Hacking Training Module
Hacking Training Module
Concept of Hacking
What is Hacking? Who is a Hacker?
Who is not a Hacker? What is Cracking? Who is a Cracker? How to become a Hacker? Types of Hackers? Types of Hacking? Let Us Become a Hacker o Software Requirement o Hardware o Intellectual o Appearance & Interaction o Communication Skills o Time Management Start with Hacking o Foot Printing o Scanning Port Scanning Finger Printing Fire w alking o Gaining Access Password Attacks Social Engineering Viruses Keyloggers o Maintaining Access OS Backdoors Trojans PHP Injection o Clearing Tracks Deleting Log Files Remove Traces Delete Event Logs Foot Printing o What is Foot Printing o Why is it Necessary o Whois Lookup o NS Lookup o IP lookup Target Information gathering Website Social Profiles Contact Info Fake Calling Fake Mails Google Digging Make a Report Scanning: o What is Scanning o Why is it Necessary
o Port Scanning Types of Port Scanning o Finger Printing Active Finger Printing Passive Finger Printing o Fire Walking o Network enumeration o Make a Report
Attacks on Email
What is an Email What is an Email Server? Working of an Email Server? o How to setup an Email Server What is the Login Process? What is Email Hacking? Different kind of Attacks on Email o Sending Fake Mails o Phishing o Stealing Cookies o Keyloggers Fake Mails o Introduction to Email o What is a Fake Mail o Why Fake Mail goes? o Sending a Fake Mail Using Scripts What is the working of the Script How to use the Script Topic Hierarchy From Open Relay Servers What is a Open Relay Server How to Send Email Topic Hierarchy o Detecting a Fake Mail Understanding the Travelling Path of an email Reading Headers What is a Header How to Access the Header in different Email Accounts Checking outgoing server address from Header o Tracing an Original Email Reading Headers Checking the Senders IP Address Tracing the IP Address Tools Websites Phishing o Introduction to the Topic
o Why Phishing is successful o Steps in Phishing Making a look alike website, as the Original one Changing the code of the Webpage Sending the link of the webpage to several users to get the Personal Data o Working of Phishing Introduction to Phishing Script o Ways to do Phishing o Protection from Phishing Anti-Phishing Tools Awareness about Phishing techniques Stealing Cookies o Introduction to Cookies o Information stored in Cookies o Ways to get Cookies from a computer Physically accessing the computer Remote Attacks o Getting Information from Cookies o Using Cookie to impersonate as a different user o Protection from Cookie Attacks Deleting Cookies Keyloggers o Introduction to Keyloggers o Using a Keylogger o Types of Keylogger Local Keylogger Remote Keylogger o Detecting a Keylogger Using Anti-Virus Using Process Explorer Securing an Email Account o Configure Strong Passwords o Configure a Secure Account o Follow Counter-measures of Phishing
Location of SAM File Importance of SAM File Introduction to Hashes o Introduction to Live OS Disks Using a Live CD Advantages of a Live CD o Ways to Crack Login Password Shoulder Surfing Password Guessing Dictionary Attack Rainbow Table Attack Brute-force Attack Using Command Prompt o Cracking Password from Hashes Using Ophcrack Live CD Using NT Offline Password Cracker Using Cain & Abel Privilege Escalation o Using Live CD o Using Command Prompt o Using GPEdit Creating Backdoors o Creating Hidden Account o Getting Command Prompt on Login Screen(Sticky Keys Attack) Clearing Tracks o Introduction to Event Viewer o Deleting Event Logs o Deleting Windows Logs Securing Windows Systems o Configuring Strong Login Passwords o Using Syskey Introduction to Syskey Configuring the Syskey Password o BIOS Password Introduction to BIOS Configuring BIOS o Changing Boot Sequence o Checking for Backdoors Checking Hidden Accounts Checking Sticky Keys Attack o Checking the Event Logs Hiding Files in Windows o CACLS Introduction to ACL Changing ACL o AD S Performing ADS Retrieving Data from ADS files Detecting ADS Files Introduction to Streams
o Steganography Introduction to Steganography Ways to perform Steganography Using Command Prompt Using Tools o Winrar
Website Hacking
Introduction to Web Server o What is a Web Server o Working of a Web Server Request-response Cycle o Setup a Web Server Tools Introduction to Database Server o What is a Database Server o Working of a Database Server o Setup a Database Server Tools Required Login Process on a Website o Connection between Web Server & Database Server Attacking a Web Server o SQL Injection o Remote Code Execution o Cross Side Scripting o Directory Traversal Attack SQL Injection o Introduction to SQL o Working of SQL Database Introduction to SELECT Query Working of SELECT Query in Login Process o Introduction to SQL Injection The SQL Injection Query Understanding the Working of the Query o Using the SQL Injection to Get Login Live Demonstrations o Counter-measures of SQL Injection Attack Validating the Input on the Web Server Encrypting the Input on the Web Server Remote Code Execution o Introduction to the Topic o Introduction to PHP eval() function Working of the eval() function o Hacking using the eval() function Executing commands on the Web Server Live Demonstrations Getting information on the Web Server Live Demonstrations o Counter-measures
Cross-side Scripting o Introduction to the XSS o Working of XSS o Flaw in XSS implemented websites o Hacking using XSS o Counter-measures Directory Traversal Attack o Introduction to the Topic o Structure of a Website o Performing the Attack Live Demonstrations o Counter-measures Alternative way to Attack websites o Getting all the files of a Website Using Tools Black Widow Wget WebSleuth
o Crafted URL o CoreText Pointer o Image IO Integer Overflow o Image IO Memory Corruption o UFS File System Overflow o User Privilege Escalation Cracking MAC OS o Malformed Installer Package Crack Worms & Viruses In MAC OS o Working of Worms & Viruses o Removal of Worms & Viruses Anti-Viruses in MAC Security Tools in MAC Counter-measures
Wireless Hacking
Introduction to Wireless Technology History of Wireless Technology
Concept of Wireless Networks Wired Network vs. Wireless Network Types of Wireless Netw ork Types of Wireless Standards o 802.1 o1 802.11a o 802.11 ob 802.11g o 802.11 oi 802.11 n Terminology in Wireless Networks o MAC Address o WAP o SSI oD Beacon Frames o ESSI oD Channel o Association & Authentication Setting up a WLAN o Ad-Hoc Mode o Infrastructure Mode Security Options in WLAN o MAC Filtering o WEP Key o WPA & WPA2 Keys Hacking a WLAN o Terminologies War Walking War Driving War Flying o MAC Spoofing o WEP Cracking WEP Flaws Passive Attacks Active Attacks Steps to Hack a WLAN o Finding Networks o Analyzing the Target Network o Sniffing the Network o Cracking the WEP Key Authentication & Disassociation Attack Live Demonstration using Aircrack o Rogue Access Point Creating a Rogue Access Point o WPA Cracking Live Demonstration Some More Attacks on WLAN o Man in the Middle Attack (MITM) Eavesdropping Manipulation (ARP Poisoning)
o Denial of Service Attack Wireless Sniffing Tools o Introduction to the Tools Securing a Wireless Network o MAC Filtering o Disable Broadcasting of SSID o Correct selection of Encryption Method WLAN Security Passphrase o Configure Firewall
Reverse Engineering
Introduction to the Topic Why to Reverse Engineer o Advantages o Disadvantages What is a Software Concept of Languages o Programming Language o Machine Language o Assembly Language What is a Disassembler o Why to Disassemble a Software o Working of a Disassembler o Tools to Disassemble What is a Decompiler o Why Decompile a Software o Working of a Decompiler o Tools to Decompiler What is a Debugger o Why to Debug a Software o Working of a Debugger o Tools to Debug a Software Difference between Disassembler & Debugger Serial Key Phishing o Introduction to the Topic o Steps in Serial Key Phishing Analyzing Assembly Code of Software Tracing the Error Message Setting Break Point Stepping the Assembly Code Checking the Registers for the Key Manipulating the Software o Introduction to the Topic o Steps to Manipulate Analyzing Assembly Code Error Tracing Setting Break Point Stepping the Assembly Code Tracing Conditional Jumps
Injecting the Code Generating Patched Exe File Software Patching o Concept of Patching o Steps in Patching Disassembling a Software Tool Error Tracing Decoding the Instructions Generating Patch to Inject the instruction Introduction to Patching Tool Using Code Fusion Running the Patch Counter-measures o Securing a Software Encryption Program Obfuscation
What is a Virus Working of a Virus Types of Viruses Developing a Virus o Introduction to Batch Programming Removal of Virus o Using Anti-Virus Software o Manual Removal Process Explorer TCPView
Penetration Testing
Concept of Penetration Testing Difference between Ethical Hacking and Penetration Testing Manuals of Penetration Testing o OWASP o OSSTM Types of Penetration Testing o White Box Testing o Black Box Testing o Grey Box Testing Steps in Penetration Testing o Preparation o Conduct o Conclusion Tools Used in Penetration Testing o Backtrack - Linux Based Live OS o Nessus - Network Vulnerability Scanner o Nmap - Port Scanner o Accunetix - Web Scanner
Tracking the location of the Victim Protective countermeasures o Choice of programming language o Use of safe libraries o Pointer protection
Cryptography
Introduction to Symmetric Key Cryptography o Symmetric Key Encipherment Substitution Cipher Vernam Cipher (One-Time Pad) Transposition (Permutation) Cipher o Symmetric Key Cryptography Characteristics Data Encryption Standard (DES) Triple DES The Advanced Encryption Standard (AES) The Blowfish Algorithm The Twofish Algorithm The IDEA Cipher RC5/RC6 Public Key Cryptosystems o One-Way Functions o Public Key Algorithms RS Al Gamal E o Summaries of Public Key Cryptosystem Approaches o Digital Signatures Hash Function Developing the Digital Signature MD 5 Public Key Certificates o Digital Certificates o Public Key Infrastructure (PKI) Cryptanalysis Email Security Wireless Security Disk Encryption
Digital Forensics o Assessing the Case Detecting Identifying the Event Crime o Preservation of Evidence Chain of Custody o Collection Data Recovery Evidence Collection o Examination: Tracing Filtering Extracting Hidden Data o Analysis o Where and When to Use Computer Forensics? Investigating Computer Crime o How an Investigation Starts o The Role of Evidence o Investigation Methodology o Securing Evidence o Chain of Evidence Form o Before Investigating o Professional Conduct Acquiring Data, Duplicating Data, and Recovering Deleted Files o Recovering Deleted Files and Deleted Partitions Data Recovery in Linux Deleted File Recovery Tools Recovering Deleted Partitions Deleted Partition Recovery Tools o Data Acquisition and Duplication Data Acquisition Tools Backing Up and Duplicating Data Acquiring Data in Linux