Arich Infotech

Ethical Hacking Concepts

Ethical Hacking Concepts

Duration in Hours (4 Hours session) : 60

Duration in Days: 15

Ethical Hacking Course

Course Code: IEHA30

40 Hours of Theory

20 Hours of Lab

  1. What is a network?
  2. IP adresses
  3. Classifications
  4. Types of IP
  5. Assigning of IP
  6. IP spoofing
  7. MAC spoofing
  1. Active and passive techniques
  2. Finding IP and OS of targets
  3. DNS records
  4. Mail footprints
  5. Recon – ng tool
  1. Finding ports and services
  2. Angry IP scanner, Superscan
  3. TCP/IP and UDP
  4. Types of flags

Scanning map

  1. System level enumeration
  2. SID and D
  3. User2sid and Sid2user
  4. Null session
  1. Password hacking
  2. Keyloggers
  3. Steganography
  1. Beast trojan
  2. Virus creation using batch file programing
  3. Classification between malwares, viruses and worms
  1. Wireshark
  2. Cain
  3. and able (MITM)
  4. Analyzing nmap scan types
  5. Dos and DDos attacks
  1. Google hacking
  2. Directory listing
  3. Information leakage
  4. Brute force attack
  1. Burpsuite
  2. Nikto
  1. assessment
  2. ZAP proxy
  3. IBM app scan
  1. msf framework
  2. Identifying vulnerabilities and exploits using web resources
  3. Manual penetration testing
  1. Hashing
  2. Symmetric and
  3. Asymmetric
  4. Types of algorithms
  5. Encryption and Encoding
  • Software cracking
  • Firewall/IPS/IDS/Honeypots
  • Social engineering
  • Physical security
  • Patch management
  • OSI layer