0% found this document useful (0 votes)
131 views

Ethical Hacking Syllabus: Rooman Technologies PVT LTD

The document outlines an ethical hacking syllabus consisting of 10 modules. The syllabus covers principles of hacking and legal parameters, viruses and malware, footprinting and enumeration techniques, SQL injection and other attack methods, attacking web applications and servers, IoT and cloud security, mobile and wireless hacking, evading firewalls and IDS, cryptography concepts, and concludes with capture the flag exercises. The syllabus provides a comprehensive overview of ethical hacking tools, techniques and methodologies.

Uploaded by

Nepson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views

Ethical Hacking Syllabus: Rooman Technologies PVT LTD

The document outlines an ethical hacking syllabus consisting of 10 modules. The syllabus covers principles of hacking and legal parameters, viruses and malware, footprinting and enumeration techniques, SQL injection and other attack methods, attacking web applications and servers, IoT and cloud security, mobile and wireless hacking, evading firewalls and IDS, cryptography concepts, and concludes with capture the flag exercises. The syllabus provides a comprehensive overview of ethical hacking tools, techniques and methodologies.

Uploaded by

Nepson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Ethical Hacking Syllabus

Rooman Technologies Pvt Ltd


#30, 12th Main, 1st Stage Rajajinagar,
Bangalore – 560010

E-mail: [email protected]
Phone: 7022020000
Module 1: Principles of Hacking & Legal Parameters
Ethical Hacking Overviews

 Hacking concept, what is hacking?


 Terms we use in hacking.
 Need of Ethical hacking.
 Cases of Hacking in India & across the globe

Principles of Ethical hacking

 Basic Principle
 Commandments of Ethical Hacking

Hacking Methodologies

 Types of Hacking.
 Building the foundation for Ethical hacking
 Hacking Phases

Role of Ethical Hacker

 Types of Hackers
 Roles and Responsibilities

Scope & limitations of hacking.

 Advantages & scope for hacking


 Drawbacks & Limitation of hacking

Cyber Threats and Attacks Vectors

 Threats & categories


 Attack Vectors and Exploitation

Hacking tools and techniques

 Common Hacking Tools


 Hacking Techniques & Approaches

Policies and Controls

Information Security policies


 Risk Management & Incident Management
 Information Security controls
 Data Management

Overview of PT / VA.
 Concept of Penetration testing
 Types of Penetration testing
 Phases of Penetration testing
 Vulnerability Assessment by Penetration testing
Module 2 : Viruses, Trojans, Malwares, and OS Level Attacks
and Counter Measures. Malware Analysis.
Malware Overviews
 Introduction to Malware.
 Different Ways a Malware can Get into a System.
 Common Techniques Attackers Use to Distribute Malware on the Web
 Components of Malware

Virus Worm & Trojan Concepts


 Introduction to Viruses, Worms & Trojan
 Types of Virus, Worms &Trojan
 Fake Antiviruses
 How Did Antivirus Works.

Malware Analysis
 Introduction to Malware Analysis
 Malware Analysis Procedure
 Malware Detection Method.

Module 3 : Foot printing , Enumeration, Scanning, Sniffing, Social


Engineering

Footprinting through Search Engines, Web Services,


 Information Gathering Using Google Advanced Search and Image Search.
 VoIP and VPN Footprinting through Google Hacking Database

Footprinting through Web Services


 Finding Company’s Top-level Domains (TLDs) and Sub-domains
 Finding Location, People search, Professional search.

Enumeration
 Techniques for Enumeration, Services and Ports to Enumerate
 NetBIOS, SNMP, LDAP Enumeration
 Information Gathering Using Groups, Forums, and Blogs.

Scanning targets
 Network Scanning Concepts.
 Scanning Tools and Techniques
 Scanning Pen Testing
 Port Scanning & Countermeasures

Sniffing Network
 Sniffing Concepts & Techniques
 WireShark installing & concept
 Sniffing Detection Techniques

Social Engineering
 Social Engineering Concepts
 Social Engineering Techniques
 Insider Threat / Insider Attack.
 Social Engineering Countermeasures
Module 4: SQL Injection, DOS Attacks, Session hijacking and System
hacking

SQL Injection
 Basics to the SQL queries
 How Injection Can be done
 Cross Site Scripting Attacks

DOS Attacks
 DoS/DDoS Attack Techniques.
 DDoS Case Study
 DoS/DDoS Attack Tools

Session Hijacking
 Session Hijacking Concepts,
 Network Level Session Hijacking
 Client side Hijacking.
System Hacking
 System Hacking Concepts
 Cracking Passwords
 Escalating Privileges
 Hiding Files and Covering tracks

Module 5: Web Applications and Web Servers attacking methodology and


Counter measures.
Basics to Web application & threats
 Basics of Web Application and Technology stack.
 OWASP Top 10 Application Security Risks – 2017

OWASP Top 10 Application Security Risks – 2017

 Injection Flaws
 File Injection Attack
 Broken Authentication
 Sensitive Data Exposure
 XML External Entity (XXE)
 Broken Access Control
 Security Misconfiguration
 Cross-Site Scripting (XSS) Attacks
 Insecure Deserialization
 Using Components with Known Vulnerabilities

Web Hacking methodology and tools

 Web App Hacking Methodology and its foot printing.


 Password Attacks:
 Password Functionality Exploits
 Password Guessing and Brute-forcing

Introduction to Web Server

 Web Server Concepts


 Web server attacks
 Web Server Attack Methodology
 Web Server Attack Tools
Counter measures

 Detecting Web Server Hacking Attempts


 Patch Management
 Web Server Security Tools

Module 6: IoT and Cloud Attacks and Defense Mechanisms


IOT Concept and Attacks

 Basic of IOT, Architecture, Technology and Protocols


 Challenges, Opportunity in IOT
 OWASP Top 10 IOT Vulnerabilities and Obstacles
 Hacking IOT Devices

 DDos Attack
 Jamming Attack
 Botnets
 Man In middle concept
 Data & Identity Theft

Cloud Computing Overview

 Introduction to Cloud & Virtualization


 Cloud Deployment and responsibilities

Threats and attack in Cloud

 Topic 1 : Service Hijacking

▪ Social Engineering
▪ Network sniff
▪ XSS attack

 DNS (Domain Name system attack)

Cloud Security and tools

 Control Layers and Responsibilities


 Cloud Computing Security Consideration

Module 7: Mobile & Wireless Networks Hacking and Counter measures

Mobile Hacking

 Introduction to the Mobile architecture


 Working principle for mobile OS
 Security of the application used in Mobiles
 Hacking Methodology for mobile with Metasploit

Wireless Overview

 Introduction to Terminology, Networks, Standards


 Types of Wireless Authentication and Encryption

▪ WEP (Wired Equivalent Privacy) Encryption
▪ WPA (Wi-Fi Protected Access) Encryption

 WPA2 (Wi-Fi Protected Access 2) Encryption


Wireless Hacking Methodology

 Wi-Fi Discovery
 GPS Mapping
 Traffic canalizing
 Launch Wireless attacks
 Crack Wi-Fi Encryption

Module 8 : Firewall, IDS and honeypot evasion techniques, evasion tools,


and countermeasures
Basics of Firewalls, IDS, Honeypots

 What is Firewall & Examples


 What is IDS & examples
 What is Honeypots & examples
 Case study of Bypassing Firewall ,IDS, Firewall

IDS/Firewall/Honeypot Evasion Techniques

 Packet Fragmentation and Source Routing


 Working with SNORT [Detection Tool]
 IP address Decoy and Spoofing

▪ IP Spoofing Detection Techniques: Direct TTL Probes


▪ IP Spoofing Detection Techniques: IP Identification Number
▪ IP Spoofing Detection Techniques: TCP Flow Control Method
▪ IP Spoofing Countermeasures

Module 9 : Cryptology, Vulnerability Analysis, Logging and Audit.


Introduction to Cryptography Concepts

 Types of Cryptography
 Government Access to Keys (GAK)

Encryption Algorithms

 Ciphers
 Data Encryption Standard
 Advanced Encryption Standard
 RC4, RC5, and RC6 Algorithms

Email, Disk Encryption and Cryptanalysis

 Digital Signature, SSL, TLS


 Cryptography Toolkit & Disk Encryption
 Cryptography Attacks

▪ Brute-Force Attack
▪ Meet-in-the-Middle Attack on Digital Signature Schemes
▪ Side Channel Attack
▪ Hash Collision Attack
▪ DUHK Attack
▪ Rainbow Table Attack
Vulnerability Analysis

 Vulnerability Assessment Concept & Solutions


 Vulnerability Assessment Tools & Reports
 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing

Module 10 : Capture the flag [CTF] .

Bandit Overthewire [ WarGame]


▪ Understanding of Kali Linux commands.
▪ Using commands situation based.

Natas Overthewire [ WarGame]


 Understanding of web application.
 Web application tricks to get data.
 Doing pentesting Situation based.

Mr. Robot
 Installing and working on Kali Linux.
 Vulnerability Assessment Concept & Solutions.
 Vulnerability Assessment Tools & Reports.

You might also like