0x1 Read first before proceeding
Legal Stuff
Important Notes
Hackers & Hacking Methodologies
Types of Hackers
Communities of Hackers
Malicious Hacker Strategies
Steps to Conduct Ethical Hacking
Anonymous Identity
Exerciser
0x2 Information Gathering & Scanning Techniques
Information Gathering of Websites & Networks
Scanning & Structuring of Websites
Reverse IP
Finding Panel of websites
Exerciser
0x3 Controlling of Hoax
How to Control Victim’s Computer Using Trojans
Binding Trojans With Another File
Removal of Trojans From Your Computer
Analysis of Trojans/Virus
Detecting Virus & Removing Virus (manually)
Exerciser
0x4 Input Validation Attack
Web Application Overview
Web Application Attacks
OWASP Top 10 Vulnerabilities
Vulnerability Scanning
0x5 SQL Injection Attacks
Enumeration Database Name
Enumeration Table Name Of a Database
Enumeration Column Names Of a Table
Retrieve Any Data
Update/Insert Data Into Database
Upload Shell on Server.
Putting Trojans on Websites
SQL Injection Automated Tools
Preventing/Countermeasure To SQL Injection Attacks
Exerciser
0x6 XSS Attacks
Finding & Fixing XSS in websites
Session hijacking attacks
Preventing/Countermeasure To Xss Injection Attacks
Exerciser
0x7 Local File Inclusion Attacks
Detecting Methodology Of LFI
Eval Commands
Preventing LFI From Attack
Exerciser
0x8 Remote File Inclusion Attacks
Detecting Methodology Of LFI
Accessing Local Server
Preventing RFI From Attack
Exerciser
0x9 Mobile, VoIP Hacking & Security
SMS & SMSC Introduction
SMS Bomb
VoIP Introduction
Forging Call using VoIP
Exerciser
0x10 System & Network Hacking
Hacking Administrators password
Enumeration of Networks
Use of Sniffers to Sniff Network Data.
Exerciser
0x11 IDS (Intrusion Detection System)/ IPS (Intrusion Prevention System)
Snort
Honey Pot
Exerciser
0x12 Google Hacking
Using Google as Hacking Tool
Advanced Operation of Google
Finding Vulnerable Websites Using Google
Finding Target Networks Using Google
Exerciser
0x13 Bing Hacking
Bing Dorks
Advanced Operators of Bing
Finding Vulnerable Websites Using Bing
Finding Target Networks Using Bing
Exerciser
0x14 Cpanel Security Functions
Introduction to Cpanel
Cron Job
Database Dumping
Cpanel Password cracking
Cpanel Exploit
File Manager
Domain Parking Overview
Mails
Fantastico Cpanel
IP/Deny Manager
Exerciser
0x15 Email Hacking
Fake Pages
Use of KeyLogger
Social Engineering Techniques
Exerciser
0x16 Ports Scanning
N map
Angry IP Scanner
Exerciser
0x17 DDos Attack
0x18 Cyber Crime Investigations
Introduction to cyber crime investigation
Handing real world cyber crimes
Investigation E-mail & identifying terrorists
Introduction to Different logging systems
Phishing cases cyber pornography crime
Credit Cards Fraud cases espionage case
Data theft case
Exerciser
0x19 Cyber Forensics & Cyber Law
Understanding cyber forensics
Hands on cyber Forensics on hard disks
Preparing Forensics reports
Cyber law & IT Act 2000 Amendment 2008
Sample Documentation
Exerciser
0x20 VAPT
Introduction to Netspaker
Introduction to Jsky
Introduction to App Scan
Introduction to Acunetix
Legal Stuff
Important Notes
Hackers & Hacking Methodologies
Types of Hackers
Communities of Hackers
Malicious Hacker Strategies
Steps to Conduct Ethical Hacking
Anonymous Identity
Exerciser
0x2 Information Gathering & Scanning Techniques
Information Gathering of Websites & Networks
Scanning & Structuring of Websites
Reverse IP
Finding Panel of websites
Exerciser
0x3 Controlling of Hoax
How to Control Victim’s Computer Using Trojans
Binding Trojans With Another File
Removal of Trojans From Your Computer
Analysis of Trojans/Virus
Detecting Virus & Removing Virus (manually)
Exerciser
0x4 Input Validation Attack
Web Application Overview
Web Application Attacks
OWASP Top 10 Vulnerabilities
Vulnerability Scanning
0x5 SQL Injection Attacks
Enumeration Database Name
Enumeration Table Name Of a Database
Enumeration Column Names Of a Table
Retrieve Any Data
Update/Insert Data Into Database
Upload Shell on Server.
Putting Trojans on Websites
SQL Injection Automated Tools
Preventing/Countermeasure To SQL Injection Attacks
Exerciser
0x6 XSS Attacks
Finding & Fixing XSS in websites
Session hijacking attacks
Preventing/Countermeasure To Xss Injection Attacks
Exerciser
0x7 Local File Inclusion Attacks
Detecting Methodology Of LFI
Eval Commands
Preventing LFI From Attack
Exerciser
0x8 Remote File Inclusion Attacks
Detecting Methodology Of LFI
Accessing Local Server
Preventing RFI From Attack
Exerciser
0x9 Mobile, VoIP Hacking & Security
SMS & SMSC Introduction
SMS Bomb
VoIP Introduction
Forging Call using VoIP
Exerciser
0x10 System & Network Hacking
Hacking Administrators password
Enumeration of Networks
Use of Sniffers to Sniff Network Data.
Exerciser
0x11 IDS (Intrusion Detection System)/ IPS (Intrusion Prevention System)
Snort
Honey Pot
Exerciser
0x12 Google Hacking
Using Google as Hacking Tool
Advanced Operation of Google
Finding Vulnerable Websites Using Google
Finding Target Networks Using Google
Exerciser
0x13 Bing Hacking
Bing Dorks
Advanced Operators of Bing
Finding Vulnerable Websites Using Bing
Finding Target Networks Using Bing
Exerciser
0x14 Cpanel Security Functions
Introduction to Cpanel
Cron Job
Database Dumping
Cpanel Password cracking
Cpanel Exploit
File Manager
Domain Parking Overview
Mails
Fantastico Cpanel
IP/Deny Manager
Exerciser
0x15 Email Hacking
Fake Pages
Use of KeyLogger
Social Engineering Techniques
Exerciser
0x16 Ports Scanning
N map
Angry IP Scanner
Exerciser
0x17 DDos Attack
0x18 Cyber Crime Investigations
Introduction to cyber crime investigation
Handing real world cyber crimes
Investigation E-mail & identifying terrorists
Introduction to Different logging systems
Phishing cases cyber pornography crime
Credit Cards Fraud cases espionage case
Data theft case
Exerciser
0x19 Cyber Forensics & Cyber Law
Understanding cyber forensics
Hands on cyber Forensics on hard disks
Preparing Forensics reports
Cyber law & IT Act 2000 Amendment 2008
Sample Documentation
Exerciser
0x20 VAPT
Introduction to Netspaker
Introduction to Jsky
Introduction to App Scan
Introduction to Acunetix