February 24, 2023
NQA Online Training by Zoom
“Ethical Hacking Essentials”
12 – 14 April 2022
What Will You Learn?
Students going through Ethical Hacking Essentials training will learn:
– Key issues plaguing the information security world, ethical hacking, and information security laws.
– Various types and phases of penetration testing.
– How to use different footprinting techniques such as open source information gathering, Whois Lookup, DNS Information gathering, etc. to collect important valuable information about a target organization.
– Footprinting a target using Path Analyzer Pro and Maltego.
– Basic network scanning and enumeration techniques and tools.
– UDP and TCP Packet Crafting Techniques using tools such as HPING3.
– Network Scanning using Nmap to identify live hosts in a target network, open ports and services on the target hosts.
– Techniques such as Time-to-Live (TTL) and TCP Window Sizes to identify a target system’s OS using Wireshark.
– How to perform network enumeration using NetBIOS Enumerator.
– Various vulnerability assessment types and tools to identify security loopholes.
– Scanning for network vulnerabilities using the GFI LanGuard and Nikto.
– System hacking methodology, steganography, and covering tracks.
– Active online attack and system password auditing using tools such as Responder and L0phtCrack.
– Exploiting client-side vulnerabilities and establishing a VNC Session.
– Escalating privileges by exploiting client-side vulnerabilities.
– Viewing, enabling, and clearing audit policies using Auditpol.
– Distinct types of malware (trojans, viruses, worms, etc.) and their working.
– Gaining control over a target machine using trojans such as njRAT.
– Creating trojans and viruses using different malware kits available in the wild such as ProRat and JPS Virus Maker.
– Various packet sniffing techniques and tools to discover network vulnerabilities.
– Sniffing passwords using Wireshark and analyzing a network using the Capsa Network Analyzer.
– Various social engineering techniques, insider threats, and identify theft.
– Sniffing credentials using Social Engineering Toolkit (SET).
– Different types of web application attacks and web application hacking methodology.
– Exploiting remote command execution vulnerability to compromise a target web server.
– Exploiting file upload vulnerability at different security levels.
– SQL injection attacks techniques, hacking methodology, and tools.
– Performing SQL injection attack against MSSQL to extract databases and WebShell using SQLMAP.
– Wireless standards, wireless encryption, wireless threats, and wireless hacking tools.
– Cracking a WEP network with aircrack-ng.
Happy Improvement !!