SlideShare a Scribd company logo
1 of 3
syllabus :- 
SYLLABUS :- 
INTRODUCTION TO HACKING 
Type of hacker 
Steps of hacker 
PROXY SETTING AND HIDING YOUR DETAILS 
Changing & Hiding ip address 
Trace a ip address 
MAC address spoffing 
Browsing anonymously on proxy server 
Unblocking website 
Offline and online proxy “tools tor“ 
EMAIL TRACING AND PROTECTION 
Email forgery 
Self Destructive Message 
spamming 
bombing 
spoofing 
tracking 
Email security 
Encryption and decryption “Hiding secret message“ 
Plugin and addon 
Know ip through email 
FACEBOOK AND EMAIL HACKING 
Phishing 
keylogger 
Tabnabbing 
Cookies stealing 
Ettercap and sniffing 
Set 
Hacking over usb 
URL Shortening Attacks 
YAHOO PERMANENT HACKING 
Hack yahoo email 
Yahoo phising page 
GOOGLE HACKING 
Play with Google dorks 
Live camera expitation 
SYSTEM HACKING 
Cracking window password by various methods “window based“ 
Windows login password cracking 
Windows xp , 7,8 hacking “Metaexploit“ 
Window hacking remotely “AMYRTAGE“ 
Desktop Sharing “Remotely“ 
Registry tweeks 
Syskey attack and security 
WORM VIRUS AND TROJANS AND PROTECTION 
Cookies Stealing 
Remote Accessing Tools 
1)dark comet 
2) beast 
Binding and FUD 
Detection and removing of Trojan 
ATTACKS ON NETWORK 
Lan and wireless attacks 
Open Dns
Port scanning 
STAGANOGRAPHY 
Hiding secret message behing images 
s-tools 
WEBSITE EXPLOITATION AND SECURITY 
Harvester 
Webshag 
DNS and WHOIS Lookups 
Footprinting “Nmap“ 
Cross site scripting- xss 
SQL Injection 
Admin page finder 
Blind injection 
Website security 
Introduction to penetration testing and vulnerability assessment 
WEBSITE MAKING AND BLOGING 
Wordpress 
jhoomla 
PhpBB 
Google blogging and designing 
SEARCH ENGING OPTIMIZATION “SEO“ 
Website ranking 
WIRELESS EXPLOTATION AND WIRELESS SECURITY 
Wep wifi cracking 
Wpa and wpa2 wifi network cracking 
Reaver attack 
Fern attack 
Gerix attack 
Fake wireless access points 
WLAN Sniffers and scanner-Including ac sniffing 
Make own wifi networks 
Securing routers 
MOBILE EXPLOITATION 
Call spoofing and tracing 
Android hacking 
Call details and exploitation 
Phone backdooring 
Number changing 
BACKTRACK AND KALI LINUX & IT“S USES 
Tabnapping 
Phishing with backtrack 
Scanning 
ONLINE MONEY MAKING 
Odesk 
Freelancer 
Adsense 
Aids 
Online payment site 
CYBER CRIME AND LAWS 
Cyber forensic 
Cyber laws 
TIPS AND TRICKS 
Facebook likes 
Free hosting and domain
Cloud computing 
Online shopping 
Profile visinting 
Fake news 
orb

More Related Content

Viewers also liked

Virus ppt
Virus pptVirus ppt
Virus pptRana403
 
Google drive como herramienta
Google drive como herramientaGoogle drive como herramienta
Google drive como herramientayohanivarela
 
Nine frame analysis
Nine frame analysisNine frame analysis
Nine frame analysisDiegoNuccio
 
Fases del proceso tecnológico.
Fases del proceso tecnológico. Fases del proceso tecnológico.
Fases del proceso tecnológico. Diana Cruz
 

Viewers also liked (6)

Kostolac7
Kostolac7Kostolac7
Kostolac7
 
Virus ppt
Virus pptVirus ppt
Virus ppt
 
Google drive como herramienta
Google drive como herramientaGoogle drive como herramienta
Google drive como herramienta
 
Nine frame analysis
Nine frame analysisNine frame analysis
Nine frame analysis
 
Adhd sweding
Adhd swedingAdhd sweding
Adhd sweding
 
Fases del proceso tecnológico.
Fases del proceso tecnológico. Fases del proceso tecnológico.
Fases del proceso tecnológico.
 

Similar to ETHICAL HACKER IN PATNA "RANJAN RAJA"

Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Security Assessment
Security AssessmentSecurity Assessment
Security AssessmentAnil Nayak
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking toolsZituSahu
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 

Similar to ETHICAL HACKER IN PATNA "RANJAN RAJA" (20)

Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
fucking shit
fucking shitfucking shit
fucking shit
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking tools
 
Infosec
InfosecInfosec
Infosec
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 

Recently uploaded

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

ETHICAL HACKER IN PATNA "RANJAN RAJA"

  • 1. syllabus :- SYLLABUS :- INTRODUCTION TO HACKING Type of hacker Steps of hacker PROXY SETTING AND HIDING YOUR DETAILS Changing & Hiding ip address Trace a ip address MAC address spoffing Browsing anonymously on proxy server Unblocking website Offline and online proxy “tools tor“ EMAIL TRACING AND PROTECTION Email forgery Self Destructive Message spamming bombing spoofing tracking Email security Encryption and decryption “Hiding secret message“ Plugin and addon Know ip through email FACEBOOK AND EMAIL HACKING Phishing keylogger Tabnabbing Cookies stealing Ettercap and sniffing Set Hacking over usb URL Shortening Attacks YAHOO PERMANENT HACKING Hack yahoo email Yahoo phising page GOOGLE HACKING Play with Google dorks Live camera expitation SYSTEM HACKING Cracking window password by various methods “window based“ Windows login password cracking Windows xp , 7,8 hacking “Metaexploit“ Window hacking remotely “AMYRTAGE“ Desktop Sharing “Remotely“ Registry tweeks Syskey attack and security WORM VIRUS AND TROJANS AND PROTECTION Cookies Stealing Remote Accessing Tools 1)dark comet 2) beast Binding and FUD Detection and removing of Trojan ATTACKS ON NETWORK Lan and wireless attacks Open Dns
  • 2. Port scanning STAGANOGRAPHY Hiding secret message behing images s-tools WEBSITE EXPLOITATION AND SECURITY Harvester Webshag DNS and WHOIS Lookups Footprinting “Nmap“ Cross site scripting- xss SQL Injection Admin page finder Blind injection Website security Introduction to penetration testing and vulnerability assessment WEBSITE MAKING AND BLOGING Wordpress jhoomla PhpBB Google blogging and designing SEARCH ENGING OPTIMIZATION “SEO“ Website ranking WIRELESS EXPLOTATION AND WIRELESS SECURITY Wep wifi cracking Wpa and wpa2 wifi network cracking Reaver attack Fern attack Gerix attack Fake wireless access points WLAN Sniffers and scanner-Including ac sniffing Make own wifi networks Securing routers MOBILE EXPLOITATION Call spoofing and tracing Android hacking Call details and exploitation Phone backdooring Number changing BACKTRACK AND KALI LINUX & IT“S USES Tabnapping Phishing with backtrack Scanning ONLINE MONEY MAKING Odesk Freelancer Adsense Aids Online payment site CYBER CRIME AND LAWS Cyber forensic Cyber laws TIPS AND TRICKS Facebook likes Free hosting and domain
  • 3. Cloud computing Online shopping Profile visinting Fake news orb