ICPEH(InjectorCode Professional Ethical Hacker) Module 1 - TopicsExpress



          

ICPEH(InjectorCode Professional Ethical Hacker) Module 1 Computer Hacking Method IT Act/Laws & How to bypass Technology security aspects (Firewall, AV, IPS, IDS) Advance scanning method to find vulnerable application footprinting Scanning PeneTration Testing with top 10 tool Security Auditing Penetration Testing witd Backtrack Use of Netcat Obtaining Access Maintaining Access & Erasing Evidence How to Defect Scanning (IP, Windows, Linux and Mac) and port scanning a site Module 2 How criminals & hackers catches by LEA & Govt. Anonymous Payment processing Buy any item anonymously on internet (Digital currency convert system) Advance way to deposite amount online Send /Receive money anonymously Browsing anonymously (HTTPs Proxies, or 00TOR Network) Make own offshare private VPN, VPS List of free VPN providers Tunneling for anonymity (SSH Tunneling) Advance Encryption Technology PgP Encryption NSA Termonology PGP encryption with Mozilla Thunderbird Advance anonymous privacy using portable solution Russian Technique Design Secure Communication Channel? Learn Advance way of encrypted communication on mobilephone Learn Advance way of vpn on Mobile Learn Advanced way of Encrypted voip service on IPHONE Learn Advanced way of voip dial and receive mobile voice calls that cannot be intercepted. Learn Most Advanced linux base voip Technique Learn Advanced Encrypted Technique for Android user Learn Advanced way of voip encrypted technique for system & Network Learn VOIP RETENTION (for undetectable calling facility) Learn voice recognition. Proxy Chain Covert channel on Phone for secure browsing Design Bulletproof C&C environment (FLUX, FAST FLUX) ,Tun and TAP Module 3 Advanced Malware, Trojans and Backdoors development technology Malware types & attack latest Malware techniques Writing own Trojans, RAT, Key loggers 100% bypass security technique BOTNETS (HTTP & IRC) Tabnabing Overview Design 100% anonymous Command and control Design & Development using source code Ubot, Spyeye Make your own botnet Writing Boot kit, Root kit & Bios Level Root kits Advanced persistent threat (APT) * Distributed malware Avoiding Malware UAC alerts Avoiding Malware reverse engineering Actual Attack Exercise with source code Module 4 Cryptography & Reverse engineering Avoiding Malware Detections-100% FUD Online & offline crypters, SSL hacking & Stenography Module 5 Advance website hacking and security Application & Website attacks Tools for used website hacking Tools for used secure website Types of website hacking attack Advance Sql hacking attack Part1 Part2 Part3 part4 advance XSS attack Wih bypassing method web bypass firewall technique part1 part2 part3 find out vulnerability ssl ,https based website find out vulnerability with secure website Hacking Web Authentication How hackers target and hack your site Make web hackers lab How to prevent web application attacks countermeasure Note:this all tools new for all web security expert and ethicall hacker Countermeasures Module 6 Exploit hacking Advance way of hacking Fuzzing What is spike fuzzing Testing? How to use Fuzzing Creation Kit? How to use SPIKE Scripting Commands? How to use vulnerable server valid command utility? STATS [stat_value] RTIME [rtime_value] LTIME [ltime_value] SRUN [srun_value] TRUN [trun_value] GMON [gmon_value] GDOG [gdog_value] KSTET [kstet_value] GTER [gter_value] HTER [hter_value] LTER [lter_value] KSTAN [lstan_value] EXIT How to generate shellcode and add to calc.exe? How to crash calc.exe application on target machine? How to use ollydebug to extract source code? Define Peach? Exploit Development Metasploit for Exploit development- File based (PDf, RTF, XLS, etc) Browser based Network based FUD payloads & Exploits Custom Encoding, encryption Shell coding Incorporating Custom Shell code Into The Metasploit Framework. Module 7 Network Hacking Basic of networking Make advance network lab for corporate sector and mnc company Scanning and target detection & prevention Sniffing Attacks Session Hijacking DNS Hacking (Advance utility ) DDOS on Email, IP, phone, SMS Python & perl tools for penetration testers design Secure Telecommunication (SIP, Device, mobile) Module 8 New ways for all ethicall hacker and wi-fi penetration tester) Wifi Technology Wi-fi hacking and security Cracking & Securing Wireless Systems Cracking wifi passwords Wifi Hacking & create fake access points Module-9 Overview Cellphone Hacking Top Most Cell Phone Spy Software How Spy Software Work Hack Facebook Twitter Account Password Using Spy Keyloggers Anti Spy Keyloggers Trace your girlfriends or friends mobile live The first 5 way to trace your Girlfriends & Friends through apps and general method. BLUETOOTH HACKING How to send anonymous Fake SMS to your friends How to call your friends with their own number. How to Send/Make TEXT SMS, VOICE SMS & CALLS for FREE Send a Self Deleting SMS Android Hacking Android Exploitatioon Method SMS Bomber Voice encryption mobile phone applet linux based voip service encrypted voice for android Computer base voip encryption service Undetectable Calling Facility Mobile forensic and voice analysis Module 10 Final Attack Overview Planning Spreading ways Local Attacks-Hacking using tennyusb File Based attacks Remote Attacks Overview Ways for different type of Mass level attacks (Iframe, Magazine, and Social eng.) Ways to Send Bulk SMS and Emails, Spread Malware via BOTS, facebooks Man-in-the-browser’ Attack Module-10 IP Grabbing Different Way of IP Grabbing Module 11 Securing Systems & Networks Overview Prevention for Advanced Digital attacks -APT Design Secure own System Prevent outside attacks using VPN & load balancer Tamper Data Advance Search Engine Shadon Utility Design PFSense Firewall network Make your secure lab Module12-Advance Encryption Technology only at Injectorcode Technology Web based email encryption services E-mail clients supporting OpenPGP encryption Software to encrypt emails using GPG/PGP GnuPG GUI front ends encryption PGP public Key servers list Alternative to email encryption #Note-In this course Material all are unique & advance Technique we use. Who should attend:- The course is designed for experienced security consultants,penetration tester, and security professionals with keen interest in real world attack and defence in todays complex. Prerequisite :-First u have sufficient knowledge of ICCEH( InjectorCode Certified Ethical Hacker or CEH from EC Council & ICMFE(InjectorCode Metasploit Framework Expert or Matasploit Framework Expert from SecurityTube): Deliverances by Injectorcode IT Security Training & Services. • Online /Onsite Exam. • Training Certificate. • Project Certificate • PDF And PPT Files. • Extra Software for Tech • Course Duration: 40 Days [2hr/day] or 25 Days [3hr/day] • Source of teaching: Online / Classroom training Injectorcode Technology 15,Zone-1,M.P Nagar,Near Batra Hospital India,Bhopal-462001 Further Information If you would like to know more info about this course or fees please either call us on +91 8871724857 or send an email to info@injectorcode or officialbhmayur@gmail We at Injectorcode believe that - No Security is 100%. You just need to Try Harder. So we keep on researching to fine new vulnerabilities, exploits and develop new security solutions .
Posted on: Sun, 22 Jun 2014 04:37:54 +0000

Trending Topics



Recently Viewed Topics




© 2015