Skip to main content

Learn Ethical Hacking 50+ Topics

 Learn Ethical Hacking 50+ Topics

Learn Ethical Hacking 50+ Topics
Learn Ethical Hacking 50+ Topics

I am Atul Bhatt
In this tutorial, the learning speed is your choice.
Everything is up to you.
If you are struggling, take a break, or reread the material.
Always make sure you understand all the "Try-it-Yourself" examples.
You can find me at batul9756@gmail.com

1.Concept of Ethical Hacking

What Is Hacking
Types of hacker
Why hackers hack?
Preventions from hacker
Steps Performed by hackers
Working of an Ethical hacker

2.Email Hacking

How Email Works?
Email service protocols
Email spoofing
PHP Mail sending script
Email Spamming
Phishing
Prevention from phishing
Email Tracing
Keystroke loggers
Securing Your Email account

3.Windows Hacking and Security

Security Architecture of Windows…
Windows user account Architecture…
Cracking Windows User Account password
Windows User Account Attack
Counter Measures of Windows Attack
To hide a file behind an image
Make a private folder…
To run net user in Vista and Windows 7
Brute Force Attack
Rainbow table attack
Counter Measures for Windows Attack

4.Trojans in Brief

Knowing the Trojan
Different Types of Trojans
Components of Trojans
Mode of Transmission for Trojans
Detection and Removal of Trojans
Countermeasures for Trojan attacks

5.Attacks on web servers and Security

Introduction to Web Servers.
The Basic Process: How Web servers work
Attacks on Web servers
Web Ripping
Google Hacking
Protecting Your Files from Google
Cross-Site Scripting (XSS)
Directory Traversal Attack
Database Servers
Login Process on the websites
SQL injection
Input validation on the SQL Injection
PHP Injection: Placing PHP backdoors
Directory Access controls
How Attackers Hide Them While Attacking
Types of Proxy Servers

6.Wireless hacking

Wireless Standards
Services provided by Wireless Networks
MAC address filtering
WEP key encryption
Wireless attacks
MAC spoofing
WEP cracking
Countermeasures for Wireless attacks

7.Mobile Hacking – SMS & Call forging

What Does It Involve
Call Spoofing / Forging
SMS Forging
Bluesnarfing

8.Information gathering and Scanning

Why Information gathering?
Reverse IP mapping
Information Gathering Using Search Engine
Detecting ‘live’ systems on the target network
War diallers

9.Sniffers

What are Sniffers?
Defeating Sniffers…
Ant Sniff

10.Linux Hacking

Why Linux?
Scanning Networks
Hacking tool Nmap
Password cracking in Linux
SARA (Security Auditor’s Research Assistant)
Linux Rootkits
Linux Tools: Security Testing tools
Linux Security Countermeasures

SECTION 2:- The Tutorial based hacks and explanation as online.

1.  How to Chat with your friends using MS-DOS

2. How to change your IP address

3. How To fix corrupted XP files

4. Delete an “Undeletable” File / Folder

5. What is Steganography?

6. What Is MD5 Hash & How to Use It?

7. What is Phishing and Its Demo

8. How to view hidden passwords behind asterisk (********)

9. Hacking Orkut Account Using Cookie Stealing

10. Tab Napping A New Phishing Attack

11. How to Check The email is original or Not

12. Hack Facebook account using Facebook hacker

13. What Are Key loggers?

14. How to remove New Folder virus

15. Mobile hack to call your friends From their own Number

16. Get Orkut Scraps on Mobile for free using Google SMS Channel!

17. Internet connection cut-off in LAN/Wi-Fi

18. WEP cracking using Airo Wizard

19. 12 Security tips for online shopping

20. How to check if Your Gmail account is hacked or not

21. Beware of common Internet Scams and Frauds

22. 12 Tips to maintain a virus-free PC

23. 10 Tips for Total Online Security

24. What to do when your Orkut account is hacked

25. Making a computer virus

26. SQL injection for website hacking

27. How a ‘Denial of service’ attack works

28. XSS vulnerability found on YouTube explained

29. Hacking Deep Freeze

30. How to watch security cameras on the internet

31. List of PC file Extensions…

32. Nice List of Windows Shortcuts

33. How to find serial numbers on Google

34. How to create a CON folder in Windows

35. 10 Reasons why PC’s crash you must know…

36. How to use Kaspersky for Lifetime without Patch

37. Disguise as Google Bot to view Hidden Content of a Website

38. How to Download Facebook videos

39. Hack a website by Remote File Inclusion

40. What is CAPTCHA and how it works?

41. Hack Password of any Operating System

42. Windows PowerShell Security in Brief

43. What is Secure Sockets Layers (SSL)?

44. Make a Private folder With your password

45. Making a Trojan using Beast 2.06

46. Hacking yahoo messenger for multi-login

47. 5 Tips to secure your Wi-Fi a connection

48. Upgrade Windows 7 to any higher version

49. World’s top 10 internet hackers of all time

50. The complete History of hacking


Comments

Popular posts from this blog

How to improve Mondays

How to improve Mondays How to improve Mondays If you live your life dragging yourself through Monday you've essentially resented one-seventh of your life you’ve written off one a year out of every seven before it's even begun to remember Mondays are really like any other day they aren't actually cursed anomaly babies are born on Mondays people to celebrate birthdays and anniversaries and people win the lottery on this dastardly day's Mon day isn't by nature an unlucky orbed day it shouldn't be confined to the naughty corner just for being the start of thereon that point until the end for a very surprising fact about the first day of the week.  Number one end off on a good note to make the start easier think of Friday as the start of your Monday before you close out your workweek spend some time wrapping up some hard things and clearing the quick items off your to-do list this leaves your mind clear of worry and niggling thoughts on the weekend and ...

Top 5 Space Agencies in the World

The Top 5 Space Agencies In The World The most powerful countries in the entire world are at the very forefront of the greatest air space technologies being invented by humans to Pursued space research and exploration and while aerospace technology used to be limited to only a few countries over the years the scenario has changed like a lot many ambitious nations are investing in elaborate space Exploration programs to ensure that other nations don't dominate over them So in this Blog of Geeksmafia I'm taking a look at the top five space agencies in the entire world How's it going? Everybody? My name is Atul Bhatt and this is Geeks Mafia blog where we talk about the different people countries and cultures from all around the world and We're diving into space again. We haven't spoken about space in a very long time. Well not exactly About space but things involving space because we're looking at the space agencies I think I said space so many times in tha...

Python Programming Notes

Python Programming Notes Hello guys and Welcome to Python Programming tutorials by Atul Bhatt.  Today in this blog we are discussing what exactly python is?  If you want to purchase the Python Notes for Start your Python Journey. Click Here Python Programming 520 Slide Notes, and Discuss Data science Introduction. If you purchase the notes I will mail you notes PDF in under 3 hours. Contact at batul9756@gmail.com. Our world is changing.  We're not alone anymore.  We work with new intelligence.  We have the technology.  Machines work faster than we do. They don't sleep. They don't make mistakes.  I can talk to machines. I tell them what to do. I speak their language. I code Why we need to study that?  What are the features of python and allottable are discussing about introduction part of python programming language? In the introduction part first, let us discuss the history of python programmin...

Most Evil and Dangerous Places in the World?

Most Evil and Dangerous Places in the World? Let’s imagine you were around in the late16th in the Kingdom of Hungary. You’re not exactly from a family with wealth and so when your parents receive a letter from a grand noblewoman by the name of Elizabeth Bather, they feel extremely honored. What could such a well-respected and rich woman want from your peasant family your parents wonder at first, and then on reading the letter they discover that Elizabeth is looking out for the poor and just wants to teach you, their son, some etiquette. Overjoyed by this incredible offer, your parents send you off to the great Factice Castle. What you and your parents don’t know is that they’ve just sent you to a castle we can rightly call one of the evilest places in the world.  5. Factice Castle  After hearing what happened there you might think nothing tops it in the realms of evil, but we can assure you that there have been worse places. Elizabeth Bather didn’t have a very ni...

How Rich is Kim Jong-un

How Rich is Kim Jong-un How rich Kim Jong Un actually is, and how North Korea’s Dear Leader really spends his fortune. The secretive nation of North Korea is home to twenty-five million citizens who, for the most part, live in extreme poverty and isolation. The average North Korean only earns around two-thousand dollars a year, and it’s estimated that upwards of forty percent of the population is severely undernourished. It’s no secret that Kim Jong-UN is the richest man in North Korea, but exactly how rich is he? Well, that’s a difficult question to answer. North Korea is often referred to as the Hermit Kingdom because of how isolated and cut-off from the rest of the world the country is. The leaders of North Korea control every detail of their citizen’s lives, including the media and internet access, so getting accurate information about the secretive country is difficult, to say the least. No official estimates of Kim Jong Urn’s wealth exist, so he was excluded from the ...