• 9849-xxx-xxx
  • noreply@example.com
  • Tyagal, Patan, Lalitpur

Certified Ethical Hacking Course in Chandigarh

Ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch “infrastructure” attacks. Practical exercises reinforce theory as you experiment with a Windows 2008 domain (server and workstation) plus a Linux server.

Certified Ethical Hacker Training Course Chandigarh, Mohali and Panchkula.

Chandigarh institute demonstrates hacking techniques – there’s no better way to understand attacks than by doing them yourself – but this is always done with defence in mind and countermeasures are discussed throughout.

Ethical Hacking Course Syllabus:

  1. Networking Refresher
    1. Sniffing Traffic – Wireshark, Ettercap
  2. Information Discovery
    1. Information Gathering – wget, metadata, pdfinfo and extract
    2. DNS – dig, zone transfers, DNSenum and Fierce
  3. Target Scanning
    1. Host Discovery – Nmap and Netdiscover
    2. Port Scanning with Nmap – Connect, SYN and UDP scans, OS detection
    3. Banner Grabbing – Amap, Netcat, Nmap, Nmap scripts (NSE)
  4. Vulnerability Assessment
    1. Nikto
    2. Nessus
  5. Attacking Windows
    1. Windows Enumeration – net commands, Active Directory searches
    2. Enum4linux
    3. RID Cycling – Enum4linux, Cain
    4. Metasploit
    5. Client-side Exploits – Internet Explorer, Metasploit Auxiliary modules
  6. Privilege Escalation – Windows
    1. Information Gathering with Meterpreter – Stuxnet exploit, Meterpreter scripts
    2. Privilege Escalation – Keylogging
    3. Privilege Escalation exploit – Meterpreter’s hashdump, privileged keylogging
    4. Password Cracking with John The Ripper
    5. Password Cracking with Cain – fgdump, tailoring dictionaries
    6. Brute-Force Password Attacks
    7. Password Cracking with Rainbow Tables – Ophcrack Live CD, Ophcrack application
    8. Attacks on Cached Domain Credentials
    9. Token Stealing – PsExec, Incognito, local admin to domain admin
    10. Pass the Hash
  7. Attacking Linux
    1. Exploiting Linux
    2. Pivoting the Attack
    3. Online Password Cracking – Medusa
    4. ARP Poisoning Man in the Middle – clear-text protocols, secured protocols
  8. Privilege Escalation – Linux
    1. Privilege Escalation – standalone exploit
    2. Cracking UNIX Passwords – John The Ripper
    3. Exploiting sudo through File Permissions
    4. Exploiting SUID and Flawed Scripts – logic errors
    5. Further Shell Script Flaws – command injection, path exploits
  9. Retaining Access
    1. Netcat as a Backdoor (via a Java Exploit)
    2. Bandook RAT (via a PDF Exploit) – Metasploit Handlers, a full end-to-end attack
    1. Covering Tracks
    2. Simple Obfuscation
    3. HXD Rootkit
    4. Log Manipulation – wevtutil, Meterpreter scripts, audit policy

    Who Can Join this course:

    The course is therefore suited to:

    • System administrators
    • IT security officers
    • Budding penetration testers.

Leave a Reply

Your email address will not be published. Required fields are marked *