ETHICAL HACKING

 

Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testingintrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems.

An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts.

ETHICAL HACKING – OVERVIEW

  • Types of Hacking
  • Advantages of Hacking
  • Disadvantages of Hacking
  • Purpose of Hacking

ETHICAL HACKING – HACKER TYPES

  • White Hat Hackers
  • Black Hat Hackers
  • Grey Hat Hackers
  • Miscellaneous Hackers
  • Famous Hackers
  • Terminologies
  • Terminologies
  • Tools

ETHICAL HACKING – SKILLS

  • Basic Skills
  • Courses & Certifications

ETHICAL HACKING – PROCESS

  • Ethical Hacking
  • Reconnaissance
  • Reconnaissance

ETHICAL HACKING – FOOTPRINTING

  • Domain Name Information
  • Finding IP Address
  • Finding Hosting Company
  • IP Address Ranges
  • History of the Website

ETHICAL HACKING – FINGERPRINTING

  • Basic Steps
  • Port Scanning
  • Ping Sweep
  • DNS Enumeration

ETHICAL HACKING – SNIFFING

  • Types of Sniffing
  • Hardware Protocol Analyzers
  • Lawful Interception
  • Sniffing Tools

ETHICAL HACKING – ARP POISONING

  • What is ARP Spoofing?
  • What is MITM?
  • ARP Poisoning – Exercise

ETHICAL HACKING – DNS POISONING

  • DNS Poisoning – Exercise
  • Defenses against DNS Poisoning
  • Ethical Hacking
  • Exploitation
  • Enumeration

ETHICAL HACKING – METASPLOIT

  • Exploits of Metasploit
  • Metasploit Payloads

ETHICAL HACKING – EMAIL HIJACKING

  • Email Spoofing
  • Social Engineering
  • Inserting Viruses in a User System
  • TCP/IP Hijacking
  • Trojan Attacks

ETHICAL HACKING – PASSWORD HACKING

  • Dictionary Attack
  • Hybrid Dictionary Attack
  • Brute-Force Attack
  • Rainbow Tables

ETHICAL HACKING – WIRELESS HACKING

  • Kismet
  • NetStumbler
  • Wired Equivalent Privacy
  • Wireless DoS Attacks

ETHICAL HACKING – SOCIAL ENGINEERING

  • Ethical Hacking

ETHICAL HACKING – DDOS ATTACKS

  • What are Botnets?
  • Types of DDoS Attacks
  • Cross-Site Scripting
  • SQL Injection
  • Pen Testing