Cpanel Hosting

Course Of Ethical Hacking And Cyber Security.

0x1 Read first before proceeding
  Legal Stuff
  Important Notes
  Hackers & Hacking Methodologies
  Types of Hackers
  Communities of Hackers
  Malicious Hacker Strategies
  Steps to Conduct Ethical Hacking
  Anonymous Identity
  Exerciser

0x2 Information Gathering & Scanning Techniques
  Information Gathering of Websites & Networks
  Scanning & Structuring of Websites
  Reverse IP
  Finding Panel of websites
  Exerciser

0x3 Controlling of Hoax
  How to Control Victim’s Computer Using Trojans
  Binding Trojans With Another File
  Removal of Trojans From Your Computer
  Analysis of Trojans/Virus
  Detecting Virus & Removing Virus (manually)
  Exerciser

0x4 Input Validation Attack
  Web Application Overview
  Web Application Attacks
  OWASP Top 10 Vulnerabilities
  Vulnerability Scanning

0x5 SQL Injection Attacks
  Enumeration Database Name
  Enumeration Table Name Of a Database
  Enumeration Column Names Of a Table
  Retrieve Any Data
  Update/Insert Data Into Database
  Upload Shell on Server.
  Putting Trojans on Websites
  SQL Injection Automated Tools
  Preventing/Countermeasure To SQL Injection Attacks
  Exerciser

0x6 XSS Attacks
  Finding & Fixing XSS in websites
  Session hijacking attacks
  Preventing/Countermeasure To Xss Injection Attacks
  Exerciser

0x7 Local File Inclusion Attacks
  Detecting Methodology Of LFI
  Eval Commands
  Preventing LFI From Attack
  Exerciser

0x8 Remote File Inclusion Attacks
  Detecting Methodology Of LFI
  Accessing Local Server
  Preventing RFI From Attack
  Exerciser

0x9 Mobile, VoIP Hacking & Security
  SMS & SMSC Introduction
  SMS Bomb
  VoIP Introduction
  Forging Call using VoIP
  Exerciser

0x10 System & Network Hacking
  Hacking Administrators password
  Enumeration of Networks
  Use of Sniffers to Sniff Network Data.
  Exerciser

0x11 IDS (Intrusion Detection System)/ IPS (Intrusion Prevention System)
  Snort
  Honey Pot
  Exerciser

0x12 Google Hacking                                                                     
  Using Google as Hacking Tool
  Advanced Operation of Google
  Finding Vulnerable Websites Using Google
  Finding Target Networks Using Google
  Exerciser

0x13 Bing Hacking
  Bing Dorks
  Advanced Operators of Bing
  Finding Vulnerable Websites Using Bing
  Finding Target Networks Using Bing
  Exerciser
 
0x14 Cpanel Security Functions
  Introduction to Cpanel
  Cron Job
  Database Dumping
  Cpanel Password cracking
  Cpanel Exploit             
  File Manager
  Domain Parking Overview
  Mails
  Fantastico Cpanel
  IP/Deny Manager
  Exerciser

0x15      Email Hacking
  Fake Pages
  Use of KeyLogger
  Social Engineering Techniques
  Exerciser
 
0x16      Ports Scanning
  N map
  Angry IP Scanner
  Exerciser

0x17      DDos Attack

0x18 Cyber Crime Investigations
  Introduction to cyber crime investigation
  Handing real world cyber crimes
  Investigation E-mail & identifying terrorists
  Introduction to Different logging systems
  Phishing cases cyber pornography crime
  Credit Cards Fraud cases espionage case
  Data theft case
  Exerciser

0x19      Cyber Forensics & Cyber Law
  Understanding cyber forensics
  Hands on cyber Forensics on hard disks
  Preparing Forensics reports
  Cyber law & IT Act 2000 Amendment 2008
  Sample Documentation
  Exerciser
 
0x20  VAPT
  Introduction to Netspaker
  Introduction to Jsky
  Introduction to App Scan
  Introduction to Acunetix