Introduction to Networking
Fundamentals of Programming
Fundamentals of Cloud Computing & Big Data Concepts Concepts
System Vulnerability Assessment
Web & Mobile Application Vulnerability Assessment
Network Exploitation
System Exploitation
Web & Mobile Application Exploitation
Client Side Attacks
Post Exploitation Attacks
Cyber Attack Vectors
Scenario: Discovery of Sensitive Devices
Scenario: Network Hacking via IoT
Scenario: Hacking Smart Devices
Scenario: Ransomware attacks
Scenario: Turbine Overpowered
Scenario: DoS & DDoS
Case Studies
Lab - 1 - Information Gathering Exercises
Lab - 2 - Port Scanning & Vulnerability Scanning Exercises
Lab - 3 - Network Exploitation Exercises.
Lab - 4 - System Exploitation Exercises
Lab - 5 - Web Application Exercise
Finding Targets And Gathering Information
01: Finding the IP address of the city's Municipal Corporation office.
02: Finding the SCADA master control device controlling Billboards.
03: Finding the NOC center for traffic light and accident relief system
04: Finding the City's Central Fire Alarm Management System
05: Finding the SCADA PLC master control of the DAM Project
Network, Port Recon And Cctv Hacking
06: Scanning the network for IP Cams.
07: Gain access to the city’s central surveillance system
08: Move the camera away from the buildings 1,3 and 5
Traffic Controller Lights And Manipulating Sy...
09: Establish connection to Traffic Controller System
10: Gain access to Modbus Relay Switching Program
11: Manipulate the program to gain access from external network
Network Exploitation And Banking System
12: Find the gateway to central bank system
13: Gain access to the bank’s security system
14: Manipulate the bank’s alarm system
Scada Switching, Hacking Railway Networks
15: Find the Northern Railway Networks system
16: Obtain access to NRN Network
17: Gain access to switching system
18: Switching tracks - controlling Modbus Relay
Automobile, Wifi And Hospital Hacking
19: DDOS’ing alarm systems
20: Hacking ECU causing total vehicle immobilization
21: Taking over Wi-Fi network at the local coffee shop
22: Manipulating medical records of patients admitted in hospital
Secure Power Grid And Defend Networks
23: Writing Firewall Rules for city’s Power Grid
24: Snort Configuration for detecting attacks
25: SCADA Security for city’s power grid
26: Setting Up Honeypots for defending networks
27: Policy Management to minimize risk
Forensic Operations Of System And Network
28: GSM interception and handling PCAP Files
29: Handling file system images
30: Log analysis of attack on a telecom system Offensive - Lab Syllabus