CYBRE SECURITY SUMMER TRAINING PROGRAM Increased Internet penetration has given exponential rise in sophisticated attacks on Information Technology (IT) infrastructure. Attackers are gaining access to sensitive information like CREAD CADR details and other financial information. In this summer training you get the explorer how to check this. Introduction to Ethical Hacking Hacking Concepts Hacking vs. Ethical Hacking Effects of Hacking on Business Who Is a Hacker? Hacker Classes Hacktivism Hacking Phases Types of Attacks Types of Attacks on a System Operating System Attacks Information Gathering Footprinting Footprinting Concepts What is Footprinting? Why Footprinting? Objectives of Footprinting Reconnaissance Reconnaissance Concepts WHOIS Lookup Introduction to Linux/Kali Linux/Backtrack Introduction Basic Commands Exploit Tools System Hacking System Hacking: Goals Password Cracking Password Complexity Password Cracking Techniques Types of Password Attacks Phishing Steganography Image Hiding Data Hiding Social Engineering Attack What is Social Engineering? How can it be used? Types Of Social Engineering DOS ATTACK Fake Emails Session Hijacking Session Hijacking Concepts Brute Forcing Attack Man-in-the-Middle Atta SQL Injection What is SQL injection Exploiting the weakness of server SQL Injection Scripts Hacking Webservers Webserver Concepts Webserver Attacks Webserver Attack Tools Buffer Overflow Buffer Overflow Concept Introduction to Metasploit How to Buffer Overflow With Metasploit PROJECTS Live demonstration of Google dorks. Magic of 94FBR Hacking through command prompt. Hacking through a live booting. Creation of free domain Facebook account hacking on local server. Gmail account hacking on local server. Facebook account hacking on real server. Gmail account hacking on real server. Hide a text file in an image file. Hide a text file in a audio/video file. Hide executable file in an image file. A scenario showing social engineering attack DOS ATTACK on a weak website. Sending a fake email Creation of a virus to automatically shutdown the computer. Shutdown the laptop by sending an email. Creation of virtual environment for session hijacking. Sniffing of username and password from a virtual network. Preparation of MySql database & executing SQL commands. SQL Injection to hack a website TOOL KIT CD( Softwares and Tools)
© Copyright 2024