Webtech Learning™ – A Web Education Academy

Ethical Hacking Course in Chandigarh

javaEthical Hacking Course in Chandigarh – Webtech Learning provide the best training in Ethical Hacking in Chandigarh Mohali and Panchkula. 100% Practical training with Job. We provide 30-day or 60 days ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch “infrastructure” attacks.

Ethical Hacking Training

Call for Free Demo Class: 9878375376

Practical exercises reinforce theory as you experiment with a Windows 2008 domain (server and workstation) plus a Linux server.
The course demonstrates hacking techniques – there’s no better way to understand attacks than by doing them yourself – but this is always done with defence in mind and countermeasures are discussed throughout.

Who Can Join this course:

The course is therefore suited to system administrators, IT security officers and budding penetration testers.

Ethical Hacking Course Syllabus:

  1. Networking Refresher
    1. Sniffing Traffic – Wireshark, Ettercap
  2. Information Discovery
    1. Information Gathering – wget, metadata, pdfinfo and extract
    2. DNS – dig, zone transfers, DNSenum and Fierce
  3. Target Scanning
    1. Host Discovery – Nmap and Netdiscover
    2. Port Scanning with Nmap – Connect, SYN and UDP scans, OS detection
    3. Banner Grabbing – Amap, Netcat, Nmap, Nmap scripts (NSE)
  4. Vulnerability Assessment
    1. Nikto
    2. Nessus
  5. Attacking Windows
    1. Windows Enumeration – net commands, Active Directory searches
    2. Enum4linux
    3. RID Cycling – Enum4linux, Cain
    4. Metasploit
    5. Client-side Exploits – Internet Explorer, Metasploit Auxiliary modules
  6. Privilege Escalation – Windows
    1. Information Gathering with Meterpreter – Stuxnet exploit, Meterpreter scripts
    2. Privilege Escalation – Keylogging
    3. Privilege Escalation exploit – Meterpreter’s hashdump, privileged keylogging
    4. Password Cracking with John The Ripper
    5. Password Cracking with Cain – fgdump, tailoring dictionaries
    6. Brute-Force Password Attacks
    7. Password Cracking with Rainbow Tables – Ophcrack Live CD, Ophcrack application
    8. Attacks on Cached Domain Credentials
    9. Token Stealing – PsExec, Incognito, local admin to domain admin
    10. Pass the Hash
  7. Attacking Linux
    1. Exploiting Linux
    2. Pivoting the Attack
    3. Online Password Cracking – Medusa
    4. ARP Poisoning Man in the Middle – clear-text protocols, secured protocols
  8. Privilege Escalation – Linux
    1. Privilege Escalation – standalone exploit
    2. Cracking UNIX Passwords – John The Ripper
    3. Exploiting sudo through File Permissions
    4. Exploiting SUID and Flawed Scripts – logic errors
    5. Further Shell Script Flaws – command injection, path exploits
  9. Retaining Access
    1. Netcat as a Backdoor (via a Java Exploit)
    2. Bandook RAT (via a PDF Exploit) – Metasploit Handlers, a full end-to-end attack
  10. Covering Tracks
    1. Simple Obfuscation
    2. HXD Rootkit
    3. Log Manipulation – wevtutil, Meterpreter scripts, audit policy

istqb_training_in_chd

Contact Details: – Ethical Hacking Course in Chandigarh

Institute Name –
WebtechLearning – Web Education Academy
Mobile Contact-
+91- 9878375376, +91- 9915337448,
Online Contact-
Email Address: info@webtechlearning.com,
Centre Address-
SCO 54-55, 3rd Floor, Sector 34- A, Chandigarh, Punjab, India
Scroll to Top