Ranchi
    Posted: 1 month ago by
    Shortlist

    MIS Academy in Bariatu Housing Colony

    School name
    MIS Academy
    Available classes
    Class 11 And 12
    Syllabus
    State / Cbsc / Icse
    Locality
    Bariatu Housing Colony
     
    Reply
     

    Description for "MIS Academy in Bariatu Housing Colony"

    ETHICAL HACKING AND PENETRATION TESTING ( KALI LINUX )

    Learning outcomes from this course : Install hacking lab & needed software (works on Windows, OS X and Linux). Install windows & vulnerable operating systems as virtual machines for testing. Discover vulnerabilities & exploit them hack into servers. Hack & secure both WiFi & wired networks. Use many hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc. Hack secure systems using client-side and social engineering attacks. Learn Network Penetration Testing. Learn linux commands and how to interact with the terminal.Network basics & how devices interact inside a network. Gather detailed information about clients and networks like their OS, opened ports ...etc. Crack WEP/WPA/WPA2 encryptions using a number of methods. ARP Spoofing/ARP Poisoning. Gain control over computer systems using server side attacks. Create undetectable backdoors. Use social engineering to gain full control over target systems. Discover, exploit & fix local file inclusion vulnerabilities. Discover, fix, and exploit SQL injection vulnerabilities. Bypass login forms and login as admin using SQL injections.

    Module 1 : You will learn extensive hands-on with installation and configuration of Virtualization and Kali Linux.

    ---- Introduction to Ethical Hacking and Pentesting
    ---- VMWare Installation
    ---- Installation of Kali Linux
    ---- Kali Linux Configuration and VMWare Tools
    ---- Introduction to Kali Linux
    ---- Concept of Operating Systems

    Module 2 : Master your commandline skills to navigate and administer Kali Linux and Windows Command lines

    ---- Linux terminal basics
    ---- Kali Linux editors
    ---- Kali Linux administrative commands
    ---- Windows and Networking command
    Module 3 : Prepare Your Lab

    ---- Changing IP address and setting up Wireless Adapter
    ---- Creating Bootable Kali USB
    ---- Important Networking Terms
    ---- Important Hacking Terms
    ---- Few Things to Do After Installing Kali Linux
    ---- Changing Our Mac Address - MacChanger

    Module 4 : Footprinting

    ---- Google Hacking
    ---- Working with Nikto
    ---- DNS Footprinting
    ---- The Harvester
    ---- Shodan
    ---- Zone Transfer With Dig

    Module 5 : Scanning

    ---- Installing Metasploitable
    ---- Working with Nmap
    ---- Working with Zenmap
    ---- TCP scans
    ---- Nmap Bypassing Defences
    ---- Nmap Scripts

    Module 6 : Phishing Attacks and Mass mailer attack

    ---- Introduction To Social Engineering and information Gathering
    ---- Types Of Social Engineering
    ---- Social Engineering Attacks
    ---- Spear Phishing Attacks
    ---- Phishing Attack
    ---- Phishing Attack Consequences
    ---- Mass Mailer Attack

    Module 7 : Arp Poisioning, DNS & DHCP Spoofing & Port Stealing

    ---- ARP Poisoning
    ---- DNS Spoofing vs DNS Poisoning
    ---- Advanced Concepts on DNS Spoofing
    ---- DHCP Spoofing
    ---- Port Stealing

    Module 8 : Backdoors and Rootkits

    ---- Backdoor Overview
    ---- Backdoor Process and Functions
    ---- Backdoor Gaining Access
    ---- Backdoor Maitaining Access
    ---- Introducing Command Prompt Backdoor
    ---- Meterpreter Backdoor
    ---- Gaining Root

    Module 9 : Jack the Ripper, Embedded Trojan Horse, Java Applet Attack, MITM Attacks, ICMP, Driftnet and EvilGrade

    ---- Jack the Ripper
    ---- Embedded Trojan Horse
    ---- Introduction To Java Applet Attack Method
    ---- Man in the Middle : MITM Attack
    ---- ICMP Redirection
    ---- Killing a Network
    ---- Ddosing Unauthorised Network
    ---- Working with Driftnet
    ---- Working with EvilGrade

    Module 10 : Meterpreter, MsfConsole and MsDConsole

    ---- Meterpreter Overview
    ---- Activating Payloads
    ---- MsFconsole explained
    ---- MsDconsole Commands
    ---- Exploits
    ---- Payloads
    ---- Generating Payloads

    Module 11 : Password Cracking

    ---- Introduction To Password Cracking
    ---- Password Cracking Strategy
    ---- Windows Password Cracking Overview
    ---- Nuts And Bolts Of Windows Password Cracking Strategy
    ---- Introduction To Linux Hash Cracking
    ---- Linux Hash Cracking Strategy
    ---- Generating Wordlist Overview
    ---- Generating Wordlist Process and Functions
    ---- CeWL Cracking

    Module 12 : DDos Attacks on Windows & SAM Hacking

    ---- Introduction To Denial of Service
    ---- DoS Vs DDoS
    ---- Levels Of DDos Attacks
    ---- Preventing DDos Attacks
    ---- Introduction To DDoSing Windows 7
    ---- DDosing Windows 7 Methods
    ---- Hacking Win7 SAM database

    Module 13 : Cryptography

    ---- Introduction To Cryptography
    ---- Basic Concepts On Cryptography
    ---- Hash Func and Oracle Method
    ---- Birthday Theorem & Digital Signature
    ---- Pros and Cons Of Cryptography

    Module 14 : SQL Injections Attacks

    ---- Introduction To SQL injection
    ---- SQL Injection To Google Dorks
    ---- SQL Mapping Via Kali Linux
    ---- Gathering Password And Cracking The Hash
    ---- Website Hacking - SQL Injections with Sqlmap

    Module 15 : Wireless Attacks

    ---- Introduction to WEP and WPA
    ---- 802 1X Standard
    ---- Wireless Cracking Overview
    ---- Wriless Cracking Via Kali Linux

     

    Knowledge Yug in Ahirtoli