| School name MIS Academy | Available classes Class 11 And 12 | Syllabus State / Cbsc / Icse |
| Locality Bariatu Housing Colony |
ETHICAL HACKING AND PENETRATION TESTING ( KALI LINUX )
Learning outcomes from this course : Install hacking lab & needed software (works on Windows, OS X and Linux). Install windows & vulnerable operating systems as virtual machines for testing. Discover vulnerabilities & exploit them hack into servers. Hack & secure both WiFi & wired networks. Use many hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc. Hack secure systems using client-side and social engineering attacks. Learn Network Penetration Testing. Learn linux commands and how to interact with the terminal.Network basics & how devices interact inside a network. Gather detailed information about clients and networks like their OS, opened ports ...etc. Crack WEP/WPA/WPA2 encryptions using a number of methods. ARP Spoofing/ARP Poisoning. Gain control over computer systems using server side attacks. Create undetectable backdoors. Use social engineering to gain full control over target systems. Discover, exploit & fix local file inclusion vulnerabilities. Discover, fix, and exploit SQL injection vulnerabilities. Bypass login forms and login as admin using SQL injections.
Module 1 : You will learn extensive hands-on with installation and configuration of Virtualization and Kali Linux.
---- Introduction to Ethical Hacking and Pentesting
---- VMWare Installation
---- Installation of Kali Linux
---- Kali Linux Configuration and VMWare Tools
---- Introduction to Kali Linux
---- Concept of Operating Systems
Module 2 : Master your commandline skills to navigate and administer Kali Linux and Windows Command lines
---- Linux terminal basics
---- Kali Linux editors
---- Kali Linux administrative commands
---- Windows and Networking command
Module 3 : Prepare Your Lab
---- Changing IP address and setting up Wireless Adapter
---- Creating Bootable Kali USB
---- Important Networking Terms
---- Important Hacking Terms
---- Few Things to Do After Installing Kali Linux
---- Changing Our Mac Address - MacChanger
Module 4 : Footprinting
---- Google Hacking
---- Working with Nikto
---- DNS Footprinting
---- The Harvester
---- Shodan
---- Zone Transfer With Dig
Module 5 : Scanning
---- Installing Metasploitable
---- Working with Nmap
---- Working with Zenmap
---- TCP scans
---- Nmap Bypassing Defences
---- Nmap Scripts
Module 6 : Phishing Attacks and Mass mailer attack
---- Introduction To Social Engineering and information Gathering
---- Types Of Social Engineering
---- Social Engineering Attacks
---- Spear Phishing Attacks
---- Phishing Attack
---- Phishing Attack Consequences
---- Mass Mailer Attack
Module 7 : Arp Poisioning, DNS & DHCP Spoofing & Port Stealing
---- ARP Poisoning
---- DNS Spoofing vs DNS Poisoning
---- Advanced Concepts on DNS Spoofing
---- DHCP Spoofing
---- Port Stealing
Module 8 : Backdoors and Rootkits
---- Backdoor Overview
---- Backdoor Process and Functions
---- Backdoor Gaining Access
---- Backdoor Maitaining Access
---- Introducing Command Prompt Backdoor
---- Meterpreter Backdoor
---- Gaining Root
Module 9 : Jack the Ripper, Embedded Trojan Horse, Java Applet Attack, MITM Attacks, ICMP, Driftnet and EvilGrade
---- Jack the Ripper
---- Embedded Trojan Horse
---- Introduction To Java Applet Attack Method
---- Man in the Middle : MITM Attack
---- ICMP Redirection
---- Killing a Network
---- Ddosing Unauthorised Network
---- Working with Driftnet
---- Working with EvilGrade
Module 10 : Meterpreter, MsfConsole and MsDConsole
---- Meterpreter Overview
---- Activating Payloads
---- MsFconsole explained
---- MsDconsole Commands
---- Exploits
---- Payloads
---- Generating Payloads
Module 11 : Password Cracking
---- Introduction To Password Cracking
---- Password Cracking Strategy
---- Windows Password Cracking Overview
---- Nuts And Bolts Of Windows Password Cracking Strategy
---- Introduction To Linux Hash Cracking
---- Linux Hash Cracking Strategy
---- Generating Wordlist Overview
---- Generating Wordlist Process and Functions
---- CeWL Cracking
Module 12 : DDos Attacks on Windows & SAM Hacking
---- Introduction To Denial of Service
---- DoS Vs DDoS
---- Levels Of DDos Attacks
---- Preventing DDos Attacks
---- Introduction To DDoSing Windows 7
---- DDosing Windows 7 Methods
---- Hacking Win7 SAM database
Module 13 : Cryptography
---- Introduction To Cryptography
---- Basic Concepts On Cryptography
---- Hash Func and Oracle Method
---- Birthday Theorem & Digital Signature
---- Pros and Cons Of Cryptography
Module 14 : SQL Injections Attacks
---- Introduction To SQL injection
---- SQL Injection To Google Dorks
---- SQL Mapping Via Kali Linux
---- Gathering Password And Cracking The Hash
---- Website Hacking - SQL Injections with Sqlmap
Module 15 : Wireless Attacks
---- Introduction to WEP and WPA
---- 802 1X Standard
---- Wireless Cracking Overview
---- Wriless Cracking Via Kali Linux