ranjan raja is the best ethical hacker in patna.
contact for workshop or seminar.
ranjanraja007@gmail.com
1 of 3
Downloaded 11 times
More Related Content
ETHICAL HACKING SYLLABUS FOR PATNA BY RANJAN RAJA
1. syllabus :-
SYLLABUS :-
INTRODUCTION TO HACKING
Type of hacker
Steps of hacker
PROXY SETTING AND HIDING YOUR DETAILS
Changing & Hiding ip address
Trace a ip address
MAC address spoffing
Browsing anonymously on proxy server
Unblocking website
Offline and online proxy “tools tor“
EMAIL TRACING AND PROTECTION
Email forgery
Self Destructive Message
spamming
bombing
spoofing
tracking
Email security
Encryption and decryption “Hiding secret message“
Plugin and addon
Know ip through email
FACEBOOK AND EMAIL HACKING
Phishing
keylogger
Tabnabbing
Cookies stealing
Ettercap and sniffing
Set
Hacking over usb
URL Shortening Attacks
YAHOO PERMANENT HACKING
Hack yahoo email
Yahoo phising page
GOOGLE HACKING
Play with Google dorks
Live camera expitation
SYSTEM HACKING
Cracking window password by various methods “window based“
Windows login password cracking
Windows xp , 7,8 hacking “Metaexploit“
Window hacking remotely “AMYRTAGE“
Desktop Sharing “Remotely“
Registry tweeks
Syskey attack and security
WORM VIRUS AND TROJANS AND PROTECTION
Cookies Stealing
Remote Accessing Tools
1)dark comet
2) beast
Binding and FUD
Detection and removing of Trojan
ATTACKS ON NETWORK
Lan and wireless attacks
Open Dns
2. Port scanning
STAGANOGRAPHY
Hiding secret message behing images
s-tools
WEBSITE EXPLOITATION AND SECURITY
Harvester
Webshag
DNS and WHOIS Lookups
Footprinting “Nmap“
Cross site scripting- xss
SQL Injection
Admin page finder
Blind injection
Website security
Introduction to penetration testing and vulnerability assessment
WEBSITE MAKING AND BLOGING
Wordpress
jhoomla
PhpBB
Google blogging and designing
SEARCH ENGING OPTIMIZATION “SEO“
Website ranking
WIRELESS EXPLOTATION AND WIRELESS SECURITY
Wep wifi cracking
Wpa and wpa2 wifi network cracking
Reaver attack
Fern attack
Gerix attack
Fake wireless access points
WLAN Sniffers and scanner-Including ac sniffing
Make own wifi networks
Securing routers
MOBILE EXPLOITATION
Call spoofing and tracing
Android hacking
Call details and exploitation
Phone backdooring
Number changing
BACKTRACK AND KALI LINUX & IT“S USES
Tabnapping
Phishing with backtrack
Scanning
ONLINE MONEY MAKING
Odesk
Freelancer
Adsense
Aids
Online payment site
CYBER CRIME AND LAWS
Cyber forensic
Cyber laws
TIPS AND TRICKS
Facebook likes
Free hosting and domain