Skip to main content

Learn Ethical Hacking 50+ Topics

 Learn Ethical Hacking 50+ Topics

Learn Ethical Hacking 50+ Topics
Learn Ethical Hacking 50+ Topics

I am Atul Bhatt
In this tutorial, the learning speed is your choice.
Everything is up to you.
If you are struggling, take a break, or reread the material.
Always make sure you understand all the "Try-it-Yourself" examples.
You can find me at batul9756@gmail.com

1.Concept of Ethical Hacking

What Is Hacking
Types of hacker
Why hackers hack?
Preventions from hacker
Steps Performed by hackers
Working of an Ethical hacker

2.Email Hacking

How Email Works?
Email service protocols
Email spoofing
PHP Mail sending script
Email Spamming
Phishing
Prevention from phishing
Email Tracing
Keystroke loggers
Securing Your Email account

3.Windows Hacking and Security

Security Architecture of Windows…
Windows user account Architecture…
Cracking Windows User Account password
Windows User Account Attack
Counter Measures of Windows Attack
To hide a file behind an image
Make a private folder…
To run net user in Vista and Windows 7
Brute Force Attack
Rainbow table attack
Counter Measures for Windows Attack

4.Trojans in Brief

Knowing the Trojan
Different Types of Trojans
Components of Trojans
Mode of Transmission for Trojans
Detection and Removal of Trojans
Countermeasures for Trojan attacks

5.Attacks on web servers and Security

Introduction to Web Servers.
The Basic Process: How Web servers work
Attacks on Web servers
Web Ripping
Google Hacking
Protecting Your Files from Google
Cross-Site Scripting (XSS)
Directory Traversal Attack
Database Servers
Login Process on the websites
SQL injection
Input validation on the SQL Injection
PHP Injection: Placing PHP backdoors
Directory Access controls
How Attackers Hide Them While Attacking
Types of Proxy Servers

6.Wireless hacking

Wireless Standards
Services provided by Wireless Networks
MAC address filtering
WEP key encryption
Wireless attacks
MAC spoofing
WEP cracking
Countermeasures for Wireless attacks

7.Mobile Hacking – SMS & Call forging

What Does It Involve
Call Spoofing / Forging
SMS Forging
Bluesnarfing

8.Information gathering and Scanning

Why Information gathering?
Reverse IP mapping
Information Gathering Using Search Engine
Detecting ‘live’ systems on the target network
War diallers

9.Sniffers

What are Sniffers?
Defeating Sniffers…
Ant Sniff

10.Linux Hacking

Why Linux?
Scanning Networks
Hacking tool Nmap
Password cracking in Linux
SARA (Security Auditor’s Research Assistant)
Linux Rootkits
Linux Tools: Security Testing tools
Linux Security Countermeasures

SECTION 2:- The Tutorial based hacks and explanation as online.

1.  How to Chat with your friends using MS-DOS

2. How to change your IP address

3. How To fix corrupted XP files

4. Delete an “Undeletable” File / Folder

5. What is Steganography?

6. What Is MD5 Hash & How to Use It?

7. What is Phishing and Its Demo

8. How to view hidden passwords behind asterisk (********)

9. Hacking Orkut Account Using Cookie Stealing

10. Tab Napping A New Phishing Attack

11. How to Check The email is original or Not

12. Hack Facebook account using Facebook hacker

13. What Are Key loggers?

14. How to remove New Folder virus

15. Mobile hack to call your friends From their own Number

16. Get Orkut Scraps on Mobile for free using Google SMS Channel!

17. Internet connection cut-off in LAN/Wi-Fi

18. WEP cracking using Airo Wizard

19. 12 Security tips for online shopping

20. How to check if Your Gmail account is hacked or not

21. Beware of common Internet Scams and Frauds

22. 12 Tips to maintain a virus-free PC

23. 10 Tips for Total Online Security

24. What to do when your Orkut account is hacked

25. Making a computer virus

26. SQL injection for website hacking

27. How a ‘Denial of service’ attack works

28. XSS vulnerability found on YouTube explained

29. Hacking Deep Freeze

30. How to watch security cameras on the internet

31. List of PC file Extensions…

32. Nice List of Windows Shortcuts

33. How to find serial numbers on Google

34. How to create a CON folder in Windows

35. 10 Reasons why PC’s crash you must know…

36. How to use Kaspersky for Lifetime without Patch

37. Disguise as Google Bot to view Hidden Content of a Website

38. How to Download Facebook videos

39. Hack a website by Remote File Inclusion

40. What is CAPTCHA and how it works?

41. Hack Password of any Operating System

42. Windows PowerShell Security in Brief

43. What is Secure Sockets Layers (SSL)?

44. Make a Private folder With your password

45. Making a Trojan using Beast 2.06

46. Hacking yahoo messenger for multi-login

47. 5 Tips to secure your Wi-Fi a connection

48. Upgrade Windows 7 to any higher version

49. World’s top 10 internet hackers of all time

50. The complete History of hacking


Comments

Popular posts from this blog

Why You Should Never Visit The Dark Web?

Why You Should Never Visit The Dark Web?  Why You Should Never Visit The Dark Web? We’ve been through this in other shows so we’ll make it short, and we are talking about what the dark web actually is. You see, the internet as most of us know it, the bit you are using right now, is only a small part of the web. Sources don’t agree on how much, but it’s said the part of the web that we can access using ordinary browsers is only about 10 percent of the entire thing. You can also find sources that say it’s four percent or even one percent. Still, it’s thought there are about 1.8 billion active websites on the net, although, again, you can find sources that give a different number – much higher sometimes. This doesn’t of course mean that the rest of the web is the dark web and full of dark marketplaces, otherwise, we might have cause for concern. What it means is that the rest of the web, which we call the deep web, is used by private companies, governments, etc. It is invisible to

Most Evil and Dangerous Places in the World?

Most Evil and Dangerous Places in the World? Let’s imagine you were around in the late16th in the Kingdom of Hungary. You’re not exactly from a family with wealth and so when your parents receive a letter from a grand noblewoman by the name of Elizabeth Bather, they feel extremely honored. What could such a well-respected and rich woman want from your peasant family your parents wonder at first, and then on reading the letter they discover that Elizabeth is looking out for the poor and just wants to teach you, their son, some etiquette. Overjoyed by this incredible offer, your parents send you off to the great Factice Castle. What you and your parents don’t know is that they’ve just sent you to a castle we can rightly call one of the evilest places in the world.  5. Factice Castle  After hearing what happened there you might think nothing tops it in the realms of evil, but we can assure you that there have been worse places. Elizabeth Bather didn’t have a very nice childh

Donald Trump and Narendra Modi use Data Science to Win Election?

Donald Trump and Narendra Modi use Data Science to Win Election Donald Trump and Narendra Modi use Data Science to Win Election We turn now to new allegations about a data firm tied to president trump's 2016 presidential election. The firm is called Cambridge- Analytica. And on Friday, Facebook suspended its parent company. The reason given by Facebook: it said Cambridge Analytica lied when it said it had deleted information about several 100,000 users. But multiple reports, including an investigation by channel-4 in the a.m., suggest that the scope of what happened here is far broader. A former research director for Cambridge Analytica has come forward to say that the firm harvested data from more than 50 million Facebook users. Cambridge-Analytica denies that it violated fakebook’s rules and says it legally uses the data it collects to create detailed profiles that are then sold to third parties. You know, Cambridge Analytica, it may not be a surprise to find out, is a

Python Programming Notes

Python Programming Notes Hello guys and Welcome to Python Programming tutorials by Atul Bhatt.  Today in this blog we are discussing what exactly python is?  If you want to purchase the Python Notes for Start your Python Journey. Click Here Python Programming 520 Slide Notes, and Discuss Data science Introduction. If you purchase the notes I will mail you notes PDF in under 3 hours. Contact at batul9756@gmail.com. Our world is changing.  We're not alone anymore.  We work with new intelligence.  We have the technology.  Machines work faster than we do. They don't sleep. They don't make mistakes.  I can talk to machines. I tell them what to do. I speak their language. I code Why we need to study that?  What are the features of python and allottable are discussing about introduction part of python programming language? In the introduction part first, let us discuss the history of python programming language. Python was created a

Top 5 Most Powerful Politicians

Top 5 Most Powerful Politicians In The World To be an effective politician you  have a a certain level of toughness and Ability to make wise judgment calls sometimes with little to no time from thought to action This, of course, is magnified when you take it to the scale of leading a nation There's a lot of power that comes with being a world leader and in this blog of geeks mafia I'm looking at the top five most powerful politicians in the world. Hey everyone. How's it going? My name is Atul Bhatt and thanks for reading another blog of Geeks Mafia And we're looking at some politicians here If you're watching this and you enjoy politics share the post with your friends And if you're a newcomer here to have to be facts Bookmark the site and not miss any future blog and a a question I'm gonna throw up for you today before I get into this blog is who was or is your favorite politician? And why sound off in the comments section down below? Okay. So in t

What Happens After You Die?

What Happens After You Die? What Happens After You Die? Death is an inevitable consequence of living, and someday we will all reach the end of the road, breath our final breath, and find ourselves six feet under. There are many theories on what happens afterward and where we end up, but one thing science can tell us for sure, is what happens to outbidders it just slowly decay away and become part of the earth, or do strange things continue to go on as if we were still alive? That’s what we’ll find out today, in this episode of The Infographics Show: Your Body After You Die. Most of us would rather not think about what happens to our bodies after we die. In the west, when someone dies, there is usually a traditional funeral so friends and family can say goodbye and get a sense of closure. A mortician will embalm the body as a way of slowing down the decomposition process, so that family members can remember their loved one as they once were. For some, the end is less dignified;