Introduction
Hacking History
What is hacking, hackers, ethical hacking, ethical hackers
Classes Of Hackers
Hacking Terms And Terminologies
Cyberlaws
Security Triangle
Steps In Ethical Hacking

> Windows Hacking

Windows Security Architecture.
Sam File And Services Files Location Under Windows
Vmware Virtualization Configuration
Security Account Manager
Breaking Windows Administrator Account using Konboot
Breaking Windows Administrator Account Using Ophcrack
Breaking Windows Administrator Using NT-Offline Cracker
Creating Backdoor In Windows
Deploying Windows Security
Making Your Own Computer As Hosting Server
Blocking Website Locally On Your System
Customizing Window Using Registry Editing
Syskey Protection
Breaking Syskey Protection

> Footprinting And Google Hacking

What is Footprinting
Tools of Extract Data
People Search Online Services
Footprinting through Search engines
People Search on Social Networking Sites
Gather Information from Financial Services
Monitoring Target Using Alert
People Search through Job sites
Competitive Intelligence
Whois
Find Website details using Command prompt
Extracting DNS Information
Trace Route
Website Mirroring Tools
Extract Website Information
Email Tracking Tool
Maltego Tool Usage
Accessing Online Cameras
Accessing Secret Information Using Google

> Networking And Scanning

Network
Topologies Types Of Network
Networking Devices
Ipv4 And Ipv6 Versions
Sharing data in lan
Cmd Commands tracert, ping, ipconfig, arp-a, nslookup etc
Banner grabbing
Using Zenmap to find open ports, services, Os Detection
Angry Ip Scanner

> Viruses, Worms And Trojans

Virus, worm, Trojan, timebomb, logic bomb difference
Some viruses getting wild earlier
Creating Your own undetectable batch viruses
Coverting batch file to exe file
Creating viruses using virus construction kit.
Creating Worms
Creating Your Own Trojan To Control victim pc’s
Keyloggers
Creating Your own keylogger to monitor victim’s keystrokes
Configuring Remote Keylogger
Making Your malware undetectable(A/V Evasion)

> Sql Injection Attacks

Introduction to SQL
Sql Injection
Checking SQL Injection Vulnerability
Basic Strategy Of SQL Injection
Getting Login Credentials using Sql Injection

> Penetration Testing Using Backtrack

Introduction To Backtrack OS

SQL Queries
Mysql Injection Manually Without Using Any Tool
Sqlinjection Using Tools
Admin Authentication Bypass Vulnerability
Sql CheatSheet
Sql Injection Countermeaseures

> Cross Site Scripting

What is XSS Attack
Loopholes Causing Xss Attacks
Locating Xss Vulnerbility In Web Application
Preperation For Xss Attack

Introduction To Javascript
Javascript for XSS Attack
Attacking On Live Website Using XSS
Xss Damages
Xss Countermeasures

> Session Hijacking And Cookie Grabbing

Understanding Sessions
What Are Cookies
Reading And Writing Cookies
Stealing Cookies using XSS vulnerability
Sniffers
Spoofing

Creating Virtual Lab For Pentesting Using

Vmware Workstation
Backtrack Commands

Introduction To Metasploit
Metasploit Commands Usage
Introduction To Armitage
Armitage Usage
Information Gathering Using Backtrack Tools
Scanning Using Backtrack

>Live Practicals To Be Covered

1.) Breaking Win Xp,Vista,7,8,8.1 User Account Password Using:
>KonBoot
>OfflineCracker
>Ophcrack
2.) Creating Backdoor In Windows Using Linux
To Gain Access To Windows.
3.) Virtualization To Host Multiple Os’s In Your System
4.) Securing Windows Account Against Physical Attacks
5.) Creating Phishing Page For Any Site
6.) Testing Your Phished Page Locally On Your System.
7.) Desktop Phishing
>Basic
>Advanced
8.) Uploading Phishing Page To Webserver
9.) Phishing Page Advance.
10.) TabNabbing
11.) Creating Phishing Page To Steal Credentials In LAN Using S.E.T

12.) Phishing Countermeasures
>Manual Way
>Using Netcraft Toolbar And Phishtank To Report Phished Pages
13.) Sending Fake Mails
14.)Tracing Fake Mails Location
15.)Tracking Email Actions On Recievers End
16.) Owasp Top 10 Vulnerabilities
17.)Hacking Website Database Using SQL
>Injection
>Manually
>WAF Bypass
>Using Havij,Sqlmap
18.) Sql Injection CounterMeasures
19.) XSS
>Defacing Site
>Stealing Cookies
20.) Xss Countermeasures
21.) Remote Code Execution And Its Countermeasures
22.) Advanced Google Search Operators To Find:
>Live Webcams
>Mine Confidential Documents
>Credentials etc
23.) Protecting Your Confidential Site Content From Google Crawlers.
24.) Web Application Architecture
25.) Making Your Computer As WebServer
26.) Making Your Dynamic Ip Static
27.) Making Your Pc As Phishing Remote Host
28.) Creating Viruses:
>UsingScripting Language And Compiling It To Exe Format
>Using Virus Constructors
>Sending It To Startup
29.) Viruses Countermeasures
30.) Creating Worms
31.) Worms Countermeasures
32.) Creating Trojan/Rat/Backdoor To Remotely Access Any Pc

33.) Trojan Countermeasures
>Manually
>By Using Tools
34.) Creating Stealers To Steal User Ids And Password[Facebook,Gmail etc]
>Local Stealer
>Remote Stealer[FTP,Email]
35.) Using Spreaders To Spread Your Malware
36.) Using Keylogger To Steal Users Details Like Userid And Pass,Webcam Snap.
>Local
>Remote
37.) Keyloggers Countermeasures
38.) Creating Your Own Botnet
39.) Botnet CounterMeasures
40.) Making Your Malware Undetectable From Av’s
41.) Analyzing Malwares Using B.S.A
42.) Data Recovery
43.) Cryptography And Steganography
44.) Information Gathering/

FootPrinting/Reconnaisance
>Active
>Passive
>Ip Reverse Lookup
>Traceroute
>Mirroring Entire Website Content
>Foca
>The Harvester
45.) Networking Fundamentals
46.) Using Nmap To Enumerate System Details
47.) Detecting Live Systems In A Network
48.) Sniffing In Lan:
>Using Cain And Abel To Perform Sniffing
And Dns Spoofing
>Using Ettercap To Perform Sniffing And Dns Spoofing
49.) Stealing https site Passwords Of Users In LAN
50.) Autopawning Users System In Lan Using Metasploit Framework.
51.) Using Beef To Compromise User Computer In LAN.
52.Sniffing Countermeasures
53.Linux Fundamentals
54.Kali Linux Introduction And Some Important Tools
55.) Metasploit Framework
>Compromising Win Xp Machine In LAN
>Compromising Win7,8,8.1 Machine

56.) Social Engineering Toolkit
57.) Website Vulnerability Assessment Using Kali Linux
58.) Information Gathering Using Maltego In Kali Linux
59.) Cracking Wifi Passwords Manually And By Using Tools
>WEP
>WPA/WPA2
60.) Kicking Anyone From Wireless Network And Its Countermeasures.
61.) Penetration Testing Methodologies
62.) Carrer Prospective Of Information Security.
63). Project Work & Deployment
Hacker Computer School

Address Ward No-22 , Near Ply Factory , Balraj Nagar Street No-8
Kaithal - 136027, Con. No. +919017313635
E-Mail Hackercomputerschool@Gmail.com
Home
WORLD'S # N0-1 OFFSHORE TRAINING
facebook.com/hackercomputerschool
9017313635
You Tube
PROFESSIONAL ETHICAL HACKER CERTIFICATION
3 Certification Program In One Training
Advance Ethical Hacker Certification
Penetration Testing
Cyber Security & Forensic
Free Web Hosting