Skip to main content

Learn Ethical Hacking 50+ Topics

 Learn Ethical Hacking 50+ Topics

Learn Ethical Hacking 50+ Topics
Learn Ethical Hacking 50+ Topics

I am Atul Bhatt
In this tutorial, the learning speed is your choice.
Everything is up to you.
If you are struggling, take a break, or reread the material.
Always make sure you understand all the "Try-it-Yourself" examples.
You can find me at batul9756@gmail.com

1.Concept of Ethical Hacking

What Is Hacking
Types of hacker
Why hackers hack?
Preventions from hacker
Steps Performed by hackers
Working of an Ethical hacker

2.Email Hacking

How Email Works?
Email service protocols
Email spoofing
PHP Mail sending script
Email Spamming
Phishing
Prevention from phishing
Email Tracing
Keystroke loggers
Securing Your Email account

3.Windows Hacking and Security

Security Architecture of Windows…
Windows user account Architecture…
Cracking Windows User Account password
Windows User Account Attack
Counter Measures of Windows Attack
To hide a file behind an image
Make a private folder…
To run net user in Vista and Windows 7
Brute Force Attack
Rainbow table attack
Counter Measures for Windows Attack

4.Trojans in Brief

Knowing the Trojan
Different Types of Trojans
Components of Trojans
Mode of Transmission for Trojans
Detection and Removal of Trojans
Countermeasures for Trojan attacks

5.Attacks on web servers and Security

Introduction to Web Servers.
The Basic Process: How Web servers work
Attacks on Web servers
Web Ripping
Google Hacking
Protecting Your Files from Google
Cross-Site Scripting (XSS)
Directory Traversal Attack
Database Servers
Login Process on the websites
SQL injection
Input validation on the SQL Injection
PHP Injection: Placing PHP backdoors
Directory Access controls
How Attackers Hide Them While Attacking
Types of Proxy Servers

6.Wireless hacking

Wireless Standards
Services provided by Wireless Networks
MAC address filtering
WEP key encryption
Wireless attacks
MAC spoofing
WEP cracking
Countermeasures for Wireless attacks

7.Mobile Hacking – SMS & Call forging

What Does It Involve
Call Spoofing / Forging
SMS Forging
Bluesnarfing

8.Information gathering and Scanning

Why Information gathering?
Reverse IP mapping
Information Gathering Using Search Engine
Detecting ‘live’ systems on the target network
War diallers

9.Sniffers

What are Sniffers?
Defeating Sniffers…
Ant Sniff

10.Linux Hacking

Why Linux?
Scanning Networks
Hacking tool Nmap
Password cracking in Linux
SARA (Security Auditor’s Research Assistant)
Linux Rootkits
Linux Tools: Security Testing tools
Linux Security Countermeasures

SECTION 2:- The Tutorial based hacks and explanation as online.

1.  How to Chat with your friends using MS-DOS

2. How to change your IP address

3. How To fix corrupted XP files

4. Delete an “Undeletable” File / Folder

5. What is Steganography?

6. What Is MD5 Hash & How to Use It?

7. What is Phishing and Its Demo

8. How to view hidden passwords behind asterisk (********)

9. Hacking Orkut Account Using Cookie Stealing

10. Tab Napping A New Phishing Attack

11. How to Check The email is original or Not

12. Hack Facebook account using Facebook hacker

13. What Are Key loggers?

14. How to remove New Folder virus

15. Mobile hack to call your friends From their own Number

16. Get Orkut Scraps on Mobile for free using Google SMS Channel!

17. Internet connection cut-off in LAN/Wi-Fi

18. WEP cracking using Airo Wizard

19. 12 Security tips for online shopping

20. How to check if Your Gmail account is hacked or not

21. Beware of common Internet Scams and Frauds

22. 12 Tips to maintain a virus-free PC

23. 10 Tips for Total Online Security

24. What to do when your Orkut account is hacked

25. Making a computer virus

26. SQL injection for website hacking

27. How a ‘Denial of service’ attack works

28. XSS vulnerability found on YouTube explained

29. Hacking Deep Freeze

30. How to watch security cameras on the internet

31. List of PC file Extensions…

32. Nice List of Windows Shortcuts

33. How to find serial numbers on Google

34. How to create a CON folder in Windows

35. 10 Reasons why PC’s crash you must know…

36. How to use Kaspersky for Lifetime without Patch

37. Disguise as Google Bot to view Hidden Content of a Website

38. How to Download Facebook videos

39. Hack a website by Remote File Inclusion

40. What is CAPTCHA and how it works?

41. Hack Password of any Operating System

42. Windows PowerShell Security in Brief

43. What is Secure Sockets Layers (SSL)?

44. Make a Private folder With your password

45. Making a Trojan using Beast 2.06

46. Hacking yahoo messenger for multi-login

47. 5 Tips to secure your Wi-Fi a connection

48. Upgrade Windows 7 to any higher version

49. World’s top 10 internet hackers of all time

50. The complete History of hacking


Comments

Popular posts from this blog

Top 5 Space Agencies in the World

The Top 5 Space Agencies In The World The most powerful countries in the entire world are at the very forefront of the greatest air space technologies being invented by humans to Pursued space research and exploration and while aerospace technology used to be limited to only a few countries over the years the scenario has changed like a lot many ambitious nations are investing in elaborate space Exploration programs to ensure that other nations don't dominate over them So in this Blog of Geeksmafia I'm taking a look at the top five space agencies in the entire world How's it going? Everybody? My name is Atul Bhatt and this is Geeks Mafia blog where we talk about the different people countries and cultures from all around the world and We're diving into space again. We haven't spoken about space in a very long time. Well not exactly About space but things involving space because we're looking at the space agencies I think I said space so many times in tha...

Python Programming Notes

Python Programming Notes Hello guys and Welcome to Python Programming tutorials by Atul Bhatt.  Today in this blog we are discussing what exactly python is?  If you want to purchase the Python Notes for Start your Python Journey. Click Here Python Programming 520 Slide Notes, and Discuss Data science Introduction. If you purchase the notes I will mail you notes PDF in under 3 hours. Contact at batul9756@gmail.com. Our world is changing.  We're not alone anymore.  We work with new intelligence.  We have the technology.  Machines work faster than we do. They don't sleep. They don't make mistakes.  I can talk to machines. I tell them what to do. I speak their language. I code Why we need to study that?  What are the features of python and allottable are discussing about introduction part of python programming language? In the introduction part first, let us discuss the history of python programmin...

How Will Life Change After COVID-19

How Will Life Change After COVID-19 How Will Life Change After COVID-19 Life will never be the same crisis happened to push us on another path we have been having an enormous and blind trust towards the the globalized world this simply changes after billions of people are under lockdown for weeks we will not be able to travel debt Philly or enjoy the supply chains of the verge so easily so sustainability solidarity and healthcare will finally take center stage that will be changed at every level of our lives maybe we should forget about handshakes forever maybe we will see people very masks everywhere and it will unintentionally keep our distance and be more cautious around or elderly you have it to the rise from properly washing your hands to better overall hygiene and to entirely new travel habits first of all its possible that while univ starts to recover the US will still yet to reach the peak the devastation of copied 19 will vary from country to the country so our global...

How to improve Mondays

How to improve Mondays How to improve Mondays If you live your life dragging yourself through Monday you've essentially resented one-seventh of your life you’ve written off one a year out of every seven before it's even begun to remember Mondays are really like any other day they aren't actually cursed anomaly babies are born on Mondays people to celebrate birthdays and anniversaries and people win the lottery on this dastardly day's Mon day isn't by nature an unlucky orbed day it shouldn't be confined to the naughty corner just for being the start of thereon that point until the end for a very surprising fact about the first day of the week.  Number one end off on a good note to make the start easier think of Friday as the start of your Monday before you close out your workweek spend some time wrapping up some hard things and clearing the quick items off your to-do list this leaves your mind clear of worry and niggling thoughts on the weekend and ...

Most Expensive House In The World

The Most Expensive House In The World The Most Expensive House In The World The most expensive home on the planet in the inner city of Mumbai India not far from the poverty-stricken slums on the renowned Altamont road stands Antileather most expensive home ever created this home ascends 27 stories stretching568 feet high granting the massive structure with prime views of the Arabian Sea in technical terms, the home is the second most expensive residential property in the world considering Buckingham Palaces worth around five billion u.s. dollars however Buckingham Palace is considered the crown property whereas Antlia is a private residence and the most expensive private the residential property at that with some pricing estimates as high as two billion dollars even still any listen which a residence is preceded by Buckingham Palace pretty much guarantees that place is going to be over-the-top luxurious and is likely a house I'd love to move into in this video I'll tak...