Learn Ethical Hacking from DROP Organization

Hacking Modules And There Topics In Detailed

Previous Blog :-

 Guy's Start All Required Topic In Hacking From This Blog We Will Teach U Full Hacking Step By Step 

Basic Computer Knowledge To Last Module Of Hacking

Start From Here Daily Upload 2 Blogs And Learn Full Hacking From Zero


Module - 1 -->  Computer Basic Knowledge

--> What Is Computer 

--> Why We Need Computer

--> Computer History

--> How Computer Works

--> Input Unit

--> Storage Unit

--> Processing Unit

--> Output Unit

--> Controlling Unit

--> What Is Software

--> Types Of Software

--> Types Of Printers

--> Computer Memory Units

--> Types Of Computer

--> What Is Primary And Secondary Memory

--> What Is Rooting??

--> What Is HDD,SDD,SSHD 

--> What Is Operting System

--> Types Of Operting System

--> How Operting System Works

--> What Is Boot

--> What Is MBR/GPT 

--> Virtualization

--> Buffers

--> EXT2/3/4

--> SWAP/NTFS

--> What Is File System

--> 32bit/64 bit

--> What Is legacy/UEFI

--> Processes And Threads

--> How to Know Your Computer Runs on MBR/GPT

--> What Is Ram And It's Types

--> What Is Rom And It's Types

--> What Is Cache

--> What Is Internal Devices

--> What Is External Devices

--> What Is Partitions 

--> How to Make Bootable Pendrive

--> How to Install Windows Using Bootable Pendrive or Cd

--> What Is MS-DOC

--> MS-DOC Commands

--> Master In MS-DOC

--> What Is CPU

--> How works CPU

--> What Is BIOS

--> How Modify BIOS

--> How to enable virtualization in the BIOS

--> Difference Between Killing a thread vs killing a process

--> Characteristics Of Computer

--> Types Of File Extensions

--> Setting Up Computer

--> Storage Device

--> Domain Name & Hosting

--> Termux For Android

--> Troubleshoot Windows


Module - 2 --> Networking

--> What Is Internet

--> How Works Internet

--> OSI Model

--> TCP/IP

--> What is node

--> NAT 

--> What Is IP 

--> Types Of IP Address

--> Private IP

--> Public IP

--> What is loopback Address

--> What Is 127.0.0.1

--> What Is Port Forwarding

--> Network Types

--> HTTP/HTTPS

--> SNMP Protocol

--> Hub,Switch,Router,Bridge,Repeter, Gateway

--> What Is Duplex And Types Of Duplex

--> What Is Topology And It's Types

--> Modem

--> What IS MAC Address

--> Subnetting

--> Routing & Switching

--> vLAN

--> Network Protocols

--> TCP/UDP

--> ARP

--> DNS

--> Wireless

--> DHCP

--> What is Wi-Fi

--> What Is Bluetooth

--> LAN 

--> Packet Analysis

--> Packet Sniffing

--> VPN

--> What Is NIC

--> What Is Wireless Access Point

--> Peer To Peer Network

--> Transmission Media

--> Disk Quote

--> Networking Commands

--> Compressing And Encryption

--> Countermeasure Of Network

--> Firewall

--> Packets In Detail

--> Ports

--> WebBrowsers

--> Mail Access Protocols

--> Architecture And Service Of Email

-->Email 

--> Name Server






Module - 3 --> Programming Language And Scripting Language

--> HTML

--> CSS

--> JavaScript

--> Java

--> Bash

--> Python

--> Go

--> PowerShell

--> C

--> C++

--> C#

--> Perl

--> Ruby

--> SQL

--> PHP

--> VBScript

--> Visual Basic

--> Android Development

--> Shell Scripting

--> Lua

--> Assembly

--> XML

--> LISP


Module - 4 --> Operating System

--> Introduction To Operating System

--> Types Of Operating System

--> Bootstrapping Technology 

--> Understanding Windows And Learn

--> Understanding Tokens

--> Impersonation Tokens

--> Local And Domain Escalation

--> Concept Of ACL

--> Introduction And Deep Learn About Linux

--> Introduction And Deep Learn About Windows 10

--> Introduction And Deep Learn About Ubuntu

-->Introduction And Deep Learn About  RedHat Linux


Module - 5 --> Introduction Of Ethical Hacking


--> Who Are Hackers

--> Why Need Hackers

--> Types Of Hackers

--> Essential Terminology

--> Elements Of Information Security

--> Network Threats

--> Host-Based Threats

--> Application Threats

--> Botnets

--> Scanning

--> Types Of Attack

-->Effect Of Hacking

--> What Is Penetration

--> What Is Bug Bounty

--> What Is Crypto Mining

--> What Do Ethical Hacker

--> Why Need Them

--> Important Terms Of Hacking


Module - 6 --> Hacking Laws & Acts

--> Hacking Terms And Conditions

--> Hacking Laws

--> Hacking Acts

--> IT Acts

-->  Cyber Laws


Module - 7 --> Footprinting

--> Footprinting Terminology

--> What IS Footprinting

--> Types Of Footprinting

--> Benefits Of Footprinting

--> People Search

-->Whois Search

--> DNS Lookup

--> NSLookup

--> Email Footprinting

--> Email Analying

--> Traceroute

-->Mirroring Website

--> Finding Vulnerable Website

--> Extracting Website Information

--> Admin Panel finding

--> Tracking Users

--> Email Communication Tracking

--> Mobile Communication Tracking

--> Addition Footprinting Tools

--> Complete Study On CCAS Tools

--> Footprinting Through Search Engines

--> Social Networking Sites Used In Footprinting

--> Website Footprinting

--> VOIP and VPN Footprinting

--> Groups, Forum And Blog Footprinting

--> Determine OS

--> Finance Of Company 

--> Competitive Intelligence

--> Webspiders

--> Maltego

--> Recon-ng

--> Geolocation Information

--> Networking Footprinting

-->What Is Google Hacking  

--> Google Hacking Techniques

-->Google Hacking Tools

--> Google Hacking Advanced Search Operator

--> Error Message Queries

--> Robtex

--> Netcraft

--> Google Dorking 

-->Shodan In Detail

--> Doxing 

--> Types Of Doxing

--> FOCA

--> DNS Spoofing

--> OSINT In Detail

    


Module - 8 --> Scanning Network

--> Network Scanning

--> Types Of Scanning

--> TCP Communication Flags

--> HPing Command

-->  Three Way Handshake

--> Scanning Techniques

--> All CCAS Scanning Tools

--> OS Fingerprinting

--> Scanning Countermeasures

--> Scanning Network

--> Banner Grabbing

--> Types Of Banner Grabbing

-->  Vulnerability Scanning

-->  Proxy Servers

-->  Use OF Proxies

--> Types Of Proxies

--> Working With Multi Proxies

--> Proxy Chain

--> Rotating Proxy

--> Proxy Tools

--> Http Tunneling Technology

--> SSH Tunneling

--> IP Spoofing Detection Technology

--> IP Spoofing Countermeasure

-->  Anonymizers

--> Types Of Anonymizers

--> Anonymizers Tools

-->  IDS Evasion

--> Drawing Networking Diagrams

--> Latest Network Discovery And Mapping Tools

-->  NetBIOS, SNMP , LDAP , NTP , SMTP , DNS Protocols

--> What Is SSL Protocols

-->  What is DHCP Protocols

--> X-man Scanning

-->  Create Custom Packet

--> TCP Flag

-->  Port Scanning

--> Types and Phases Of Scanning 

--> Difference Types Of Scanning


Module - 9 --> Enumeration

--> Nmap

--> DirBuster

--> Wpscan

--> DNSenum

--> DNS Zone Transfer Enumeration

--> Types Of Enumeration

--> Techniques Enumeration

--> Service and port for enumeration

--> Simple network management protocol


Module - 10 --> System Hacking And Password Break

--> System Hacking Goals

--> CCAS Hacking Methodology

--> Password Cracking 

--> Password Complexity

--> Types Of Password Attack

--> Microsoft Authentication

--> How Hash Password Are Stored In Windows

--> pwdump and fgdump

--> Lazysoft

--> Op4crack

--> Cain & Abel

--> Password Cracking Tool

--> Privilege Escalation

--> Keylogger

--> Type Of Keystroke Loggers

--> Keyloggers and spyware

--> Antikeyloggers

--> Spyware

--> Types Of Spyware

--> Rainbow Table

--> NTFS Streas

--> USB Spyware

--> Audio Spyware

--> Email Spyware

--> Internet Spyware

--> Antispyware

--> Types Of Rootkits

--> Anti Rootkits


Module - 11 --> Steganography & Cryptography

--> What Is Steganography 

--> Techniques Of Steganography

--> How Steganography Works

--> Types Of Steganography 

--> Steganography Detection Tools

--> Image Steganography 

--> Clearing Audit Policies ON Windows

--> Clearing Logs ON Windows

--> Clearing Logs On Linux

--> Block Diagram Of Steganography

--> Steganography In Text And Types And Techniques

--> Steganography In Image

--> Steganography In Audio

--> Steganalysis

--> Import Aspects Of Steganalysis

--> LSB Algorithm Of Steganography

--> How works LSB

--> Steganography In Protocols 

--> Cryptography

--> Types Of Cryptography

--> What is SSH

--> Techniques Of Cryptography

--> Cryptography Tools

--> Cryptography Attack

--> Code Breaking Methodology

--> Government Access To Keys

--> Encryption Algorithms

--> Ciphers

--> Data Encryption Standard

--> Advanced Encryption Standard

--> RC4,RC5,RC6 Algorithm

--> DSA And Relation Signature Schemes

--> RSA Rivest Schemes

--> MD5 Hash Calculator

--> Hash Calculator For Mobile

--> Advanced Encryption Package

--> Public Key

--> Private Key

--> SSL

--> SSL and TLS Secure Communication

--> Digital Signature

--> Email Encryption

--> Pretty Good Privacy

--> Code Break Methodoly

--> Disk Encryption


Module - 12 --> Trojans And Backdoors And Malware

--> Introduction To Trojans

--> Reason Of Trojans

--> How to use Trojans

--> How Systems Get Infected By Trojans

--> Types Of Trojans

--> Designing Trojans

--> Removing Trojans

--> Designing And Use Trojan Detail

--> Detection Of Trojans

--> Uninstalling Trojans Remotly

--> Anti-Trojan Software

--> Trojan Countermeasure

--> How to Deploy A Trojan

--> Pentesting For Trojan And Backdoor

--> Indicated Trojans Attacks

--> Common Port used by trojan

--> How to Infect Trojan System

--> How to Create Backdoor

--> How to setup Backdoor

-->  How to Bind Backdoor

--> How to Use Backdoor

--> Backdoor Countermeasure

--> Malware Intro

--> Malware Analysis

--> Learn Malware In Deep


Module - 13 --> Vulnerability Analysis

--> Vulnerability Assessment

--> Life-Cycle

--> Vulnerability Solutions

--> Scoring System

--> Vulnerability Scanning

--> Attack Tree Example

--> Port Scanning

--> Protocol Analyzer security Inform

--> Detering Attack


Module - 14 --> Virus And Worms

--> Introduction To Viruses

--> Stages Of Viruses

--> Working With Viruses

--> Why Do Create Computer Viruses

--> Indications Of Virus Attacks

--> How Does A Computer Get Infected By Viruses

--> Virus Analysis

--> Types Of Virus

--> Designing Virus

--> Latest Virus Maker

--> Stages Virus

--> Computer Worms

--> Worms Makers

--> Worms Analysis

--> Anti-Virus Tools

--> Virus detection Tools

--> Virus And Worms Countermeasure


Module - 15 --> Sniffers & Phishing

--> Sniffing Threats 

--> How Sniffer Works

--> What is Address Resolution Protocol

--> Types OF Sniffer

--> How DHCP  Work

--> Spoofing Attack

--> DNS Poisoning

--> Sniffing Tools

--> Wireshark

--> Sniffing Prevention Techniques

--> How to Detect Sniffing

--> Working Of Sniffers

--> Hardware Protocol Analyzer

--> Mac Attack

--> Wiretapping

--> SPAN Port

--> MAC Flooding

--> Switch Port Stealing

--> Defend Against MAC Attacks

--> DHCP Attack

--> ARP Poisoning

--> Spoofing Attack

--> What Is Phishing

--> Types Of Phishing

--> How Phishing Works

--> Designing Of Phishing Page

--> Detection Of Phishing

--> Anti-Phishing

--> Effect Of Phishing

--> Phishing Attacks

--> Homograph Attack

--> Tab-Napping

--> Advanced Techniques

--> Advanced Tools

--> Modlishka


Module - 16 --> Social Engineering

--> What Is Social Engineering

--> Vulnerable To Attack

--> Why Is Social Eng. Effective

--> Warning Signs Of An Attacks

--> Phases In A Social Eng.

--> Command Injection Attacks

--> Common Targets Of Social Eng.

--> Types OF Social Eng.

--> Social Eng. through Impersonation on social network

--> Risk Of Social Network To Corporate Network

--> Insider Attack

--> Social Eng. Using Kali Linux

--> Telephone Attack

--> Attacks  And Techniques

--> OSB Sticks





Module - 17 --> DOS & DDOS

--> What Is DOS Attack

--> What IS Distributed Denial Of Service Attack

--> Symptoms Of Dos Attacks

--> DOS Attacks Techniques

--> Botnet

--> Internet Reply Chat

--> DOS/DDOS Countermeasure

--> DOS Attack Tools

--> DOS Detection Techniques

--> Malicious Codes Propagation

--> How work dos/ddos

--> DDOS bot toolkit

--> Others DDOS Attack Tools

--> SYN Flooding Attack Using Metaspolit

--> SYN Flooding Attack Using Hpings

--> DDOS Attack Tools For Mobile

--> Enabling TCP On CISCO IOS Software


Module - 18 --> Session Hijacking

--> What Is Session Hijacking

--> Key Session Hijacking Techniques 

--> Session Hijacking Process

--> Types Of Session Hijacking

--> Session Hijacking Tools

--> Session Hijacking Countermeasure

--> Method Of Prevent Session Hijacking

--> Defending Against Session Hijacking Attack 

--> Session Replay Attack

--> Application Level Session Hijacking

--> Compromising Session IDS Using Man In The Middle 

--> Compromising Session IDS Using Man In The Browser

--> Compromising Session IDS Using Client-Side Attacks

--> Session Fixcation

--> Network Level Session Hijacking

--> TCP/IP Hijacking

--> Source Routing

--> RST Hijacking

--> 3 Way Handshake

--> Blind Hijacking

--> ICMP And ARP Spoofing

--> UDP Hijacking

--> IPsec


Module - 19 -->  Evading IDS, Firewall And Honeypots

--> IDS

--> Firewall

--> Honeypot

--> Insertion Attack

--> False Positive Generation

--> Session Splicing

--> Unicode Evasion Techniques

--> Firewall Identification

--> IP Address Spoofing

--> Source Routing

--> Bypassing Techniques

--> Bypassing Through SSH Tunnel

--> Bypassing Firewall Through External Systems



Module - 20 --> Hacking And Web Application Hacking

--> Web Application Security Statistics

--> Introduction To Web Application

--> Web Application Components

--> How Web Application Works

--> Web Application Architecture

--> Injection Flows

--> What Is LDAP Injection

--> How LDAP Injection Works

--> Cross-site Scripting Attack(XSS)

--> How XSS Attack Work

--> XSS Attack Scenario Attack Via Email

--> XS Example

--> XSS Cheatsheet

--> Cross-Site Request Forgery (CSRF) Attack

--> How CSRF Work

--> Web Application DOS Attack

--> Buffer Overflow Attack

--> Cookie And Session Poisoning

--> How Cookie Poisoning Works

--> Username Enumeration

--> Password Attack, Password Functionality Exploits

--> Password Guessing

--> Brute-force

--> Session ID Prediction Brute Forcing

--> How Defend Against SQL Injection Attack 

--> Cookie Exploitation

--> Cookie Poisoning

--> Encoding Schemes

--> How to defend against xss,dos,web service attack

--> Web App. Firewall

--> Session Management Attack

--> Server Administrate

--> Analyze Web App.

--> Attack Authentication Mechanism

--> Perform Injection Attack

--> Attack Connectivity


Previous Blog :- https://www.httricksreborn.com/2021/06/required-skills-for-become-hacker-as.html?m=1

To Join Our Live Hacking Classes Contact Information Mention Below(Paid Classes And ISO CERTIFIED CERTIFICATE PROVIDED IN END OF COURSE)

Roshan Barnwal :- 7477466951  

Website :- https://drop.org.in/


For More Content Join Our Telegram Or WhatsApp Group

About Karan Patel

Karan Patel
Recommended Posts × +

0 Comments: