• Certified Ethical Hacking Course

      Certified Ethical Hacking Course


     Information Gathering And Scanning 

    1:-Network mapping

     =>NMAP
    =>N-Ping
    =>Harvestor
    =>DNS ENUM
    =>Fiers DNS Enumeration

    The World needs You

    2:-Determining Network Range
    3:-Identifying Active machine
    4:-Finding open ports
    5:-Service Finger Printing
    6:-OS Finger Printing
    7:-Threat Assessment With Maltego

              Attack 

    1:-Three Way Handshake
    2:-Wi-fi Crack with WEP protection
    3:-Wi-fi Crack with PSK,PSK-2 and Other protection using Brute Force
    4:-Phising using wi-fi network
    5:-DNS spoofing
    6:-Sniffing using cain and abel
    7:-DDos attack(Networks Attack)
    8:-DDos attack(Devices)
    9:-Cracking Android Security
    10:-Zero Day Attack
    11:-Heart Bleed Attack
    12:-Shikata ga - nai
    13:-Cracking Windows Security
    14:-Attacks Using Python Script
    15:-Attack Vector using Android Devices

      

                Finding Vulnerability 

    1:-Using NESSUS (Exploiting vulnerability in Big Data Server)
    2:-Using NEXPOSE (Exploiting vulnerability on honneypot data servers)
    3:-Accunetix
    4:- Exploiting Small server using android device

        R & D  (research and development) 


    {git-hub}


  • 1 comment:

    1. I really enjoyed while reading your article, the information you have mentioned in this post was damn good. Keep sharing your blog with updated and useful information.
      Read more about ceh training india, ethical hacking institute in delhi

      ReplyDelete