MODULES IN ETHICAL HACKING

MODULES IN ETHICAL HACKING:
  1. Introduction to ETHICAL HACKING
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffing
  9. Social Engineering
  10. Denail of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Platforms
  16. Hacking Mobile Platforms
  17. Evading IDS, Firewalls and Honeypots
  18. Buffer Overflow
  19. Cryptography
  20. Penetration Testing
Footprinting & Reconniassance:
Footprinting refers to uncovering and collecting information as much as possible, regarding a target network. Using the ping utility, nslookup, web data extractor,HTTract Website copier tools etc.

Scanning Network::
Scanning Network refers to a set of procedures for identifing hosts, ports and services running in a network. Using Advanced IPScanner, Nmap, Nessus tool etc.

Enumeration:
Enumeration is the process of extracting usernames, machine names, network resources, shares and services form a system. Enumeration is conducted in an internet environment. Using SuperScan tool, Solarwinds Toolset.

System Hacking:
System Hacking is the science of testing computers and networks for vulnerabilities and plugins. this can be done using Link Control Protocol, Rainbow crack, LOphtCrack, Steganography using Quick Stego.

Trojans & Backdoors:
A Trojan is a program that contains a malicious or harmful code inside apperently harmless programming or data in such a way that it can get control and cause damage such as ruining a file allocation table as a hard drive.

Viruses and Worms:
A Virus is a self-replicating program that produces its own code by attaching copies of it onto other executable codes. Some Viruses affect computers as soon as their codes are executed: others lie dormant until the predetermined logical circumstance is met.

Sniffing:
A Packet sniffer is a type of program that monitors any bit of information entering or leaving a network. It is a type of plug-and-play wiretap device attached to a computer that eavesdrops on network traffic.

Social Engineering:
Social Engineering is the art of convincing people to reveal confidential information.

Denail of Service:
Denail of Service (DOS) is an attack on a computer or network that prevents legitimate use of its resources.

Session Hijacking:
Session Hijacking refers to the exploitation of a vital computer session, where in an attacker take over a session between two computers.

Hacking Webservers:
A Webserver which can be referred to as the hardware, the computer or the software, is the computer application that helps to deliver content that can be accused through the internet.

Hacking Web Applications:
Hacking web applications refers to carrying out unauthorized access to a website or website details.

SQL Injection:
SQL Injection is a technique often used to attack a website. It is the most common website vulnerability on the internet.

Hacking wireless networks:
Wi-Fi is developed on IEEE 802.11 standards and is widely used in wireless communication. It provides wireless access to application and data access to radio network.

Evading IDS Firewalls and Honeypots;
ANy Intrusion Detection System(IDS) is a device or software application that monitors network and/orn system activities for malicious activities or policy violations and reports to a network to a Management station

Buffer Overflow:
In a buffer overflow; while writing data to a buffer, the buffer's boundary is overrun and adjacent memory is overwritten.

Cryptography:
Cryptography is the study and art of hiding information in human unreadable format.

2 comments:

  1. Thanks for sharing this informative blog.. Your information related to hacking is really useful for me. Keep posting..

    Regards..
    Hacking Course in Chennai

    ReplyDelete
  2. hanks for sharing this informative blog.. Your information related to hacking is really useful for me. Keep posting..

    Regards..
    Hacking Course in Chennai

    ReplyDelete

© 2013-2022 AppsWindoW. All rights reserved, the content is copyrighted to AppsWindoW (MK)