broken Authentication and Session management
Cross Site Scripting
Type of Cross Site Scripting
Insecure Direct Object Reference
Security Misconfiguration
Sensitive Data Exposure
Missing Function Level Access Control
Using Components with Knows Vulnerabilities
Invalidated Redirects and Forwards