SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
WITH ASSOCIATION OF COMPUTER SOCIETY OF
INDIA
&
GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION
STUDIES
CREZONE TECHNOLOGIES STARTING
VOCATIONAL  INDUSTRIAL
TRAINING
FOR
M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH
(C.S.E / I.T./ E.C.E)
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS
MODULE – I
System Hacking
 Operating System hacking
 Virtualization
 Password Cracking
 Customizing Windows
 Operating system vulnerabilities
 Locating Viruses in Operating system
 Window hidden tools and utilities
 Windows Firewall
Basics of Hacking
 Definition of hacking
 Hacking Legal or Illegal?
 Future Scope in this Field
 Job Opportunities
 Types of Hackers
 White Hat Hacker
 Black Hat Hacker
 Grey Hat Hacker
 Suicide Hackers
Facebook/Yahoo/Gmail/Twitter
 E-mail Hacking
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Sending Fake Mail
 Detecting Fake email’s
 Email Bombing
 Making own fake mailer/bomber Script
 Email Phising
 Email password Hacking (Facebook/gmail/yahoomail)
 Step Verification (Only for gmail)
MALWARES
 Creating Trojan
 Working of Trojan
 Creating Viruses
 Spreading Viruses and Trojans
 Spywares(Keyloggers)
 Spreading Virus
 Isrealer 6.0,6.3 Legend Pack (Setup)
 Implementing Java Drive
 Compromising Remote System
 Detection & removal of Trojan Viruses,Spywares
 How to Make virus Undeteactable Using Crypters
 Crypting
Web Application hacking
 Credit Card Hacking (Free Online shoping)
 Efficient Google Searching
 Hacking CCTV Camera (Google cam dorks)
 Finding Websites Ip address
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Locating Server ip addresses where Website’s get hosted (via ping, tools)
 Locating websites
 Footprinting website’s
 Finding Admin pages of site’s (tool)
 Sql Injection Attacks (using tool Havij)
 XSS ATTACKS
 What is Shell (c99,r57, 404, barc0de mini)
 Shell Uploading
 What isDefacement page
 Website Defacement
 Using Bots to attack system’s/site
 Web Scanners
 Website penetration testing and assessment
Internet Security & Proxy
 Introduction to proxies
 Anonymous proxy
 Elite Proxy
 Web based Proxies
 Tor Web Browser
 Ip Spoofing Attacks
 Mac Address change
Reverse Engineering or Software Cracking
 Disassembling the Softwares
 Getting the code of EXEs
 Manipulating the Code of EXEs
 Dis-assemblers & Debuggers
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Olly DBG
 Windows Dis-assembler
 Software Cracking & Serial Key Phishing
 Analyzing Assembly Code of Software
 Tracing the Error Message
 Setting Break Point
 Stepping the Assembly Code
 Checking the Registers for the Key
Attacks On demand
MODULE-II
ADVANCE HACKING
 Tamper Data
 IRC Botnet
 Password Stealer (Paid)
 Shell Backdooring
 What is an IFrame Injection ?
 Windows Based IIS 7 Websites Hacking
 Installing Back Track 5R3
 Website Hacking with Sqlmap (Sql Injection)
 WebVulScan Web Application Vulnerability Scanner Setup
 Advance WiFi Hacking
 Waffit tool on BackTrack 5 R3
 Metasploit Framework
 Nmap Advanced Scanning
 Pentesting A Website
 Setting Up Your Pentest Labs
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Social Engineering Toolkit (INTRO)
 HTTP Hacking Man In The Middle Attack(MITMA)
 Advance Phishing (MITM)
 System Hacking with Social Engineering Toolkit (SET)
 Port Scanning
 DDOS (Denial Of Service)
 Bruteforce
 Mass Uploading on zone-h
 Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2
 What is Backbox n How to install Backbox in VMware (xrhstos)

Weitere ähnliche Inhalte

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

IT Security-Ethical Hacking Training Institue in Delhi

  • 1. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com WITH ASSOCIATION OF COMPUTER SOCIETY OF INDIA & GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION STUDIES CREZONE TECHNOLOGIES STARTING VOCATIONAL INDUSTRIAL TRAINING FOR M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH (C.S.E / I.T./ E.C.E)
  • 2. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS MODULE – I System Hacking  Operating System hacking  Virtualization  Password Cracking  Customizing Windows  Operating system vulnerabilities  Locating Viruses in Operating system  Window hidden tools and utilities  Windows Firewall Basics of Hacking  Definition of hacking  Hacking Legal or Illegal?  Future Scope in this Field  Job Opportunities  Types of Hackers  White Hat Hacker  Black Hat Hacker  Grey Hat Hacker  Suicide Hackers Facebook/Yahoo/Gmail/Twitter  E-mail Hacking
  • 3. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Sending Fake Mail  Detecting Fake email’s  Email Bombing  Making own fake mailer/bomber Script  Email Phising  Email password Hacking (Facebook/gmail/yahoomail)  Step Verification (Only for gmail) MALWARES  Creating Trojan  Working of Trojan  Creating Viruses  Spreading Viruses and Trojans  Spywares(Keyloggers)  Spreading Virus  Isrealer 6.0,6.3 Legend Pack (Setup)  Implementing Java Drive  Compromising Remote System  Detection & removal of Trojan Viruses,Spywares  How to Make virus Undeteactable Using Crypters  Crypting Web Application hacking  Credit Card Hacking (Free Online shoping)  Efficient Google Searching  Hacking CCTV Camera (Google cam dorks)  Finding Websites Ip address
  • 4. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Locating Server ip addresses where Website’s get hosted (via ping, tools)  Locating websites  Footprinting website’s  Finding Admin pages of site’s (tool)  Sql Injection Attacks (using tool Havij)  XSS ATTACKS  What is Shell (c99,r57, 404, barc0de mini)  Shell Uploading  What isDefacement page  Website Defacement  Using Bots to attack system’s/site  Web Scanners  Website penetration testing and assessment Internet Security & Proxy  Introduction to proxies  Anonymous proxy  Elite Proxy  Web based Proxies  Tor Web Browser  Ip Spoofing Attacks  Mac Address change Reverse Engineering or Software Cracking  Disassembling the Softwares  Getting the code of EXEs  Manipulating the Code of EXEs  Dis-assemblers & Debuggers
  • 5. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Olly DBG  Windows Dis-assembler  Software Cracking & Serial Key Phishing  Analyzing Assembly Code of Software  Tracing the Error Message  Setting Break Point  Stepping the Assembly Code  Checking the Registers for the Key Attacks On demand MODULE-II ADVANCE HACKING  Tamper Data  IRC Botnet  Password Stealer (Paid)  Shell Backdooring  What is an IFrame Injection ?  Windows Based IIS 7 Websites Hacking  Installing Back Track 5R3  Website Hacking with Sqlmap (Sql Injection)  WebVulScan Web Application Vulnerability Scanner Setup  Advance WiFi Hacking  Waffit tool on BackTrack 5 R3  Metasploit Framework  Nmap Advanced Scanning  Pentesting A Website  Setting Up Your Pentest Labs
  • 6. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Social Engineering Toolkit (INTRO)  HTTP Hacking Man In The Middle Attack(MITMA)  Advance Phishing (MITM)  System Hacking with Social Engineering Toolkit (SET)  Port Scanning  DDOS (Denial Of Service)  Bruteforce  Mass Uploading on zone-h  Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2  What is Backbox n How to install Backbox in VMware (xrhstos)