Ethical Hacking Proactive Training
Ethical Hacking Proactive Training
Ethical Hacking Proactive Training
T R A I N I N G
HACKING
WWW.IGNITETECHNOLOGIES.IN
ETHICAL HACKING
People interested in learning about cyber-
attacks and risks should take the course,
Ethical Hacking. It offers a comprehensive
understanding of realistic attackers' hacking
strategies and methods.
TRAINING TYPE
Type 1
Type 2
A PERSONALISED SESSIONS
will one-on-one session
Pros: Flexible slot as per
candidate availabilities.
TARGET AUDIENCE
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and
Practitioners
Site administrators
Technical support engineer
Senior systems engineer
Systems analyst or administrator
IT security specialist, analyst, manager,
architect, or administrator
IT security officer, auditor, or engineer
Network specialist, analyst, manager,
Architect, consultant, or administrator
DURATION
Stage 1 Stage 5
Module 13: Sniffing and
Module 1: Fundamentals of Ethical Spoofing
Hacking Module 14: Denial of Service
Module 2: Pentest Lab setup and OS Module 15: Wireless Hacking
Dos Command
Network Attacks
Module 3: Basic Networking
STAGE 2
In this stage, the trainer will focus on various techniques and tools used
for information gathering to perform Recon with the help of Footprinting,
network Scanning and Enumeration by providing conceptual and
practical sessions on the following Modules.
Module 4: Footprinting
In this module, the candidate will learn how to gather information against
their target with the help of online tools available on the Internet to fetch
the information available on the web.
Key Points
OSINT Framework
Email Footprinting
DNS Footprinting
Web FootPrinting
Google Hacking Database
Tools: Shodan, Whois, DNS Dumpster, Exploit DB, Hunter, iplogger, OSINT,
Httrack and similar alternative tools.
STAGE 2
Module 5: Network Scanning
This module will help the candidate to learn network scanning to identify
live hosts, OS, ports, installed services and their versions.
Key Points
Host Discovery
OS Fingerprinting
Subnet Scanning
Default Scan
Stealth Scan
TCP Scan
UDP Scan
Specific port Scan
ALL port Scan
Version Scan
Script Scan
Decoy Scan
Fast Scan
Time Scan
Aggressive Scan
Module 6: Enumeration
This module will help the candidate to collect gather juicy information for
installed services running inside a host machine.
Key Points
NetBios Enumeration
FTP Enumeration
SMB Enumeration
Telnet Enumeration
SMTP Enumeration
Key Points
Scanning Vulnerability
Exploiting Vulnerability
Password Brute Force
Creating Malicious File Type (eg: Exe, Elf, apk)
Metasploit Framework – Auxiliaries, Exploits, Payloads Post Modules
and Meterpreter
Msfvenom Framework
Tools: Metasploit, Msfvenom, Netcat
Key Points
Post Enumeration
Gathering System information
Gathering User Information
Download and Upload operations
Process Migrate
Web Camera Hacking
Collect Stored Credentials (System, Brower, Wifi)
Privilege Escalation to gain Administrator Access
Hashdump
Clear Event logs
Persistence to maintain permanent access
Tools: Metasploit Post Modules
STAGE 3
Module 9: Malware and Threats
This Module will help candidates to understand the different behaviours of
various types of malware and analysis malicious process behind their
execution.
Key Points:
Malware Concept
Techniques used for Spreading Malware
Trojan Concept Vs Virus and Worm
Payload Binders and Cryptor
Countermeasure
Malicious Process Analysis
Tools: Trojans RAT, Virus Total, TCP View, Process Explore, Ad blocker
STAGE 4
Module 10: Web Hacking
This module will define Standards and tools used by hackers to exploit
websites by injecting malicious code or commands.
Key Points
Introduction to Web Server and Web Applications
Well Know web servers and CMS
Introduction to OWASP
Website Scanning
Introduction to BrupSuite
SQL injection
Cross-Site Scripting
Remote command Execution
Brute Force
Key Points
Social Engineering Concepts
Social Engineering Techniques
Email Spoofing
Geolocation
Credential Harvesting
Haveibeenpwned
Detect a phishing attack
Key Points
Kali Linux NetHunter
Generating Malicious APK
Fake SMS
Fake caller
Key loggers
Introduction to Rooted Devices
Trace Phone Location
Anonymous Chat Application
Network Mapper
Wi-Fi Kill
Key Points
Introduction Sniffing Its Types
Spoofing
Man-in-the-Middle Attack
ARP Poisoning
DNS Poisoning
Password Sniffing
HTTP Password Capture
Telnet Password Capture
FTP Password Capture
Tools: Ettercap, Wireshark and similar alternatives tools
Key Points
Introduction of DOS Attack & Its Types
Distributed Denial of Service DDOS
Bonet
DOS Attack
SYN Flood
ICMP Flood
UDP Flood
TCP Flood
Blue Screen Dead Attack
Tools: Golden-eye, Hping3, Metasploit Framework
STAGE 5
Module 15: Wireless Hacking
This module helps the candidate to understand different types of wireless
technologies, including encryption, threats, hacking methodologies, hacking
tools, Wi-Fi security tools, and countermeasures
Key Points
Introduction to Wireless standard IEEE
Introduction to WIFI Security & Protocols
Detect Hidden SSID
Monitor mode Vs promiscuous mode
Capture WPA/WPA2 Handshake
WPA/WPA2 Password cracking
Evil Twin
Dump Wifi Credential
Key Points
Introduction to Information Security & CIA Model
Basic Concept of Encoding
Base64
Binary
Hexa Decimal
Basic Concept of Steganography
Image, audio and file-based Steganography
Introduction to Cryptography
Cesar cypher
Rot 13
Modern Cryptography
ASE Symmetric Encryption
PGP Asymmetric Encryption
Basic Concept of Hashing
Hash Calculator
Signature Compression
PHONE
+91-9599387841 | +91 11 4510 3130
WHATSAPP
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
info@ignitetechnologies.in
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/
hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/Ignitetechnologies
JOIN OUR
TRAINING PROGRAMS
H ERE
CLICK BEGINNER
Network Pentest
Wireless Pentest
ADVANCED
Advanced CTF
Android Pentest Metasploit
EXPERT
Privilege Escalation
APT’s - MITRE Attack Tactics
Windows
Active Directory Attack
Linux
MSSQL Security Assessment
www.ignitetechnologies.in