SlideShare a Scribd company logo
1 of 3
syllabus :- 
SYLLABUS :- 
INTRODUCTION TO HACKING 
Type of hacker 
Steps of hacker 
PROXY SETTING AND HIDING YOUR DETAILS 
Changing & Hiding ip address 
Trace a ip address 
MAC address spoffing 
Browsing anonymously on proxy server 
Unblocking website 
Offline and online proxy “tools tor“ 
EMAIL TRACING AND PROTECTION 
Email forgery 
Self Destructive Message 
spamming 
bombing 
spoofing 
tracking 
Email security 
Encryption and decryption “Hiding secret message“ 
Plugin and addon 
Know ip through email 
FACEBOOK AND EMAIL HACKING 
Phishing 
keylogger 
Tabnabbing 
Cookies stealing 
Ettercap and sniffing 
Set 
Hacking over usb 
URL Shortening Attacks 
YAHOO PERMANENT HACKING 
Hack yahoo email 
Yahoo phising page 
GOOGLE HACKING 
Play with Google dorks 
Live camera expitation 
SYSTEM HACKING 
Cracking window password by various methods “window based“ 
Windows login password cracking 
Windows xp , 7,8 hacking “Metaexploit“ 
Window hacking remotely “AMYRTAGE“ 
Desktop Sharing “Remotely“ 
Registry tweeks 
Syskey attack and security 
WORM VIRUS AND TROJANS AND PROTECTION 
Cookies Stealing 
Remote Accessing Tools 
1)dark comet 
2) beast 
Binding and FUD 
Detection and removing of Trojan 
ATTACKS ON NETWORK 
Lan and wireless attacks 
Open Dns
Port scanning 
STAGANOGRAPHY 
Hiding secret message behing images 
s-tools 
WEBSITE EXPLOITATION AND SECURITY 
Harvester 
Webshag 
DNS and WHOIS Lookups 
Footprinting “Nmap“ 
Cross site scripting- xss 
SQL Injection 
Admin page finder 
Blind injection 
Website security 
Introduction to penetration testing and vulnerability assessment 
WEBSITE MAKING AND BLOGING 
Wordpress 
jhoomla 
PhpBB 
Google blogging and designing 
SEARCH ENGING OPTIMIZATION “SEO“ 
Website ranking 
WIRELESS EXPLOTATION AND WIRELESS SECURITY 
Wep wifi cracking 
Wpa and wpa2 wifi network cracking 
Reaver attack 
Fern attack 
Gerix attack 
Fake wireless access points 
WLAN Sniffers and scanner-Including ac sniffing 
Make own wifi networks 
Securing routers 
MOBILE EXPLOITATION 
Call spoofing and tracing 
Android hacking 
Call details and exploitation 
Phone backdooring 
Number changing 
BACKTRACK AND KALI LINUX & IT“S USES 
Tabnapping 
Phishing with backtrack 
Scanning 
ONLINE MONEY MAKING 
Odesk 
Freelancer 
Adsense 
Aids 
Online payment site 
CYBER CRIME AND LAWS 
Cyber forensic 
Cyber laws 
TIPS AND TRICKS 
Facebook likes 
Free hosting and domain
Cloud computing 
Online shopping 
Profile visinting 
Fake news 
orb

More Related Content

Similar to ETHICAL HACKING SYLLABUS FOR PATNA BY RANJAN RAJA

Similar to ETHICAL HACKING SYLLABUS FOR PATNA BY RANJAN RAJA (20)

fucking shit
fucking shitfucking shit
fucking shit
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking tools
 
Infosec
InfosecInfosec
Infosec
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
cyber crime
cyber crimecyber crime
cyber crime
 
Hacking final
Hacking finalHacking final
Hacking final
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

ETHICAL HACKING SYLLABUS FOR PATNA BY RANJAN RAJA

  • 1. syllabus :- SYLLABUS :- INTRODUCTION TO HACKING Type of hacker Steps of hacker PROXY SETTING AND HIDING YOUR DETAILS Changing & Hiding ip address Trace a ip address MAC address spoffing Browsing anonymously on proxy server Unblocking website Offline and online proxy “tools tor“ EMAIL TRACING AND PROTECTION Email forgery Self Destructive Message spamming bombing spoofing tracking Email security Encryption and decryption “Hiding secret message“ Plugin and addon Know ip through email FACEBOOK AND EMAIL HACKING Phishing keylogger Tabnabbing Cookies stealing Ettercap and sniffing Set Hacking over usb URL Shortening Attacks YAHOO PERMANENT HACKING Hack yahoo email Yahoo phising page GOOGLE HACKING Play with Google dorks Live camera expitation SYSTEM HACKING Cracking window password by various methods “window based“ Windows login password cracking Windows xp , 7,8 hacking “Metaexploit“ Window hacking remotely “AMYRTAGE“ Desktop Sharing “Remotely“ Registry tweeks Syskey attack and security WORM VIRUS AND TROJANS AND PROTECTION Cookies Stealing Remote Accessing Tools 1)dark comet 2) beast Binding and FUD Detection and removing of Trojan ATTACKS ON NETWORK Lan and wireless attacks Open Dns
  • 2. Port scanning STAGANOGRAPHY Hiding secret message behing images s-tools WEBSITE EXPLOITATION AND SECURITY Harvester Webshag DNS and WHOIS Lookups Footprinting “Nmap“ Cross site scripting- xss SQL Injection Admin page finder Blind injection Website security Introduction to penetration testing and vulnerability assessment WEBSITE MAKING AND BLOGING Wordpress jhoomla PhpBB Google blogging and designing SEARCH ENGING OPTIMIZATION “SEO“ Website ranking WIRELESS EXPLOTATION AND WIRELESS SECURITY Wep wifi cracking Wpa and wpa2 wifi network cracking Reaver attack Fern attack Gerix attack Fake wireless access points WLAN Sniffers and scanner-Including ac sniffing Make own wifi networks Securing routers MOBILE EXPLOITATION Call spoofing and tracing Android hacking Call details and exploitation Phone backdooring Number changing BACKTRACK AND KALI LINUX & IT“S USES Tabnapping Phishing with backtrack Scanning ONLINE MONEY MAKING Odesk Freelancer Adsense Aids Online payment site CYBER CRIME AND LAWS Cyber forensic Cyber laws TIPS AND TRICKS Facebook likes Free hosting and domain
  • 3. Cloud computing Online shopping Profile visinting Fake news orb