0 ratings 0% found this document useful (0 votes) 369 views 11 pages Advance Ethical Hacking-1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Advance Ethical Hacking-1 For Later 7) ra ala —
We Are Offering a Complete Course Of
ST eae EL
PAKISTAN’S NO: 1
IT TRAINING INSTITUTEDiversity And Inclusion Of Thought,
Skill, Knowledge, And Culture Make
ZAFF Institute Of It Trainings More
Competitive, More Resilient, And Better.
Diversity Strengthens Us By Promoting
Unique Viewpoints And Challenging
Each Of Us, Every Day, To Think Beyond
Our Traditional Frames Of Reference.
We Are Committed To Building A
Talented And Diverse Workforce, And
To Creating An Environment In Which
Every Student Has The Opportunity To
Excel Based On His Or Her Performance.
We Believe The Best Way To Learn Is To
Put Your Skills To Use. | Warmly
Welcome You To Visit By Contacting Us,
And Discover Firsthand What Makes
ZAFF Institute Of It Trainings Special.
0300 123 9233 :: 0300 864 2249ABOUT US
ZAFF Institue is the first choice of students who want to excel
themself in the field of Internet Marketing. ZAFF Institue con-
sists of Top Level Trainers who are adept in the fields of Internet
Marketing. We are the pi-oneer institute that started compre-
hensive Training for the benefit of students. Since our launch,
hundreds of students are trained who secured good jobs in the
expanding IT industry as we all know. Contact us and secure
your seat for upcoming training, events, and seminars.
fv
—_
100+ 50+
IT COURSES STUDENTS CONNECTED INSTRUCTORS
WE OFFERS
os ex f
Development Marketing Art& Design Multimedia Networking & Busniess & Accounts Languages
Cyber Security
© 0300 123 9233 :: 0300 864 2249ZAFF
ete aa es}
SALIENT FEATURES
Follow-Up Sessions
Practical learning Internships/Jobs
Opportunities
O :
Ls
‘2
Learning Management System. Expert Mentorship
© 0300 123 9233 :: 0300 864 2249ZAFF
aN er}
THE COMPLETE B Build your hacking environment!
:: Updates: How to install VirtualBox
ETHICAL HACKING on Fedora 22 + Kali Sana VM
(OPTIONAL )
COURSE :: What is Tor? How can you use it to
protect your anonymity online?
BEGINNER TO ADVANCED ®* What is a Virtual Private Network
(VPN) and how you can stay
= anonymous with VPN?
: Basic Hacking Terms You Will : Footprinting with Nmap and
Want To Know Getting Started external resources.
:: How to create a bootable USB of = Attacking wireless networks.
Kali Linux ( optional ) Overview of the tools.
: Linux Terminal including basic : Signal jamming and denial of service.
functionalities and CLI. : Evil twin method! Clone wireless
x ProxyChains for using proxy access points to steal data.
servers, hiding your ip, and : DNS setting hacking to redirect
obtaining access. users with post authentication
: What is a macchanger? How can exploitation
you use it to change your mac : forcing methods for cracking
address? passwords.
: Breaking WPA/WPA2 encryption. —_: Reverse shells. Gain remote control
Wifi hacking and wifi hacker of any device!
training.
: SSL strips.
Let's have a bit of fun!
: Attacking routers to give you free
reign over the entire network! BUILD YOUR
: Website attacks with SQL
Ictions. DREAMS
: Denial of Service (DoS) attacks WITH ZAFF INSTITUTE
demonstrated and explained.
: Make your own Keylogger in C++
© 0300 123 9233 :: 0300 864 2249ZAFF
te uO ec}
HACKING LAB
In This Section We Are Building
Our Own Lab Where We Can
Perform Our Attacks (You Will Be
Able To Use Your Mac, Windows,
Linux Operating Systems Don't
Worry!). What This Lab Essentially
Is, Is A Virtual Machine That We
Will Use For Hacking (Kali Linux)
And Throughout The Course We
Also Create Additional Virtual
*vulnerable* Machines That We
Can Practice Our Attacks On. The
Reason We Use Virtual Machines
Is Because We Are Not Allowed
To Test Our Attacks On Real Life
Websites And Networks So We
Create Our Own Environment To
Do That.
: Downloading Virtual Box & Kali
Linux
: Creating Our First Virtual Machine
: Installing Kali Linux Operating
System
: 5 Stages Of A Penetration Test
:: Navigating Through Kali Linux
System
:: Creating Files & Managing
Directories
: Network Commands & Sudo.
Privileges In Kali
OPTIONAL: PYTHON 101
Learn Python 3 Programming
From Scratch. This Section Is Not
Mandatory And Is Optional For
Those That Want To Learn To Pro-
gramming So You Are Able To
Build Your Own Ethical Hacking
Tools!
: Learn Python Basics
Learn Python Intermediate
Learn Python: Error Handling
:: Learn Python: File I/O
RECONNAISSANCE
Here We Learn What We Call Foot-
printing, Or In Other Words, Infor-
mation Gathering. Once We
Choose Our Target, Our First Task
Is To Gain As Much Information
About The Target As Possible.
: What is Information Gathering ?
: Obtaining IP Address, Physical
Address Using Whois Tool
::) Whatweb Stealthy Scan
: Aggressive Website Technology
Discovering on IP Range
: Gathering Emails Using the
Harvester & Hunterio
: How To Download Tools Online
: Finding Usernames With Sherlock
© 0300 123 9233 :: 0300 864 2249SCANNING
This Is Where Things Get Real. In
This Section, We Also Gather Infor-
mation But We Try To Gather Only
Technical Information (I.E. If They
Have Open Ports, If They Have A
Firewall, What Softwares They Are
Running On Those Open Ports,
What Operating System Do They
Have, Is It An Outdated Operating
System, Etc.).
:: Theory Behind Scanning
TCP & UDP
= Installing Vulnerable Virtual
Machine
: Netdiscover
Performing First Nmap Scan
Different Nmap Scan Types
: Discovering Target Operating
System
: Detecting Version Of Service
Running On An Open Port
: Filtering Port Range & Output Of
Scan Results
= What is a Firewall/IDS ?
: Using Decoys and Packet
Fragmentation
: Security Evasion Nmap Options
Note: Time To Switch Things Up!
: Python Coding Project - Port
Scanner
VULNERABILITY
ANALYSIS
In This Section We Use The Infor-
mation That We Gathered From
Scanning (Such As Softwares That
The Target Has Running On Open
Ports) And With This Information,
We Try To Determine Whether
There Is Any Known Vulnerabili-
ties.
: Finding First Vulnerability With
Nmap Scripts
=: Manual Vulnerability Analysis &
Searchsploit
= Nessus Installation
: Discovering Vulnerabilities With
Nessus
: Scanning Windows 7 Machine
With Nessus
EXPLOITATION & GAINING
ACCESS
This Is The Exciting Part Of The
Course. This Is Where We
Attack And Gain Access To The
Target Machines. Throughout
This Section, We Will Be Covering
Many Different Vulnerabilities
And Different Targets. We Per-
form These Attacks On Our Virtu-
9 0300 123 9233 :: 0300 864 2249ZAFF
SR er}
Machines And Cover Another
Really Important Tool For An Ethi-
cal Hacker: Metasploit Frame-
work. The Goal Of Exploitation Is
To Get On That Target Machine.
This Means We Must Drop A Pay-
load On That Target Machine So
We Can Use It To Navigate
Through Their Systems, Look
Through Their Files,
Execute Anything We Want, And
Delete Anything We Want With-
out The Target Knowing Any-
thing About It. We Will Also Learn
To Create Our Own Viruses And
Trojans That We Can Deliver To
The Target Whether Through An
Email Or Through An Usb.
What is Exploitation ?
What is a Vulnerability ?
Reverse Shells, Bind Shells ..
Metasploit Framework Structure
Msfconsole Basic Commands
: Our First Exploit - vsftp 2.3.4
Exploitation
: Misconfigurations Happen -
Bindshell Exploitation
: Information Disclosure - Telnet
Exploit
: Software Vulnerability - Samba
Exploitation
Attacking SSH - Bruteforce Attack
Exploitation Challenge - 5 Different
Exploits
: Explaining Windows 7 Setup
: Eternal Blue Attack - Windows 7
Exploitation
: DoublePulsar Attack - Windows
Exploit
: BlueKeep Vulnerability - Windows
Exploit
Routersploit
Router Default Credentials
Setting Up Vulnerable Windows 10
:: Crashing Windows 10 Machine
Remotely
:: Exploiting Windows 10 Machine
Remotely
: Generating Basic Payload With
Msfvenom
: Advance Msfvenom Usage
Generating Powershell Payload
Using Veil
: TheFatRat Payload Creation
Hexeditor & Antiviruses
: Making Our Payload Open An
Image
POST EXPLOITATION
This is what comes after Exploita-
tion. Post exploitation is what we
do on the target machine after
we have exploited it. Since we are
on that machine we can do many
things depending on what we
want to get out from it. At the
end, after we do all of the things
© 0300 123 9233 :: O300 864 2249we wanted, we want to make
sure we cover our tracks by delet-
ing any event logs or deleting any
evidence that we were ever on
that machine.
=: Post Exploitation Theory
Meterpreter Basic Commands
: Elevating Privileges With
Different Modules
: Creating Persistence On The
Target System
: Post Exploitation Modules
: Python Coding Project -
Backdoor
WEBSITE PENETRATION
TESTING
This Is Another Big Topic For An
Ethical Hacker. In This
Section, We Are Mainly Targeting
Websites And Their Bugs/vulner-
abilities. These Vulnerabilities
Can Be Anything From Miscon-
figurations, Sql Injections (Us
Interacting With The Database),
Information Disclosures (Having
Access To Some Information By
Mistake Which Shouldn't Be Out
There), Command Injection (Di-
rectly Interacting
: Website Penetration Testing
Theory
: HTTP Request & Response
Information Gathering & Dirb Tool
Burpsuite Configuration
ShellShock Exploitation
Command Injection Exploitation
: Getting Meterpreter Shell With
Command Execution
: Reflected XSS & Cookie Stealing
Stored XSS
HTML Injection
: SQL Injection
CSRF Vulnerability
Hydra Bruteforce Attack
: Burpsuite Intruder
: Python Coding Project - Login
Brute-force + Directory Discovery
MAN IN THE MIDDLE
This Is An Attack That Is Used
Inside A Network. This Allows Us
To Sniff Any Unencrypted Data
And See It In Plain Text. This
Could Also Include Seeing Pass-
words In Plain Text For Some
Websites. There Are Many Tools
Out There That Can Perform This
Attack For Us And We Cover
Some Of The Main Ones In The
Section.
© 0300 123 9233 :: 0300 864 2249: Theory - Man In The Middle
Attack
: Bettercap ARP Spoofing
Ettercap Password Sniffing
: Manually Poisoning Targets ARP
Cache With Scapy
WIFI CRACKING
This is the section where we want
to gain access to a network by
cracking its wireless password.
:: Wireless Cracking Theory
: Putting Wireless Card In Monitor
Mode
: Deauthenticating Devices &
Grabbing Password
: Aircrack Password Cracking
:: Hashcat Password Cracking
SOCIAL ENGINEERING
This is something we cover in
almost every section. Social
Engineering is an attack on
humans since as we know people
are always the weakest security!
0300 123 9233 :: 0300 864 2249whey
50,000+ Alumni :: 100+ Courses :: 85+ MOU Signed
100+ Professional Instructors :: Online Trainings, LMS
JOB & Internship Oppertunity
wk,
1-A, Ahmed Block,
New Garden Town Lahore.
0300 123 9233
0300 864 2249