Chapter 1 : Concept of Ethical Hacking - What Is Hacking - Types of hacker - Why hackers hack? - Prevention's from hacker - Steps Performed by hackers - Working of an Ethical hacker
Chapter 2 : Email Hacking - How Email Works? - Email service protocols - Email spoofing - PHP Mail sending script - Email Spamming - Phishing - Prevention from phishing - Email Tracing - Keystroke loggers - Securing Your Email account
Chapter 3 : Windows Hacking and Security - Security Architecture of Windows - Windows user account Architecture - Cracking Windows User Account password - Windows User Account Attack - Counter Measures of Windows Attack - Brute Force Attack - Rainbow table attack
Chapter 4 : Trojans In Brief - Knowing the Trojan - Different Types of Trojans - Components of Trojans - Some famous Trojans - Reverse Connection in Trojans - Detection and Removal of Trojans - Countermeasures for Trojan attacks
Chapter 5 : Attacks on web servers and security - Introduction to Web Servers - The Basic Process: How Web servers work - Attacks on Web servers - Web Ripping - Google Hacking - Protecting Your Files from Google - Cross Site scripting (XSS) - Directory Traversal Attack - Database Servers - Login Process on the websites - SQL injection - Input validation on the SQL Injection - PHP Injection: Placing PHP backdoors - Directory Access controls - How Attackers Hide Them While Attacking - Types of Proxy Servers
0 comments:
Post a Comment