Home
1.) Breaking Win Xp,Vista,7,8,8.1 User Account Password Using:
>KonBoot
>OfflineCracker
>Ophcrack
2.) Creating Backdoor In Windows Using Linux
To Gain Access To Windows.
3.) Virtualization To Host Multiple Os’s In Your System
4.) Securing Windows Account Against Physical Attacks
5.) Creating Phishing Page For Any Site
6.) Testing Your Phished Page Locally On Your System.
7.) Desktop Phishing
>Basic
>Advanced
8.) Uploading Phishing Page To Webserver
9.) Phishing Page Advance.
10.) TabNabbing
11.) Creating Phishing Page To Steal Credentials In LAN Using S.E.T
12.) Phishing Countermeasures
>Manual Way
>Using Netcraft Toolbar And Phishtank To Report Phished Pages
13.) Sending Fake Mails
14.)Tracing Fake Mails Location
15.)Tracking Email Actions On Recievers End
16.) Owasp Top 10 Vulnerabilities
17.)Hacking Website Database Using SQL
>Injection
>Manually
>WAF Bypass
>Using Havij,Sqlmap
18.) Sql Injection CounterMeasures
19.) XSS
>Defacing Site
>Stealing Cookies
20.) Xss Countermeasures
21.) Remote Code Execution And Its Countermeasures
22.) Advanced Google Search Operators
To Find:
>Live Webcams
>Mine Confidential Documents
>Credentials etc
23.) Protecting Your Confidential Site Content From Google Crawlers.
24.) Web Application Architecture
25.) Making Your Computer As WebServer
26.) Making Your Dynamic Ip Static
27.) Making Your Pc As Phishing Remote Host
28.) Creating Viruses:
>UsingScripting Language And Compiling It To Exe Format
>Using Virus Constructors
>Sending It To Startup

29.) Viruses Countermeasures
30.) Creating Worms
31.) Worms Countermeasures
32.) Creating Trojan/Rat/Backdoor To Remotely Access Any Pc
33.) Trojan Countermeasures
>Manually
>By Using Tools
34.) Creating Stealers To Steal User Ids And Password[Facebook,Gmail etc]
>Local Stealer
>Remote Stealer[FTP,Email]
35.) Using Spreaders To Spread Your Malware
36.) Using Keylogger To Steal Users Details Like Userid And Pass,Webcam Snap.
>Local
>Remote
37.) Keyloggers Countermeasures
38.) Creating Your Own Botnet
39.) Botnet CounterMeasures
40.) Making Your Malware Undetectable From Av’s
41.) Analyzing Malwares Using B.S.A
42.) Data Recovery
43.) Cryptography And Steganography
44.) Information Gathering/
FootPrinting/Reconnaisance
>Active
>Passive
>Ip Reverse Lookup
>Traceroute
>Mirroring Entire Website Content
>Foca
>The Harvester
45.) Networking Fundamentals
46.) Using Nmap To Enumerate System Details
47.) Detecting Live Systems In A Network
48.) Sniffing In Lan:
>Using Cain And Abel To Perform Sniffing
And Dns Spoofing
>Using Ettercap To Perform Sniffing And Dns Spoofing
49.) Stealing https site Passwords Of Users In LAN
50.) Autopawning Users System In Lan Using Metasploit Framework.
51.) Using Beef To Compromise User Computer In LAN.
52.Sniffing Countermeasures
53.Linux Fundamentals
54.Kali Linux Introduction And Some Important Tools
55.) Metasploit Framework
>Compromising Win Xp Machine In LAN
>Compromising Win7,8,8.1 Machine
56.) Social Engineering Toolkit
57.) Website Vulnerability Assessment Using Kali Linux
58.) Information Gathering Using Maltego In Kali Linux
59.) Cracking Wifi Passwords Manually And By Using Tools
>WEP
>WPA/WPA2
60.) Kicking Anyone From Wireless Network And Its Countermeasures.
61.) Penetration Testing Methodologies
62.) Carrer Prospective Of Information Security.
63). Project Work & Deployment.
Hacker Computer School

Address Ward No-22 , Near Ply Factory , Balraj Nagar Street No-8
Kaithal - 136027, Con. No. +919017313635
E-Mail Hackercomputerschool@Gmail.com
WORLD'S # N0-1 OFFSHORE TRAINING
facebook.com/hackercomputerschool
9017313635
You Tube
BEGINNER ETHICAL HACKER CERTIFICATION
Free Web Hosting