Wednesday, March 9, 2016

Cyber Security


About Cyber Security:
Learn the latest computer security tools, techniques & methods related to Ethical Hacking from us and open various career opportunities for yourself! 

Now a days it is most important topic in daily life for personal security and national security.

You must learn:
First Step:
Who is a Hacker? 
What will you learn in the AFCEH Course?
 
The Anatomy of an IP Address
 
The Anatomy of an IP Address Part 2
 
Enumerating Remote Systems
 
Hiding Your IP Address
 
Tracing an IP Address
 
Network Address Translation
 
Internal VS External IP Addresses
 
Internal VS External IP Addresses DEMO
 
MAC Addresses
 
MAC Addresses DEMO
 
MAC Addresses Spoofing
 
MAC Addresses Spoofing DEMO
 
How to find the Remote Computer's MAC Address?
 
How to find the Remote Computer's MAC Address? DEMO
 
Changing your MAC Address
 
Fport
 
Fport DEMO
 
Proxy Servers
 
Proxy Servers Part 2
 
Proxy Bouncing
 
Proxy Bouncing Part 2
 
Tor: Anonymity Online
 
HACKING DEMO: tor
 
Hacking File Hosting Websites
 
Bypassing the Ads & Multiple Links
 
HACKING DEMO: Bypassing the Ads & Multiple Links
 
Bypassing the Download Wait Countdown
 
Bypassing the Download Limit
 
Shortened URL Vulnerabilities
 
Introduction
 
Threats
 
Previewing a Shortened URL
 
HACKING DEMO: Shortened URL Vulnerabilities
 
Network Reconnaissance
 
Ping sweeping
 
Traceroute
 
WHOIS
 
Reverse DNS Lookups
 
The Hosts File
 
The Hosts File Part 2
 
Netcat
Netcat Demo 
NCat
 
HACKING DEMO: Ncat
 
Port Scanning
 
Daemon Banner Grabbing
 
Scanline
 
Scanline Demo
 
Lab Session 1  

Second Step:

ICMP Scanning 
OS Fingerprinting
 
Firewall Enumeration
 
Zenmap
 
Zenmap Demo
 
Detection-Screen Cap
 
Passive Fingerprinting with P0f
 
Passive Fingerprinting with P0f Demo
 
Web Server Fingerprinting
 
Web Server Fingerprinting Demo
 
Avoid OS Detection: Change Default Values
 
Avoid OS Detection: Change Default Values Demo
 
Packet Generation
 
Packet Generation Demo
 
Packet Generator: Nping
 
HACKING DEMO: Nping
 
Conclusion - Information Gathering
 
Email Forging
 
EMail Spoofing Part 2
 
DOS Attacks
 
Reflective DDOS Attacks
 
Password Cracking Attacks
 
Password Cracking Attacks Part 2
 
Cracking Saved Passwords in Browsers
 
Introduction
 
Google Chrome
 
Firefox Mozilla
 
Internet Explorer
 
Tools
 
HACKING DEMO: Cracking Saved Passwords in Browsers
 
Countermeasures
 
Password Managers
 
Introduction
 
KeePassX
 
HACKING DEMO: Using KeePassX
 
LastPass
 
ClipperZ
 
KeepPass.info
 
Vulnerabilities
 
Intellectual Property Theft
 
Sniffers
 
Keyloggers
 
Trojans
 
EXE Binders
EXE Binders Part 2 
Social Engineering Attacks
 
TCP/IP: A Mammoth Description
 
Firewall Tunneling using SSH & Putty
 
Introduction
 
Steps to Follow
 
Unblocking P2P File Sharing tools using SSH & Putty
 
Unblocking P2P File Sharing tools Other Techniques
 
HACKING DEMO: Various ways to Unblock P2P File Sharing Tools
 
Hacking Windows
 
Introduction
 
Passwords
 
The Look and Feel
 
Security Checklists
 
HTTP Tunneling
 
Introduction
 
How it Works
 
Tools of Trade
 
HACKING DEMO: HTTP Tunneling
 
Email Hacking
 
Tracing Emails
 
Email Forging
 
The Post Office Protocol (POP)
 
Mailbombing
 
Cracking Email Accounts
 
Securing Email
 
Port Forwarding
 
Introduction
 
How it Works
 
Configuring the Router
 
PortForward.com
 
DynDNS
 
Source Port Forwarding Using fpipe
 
Port Forwarding VS Port Triggering
 
Lab Session 2
 

Third Step:

Identity Thefts 
Input Validation Attacks
 
SQL Injection
 
IP Spoofing
 
Cross Site Scripting Attacks
 
Misuse of Hidden HTML tags
 
Canonicalization Attacks
 
HTTP Response Splitting
 
Web Hacking
 
Buffer Overflows
 
Passive Sniffing Attacks
 
HACKING DEMO: Passive Sniffing Attacks
 
What is a Switch?
 
What is a Hub?
 
Router VS Hub VS Switch
 
Introduction
 
Countermeasures
 
Active Sniffing Attacks
 
ARP Poisoning Attack 
HACKING DEMO: ARP Poisoning Attacks
 
MAC Flooding Attack
 
HACKING DEMO: MAC Flooding Attack
 
MAC Duplication Attack
 
Playing with ARP Tables
 
Countermeasures
 
HACKING DEMO: Countermeasures
 
Social Networking Websites Security
 
Windows 7 & Windows Vista Offline Password Cracking
 
Windows 7 & Windows Vista Offline Password Cracking Demo
 
Windows 7 & Windows Vista Bypassing Login Prompt
 
Windows 7 & Windows Vista Bypassing Login Prompt Demo
 
Windows 7 & Windows Vista Online Password Cracking
 
Windows 7 & Windows Vista Online Password Cracking
 
CAPTCHA
 
Introduction
 
A Good CAPTCHA System
 
reCAPTCHA
 
Mail Hide from reCAPTCHA
 
HACKING DEMO: reCAPTCHA and Mail Hide
 
Cracking CAPTCHA
 
Cracking MegaUpload.com's Captcha
 
HACKING DEMO: Cracking MegaUpload.com's Captcha
 
Future Trends
 
GreaseMonkey Scripts
 
My Favorite Facebook Scripts
 
My Favorite Youtube Scripts
 
My Favortie Twitter Scripts
 
Tab Napping
 
Introduction
 
Threats
 
Steps Involved
 
HACKING DEMO: Tab Napping
 
DNS Attacks
 
Introduction
 
Tools
 
HACKING DEMO: DNS Tools
 
DNS Poisoning Sniffing ID Attack
 
DNS Cache Poisoning Birthday Paradox
 
DNS Cache Poisoning Birthday Attack
 
Modern Day DNS Attacks: Search Engines
 
Modern Day DNS Attacks: Fat Fingers Attack
 
Modern Day DNS Attacks: Domain Hijacking
 
HACKING DEMO: Modern Day DNS Attacks
 
Modification on User Computers
 
HACKING DEMO: Modification on User Computers
 
Accessing Blocked Websites using Public DNS Systems
 
HACKING DEMO: Accessing Blocked Websites using Public DNS Systems
 
Countermeasures
 
HACKING DEMO: FCrDNS
 
Lab Session 3

Fourth Step:

Encryption: Protecting Your Files 
Meet in the Middle Attack
 
Introduction
 
The Attack
 
Shell Accounts
 
Shell Accounts Part 2
 
USB Hacking: Linux on the Move
 
Undeleting Deleted Data
 
Undeleting Deleted Data Part 2
 
Permanently Removing Data: Eraser
 
Tripwire
 
Sysinternals
 
Task Kill Attack
 
Shoulder Surfing
 
Dumpster Diving
 
Road Sign Hacking
 
Steganography
 
Steganography Part 2
 
Watermarking
 
Steganalysis
 
Wireless Hacking
 
Introduction to Wireless Networks
 
Setting up a Wireless Network
 
Wireless Security
 
Poisoned Hotspots
 
Important Terminology
 
War Driving
 
War Driving: How does it work?
 
War Driving Tools
 
HACKING DEMO: War Driving Tools
 
War Driving & GPS Mapping
 
Finding WiFi Hotspots on the Internet
 
HACKING DEMO: Finding WiFi Hotspots on the Internet
 
Locating WiFi Hotpots on your iPhone/iTouch/iPad
 

Re-Association Requests
 
De-Authentication Attacks
 
Countermeasures against War Driving
 
Wireless Data Sniffers
 
HACKING DEMO: Wireless Data Sniffers
 
How are Wireless Connections Established?
 
MAC Filtering Attacks
 
DOS Attacks against Wireless Networks
 
WEP Security Loopholes
 
Cracking WEP, WPA, WPA2: Tools
 
ARP Request Relay Attack
 
Fake Authentication Attack
 
Cracking WEP Keys
 
Caffe Latte Attack
 
Improvements in WPA over WEP
 
Cracking WPA & WPA2
 
Recovering WEP & WPA Keys from Local Machine
 
HACKING DEMO: Recovering WEP & WPA Keys from Local Machine
 
Computer Forensics
 
Honeypots
 
Batch File Programming
Viruses Torn Apart 
Penetration Testing & Vulnerability Assessment
 
Penetration Testing & Vulnerability Assessment Part 2
 
Investigating Cyber Crimes
 
Intrusion Detection Systems
 
Intrusion Prevention Systems
 
Bluetooth Security: Hacking Mobile Phones
 
Software Hacking
 
Protecting CDs and DVDs
 
Backtrack
 
Lab Session 4

Happy Practices.

No comments:

Post a Comment