0% found this document useful (0 votes)
81 views

EthicalHacking Offensive

The workshop covered various topics in ethical hacking over two days. Day 1 topics included introduction to networking, scanning networks, hacking Windows and Linux systems, social media and database hacking. Day 2 topics focused on more advanced techniques like DDoS attacks, web hacking, browser attacks, IP spoofing, Bluetooth and radio hacking, keyloggers, and bypassing antiviruses. The workshop aimed to teach participants how to identify vulnerabilities while staying safe.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

EthicalHacking Offensive

The workshop covered various topics in ethical hacking over two days. Day 1 topics included introduction to networking, scanning networks, hacking Windows and Linux systems, social media and database hacking. Day 2 topics focused on more advanced techniques like DDoS attacks, web hacking, browser attacks, IP spoofing, Bluetooth and radio hacking, keyloggers, and bypassing antiviruses. The workshop aimed to teach participants how to identify vulnerabilities while staying safe.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Workshop on

Ethical Hacking

Day 1 Day 2
1. Introduction to Networking 1. DDoS
2. Types of IP address 2. VyoS
3. Introduction to Ethical Hacking 3. Web Hacking with Burp
4. Scanning a Network and Finding Out Vulnerabilities 4. Browser in The Browser Attack
5. Hacking a Windows System 5. IP Spoo ng
6. Hacking a Linux system 6. Wi Hacking
7. Social Media Hacking 7. Bluetooth Hacking
8. Google Hacking Database 8. Hacking Radio Signals
9. Database Hacking through Sql Injection 9. Listen to FM from Computer
10. Creating a Payload 10. Keylogger
11. IoT Search Engine 11. Wi De-Auth
12. Privilege Escalations 12. Bypassing a RFID Access control
13. Bypassing an Antivirus 13. Ransomware Attack simulation
14. Web App Attacks 14. How to stay safe in the present era
15. Reverse Tunneling 15. Cyber Risk Quanti cation
16. Hacking a Intranet
fi
fi

fi

fi

You might also like