Table of Contents

Who is a Hacker?
Hackers VS Crackers
Steps of a Hacker
IP Addresses
The Anatomy of an IP Address
Finding a Remote IP Address
Hiding Your IP Address
Tracing an IP Address
Network Address Translation
Internal VS External IP Addresses
MAC Addresses
MAC Addresses Spoofing
Proxy Servers
Proxy Bouncing
Onion Routing
HTTP Tunneling
Unblocking Websites
Unblocking Torrents
Network Reconnaissance
Ping sweeping
Traceroute
DNS and WHOIS Lookups
Port Scanning
Daemon Banner Grabbing
OS Fingerprinting
Metasploit
Security Auditing
Penetration Testing & Vulnerability Assessment
Email Spoofing
SMS Spoofing
Call Spoofing
Google Hacking
Trojans
Fully Undetectable Trojans
Keyloggers
Spyware
Mobile Phone Spying
Alternate Data Stream Manipulation
Cracking Passwords
Social Engineering Attacks
BIOS Passwords
Saved Passwords
WiFi Password Cracking
MD5 Decoding
Rainbow Table Attacks
Salting
Windows Login Password Cracking
Offline Attacks and Online Attacks
SYSKEY Cracking
Privilege Escalation Attacks
SHA1 & SHA2 Decoding
Network Password Cracking
Distributed Password Cracking
Captcha
Cracking Captcha
Meet in Middle Attacks
HTTP Referrer Spoofing
Steganography
Steganalysis
Query Strings
HTTP Request Attacks
Cookies Related Attacks
Session Hijacking Attacks
Man in the Browser Attacks
Phishing Attacks
Fake Login Screen Attacks
URL Shortening Attacks
Link Manipulation Attacks
Open Redirection Attacks
Cross Site Scripting (XSS Attacks)
URL Encoding
Data Sniffing
Passive Sniffing
Active Sniffing
ARP Poisoning Attacks
MAC Flooding Attacks
Man in Middle Sniffing Attacks
DOS Attacks using ARP Tables
MAC Duplication Attacks
DOS Attacks
D-DOS Attacks
Reflective DOS Attacks
Botnets
SQL Injection
Union Query Attacks
Always True Attacks
Bypassing Login Prompts
Information Stealing Attack
Improper Error Handling
Advanced SQL Injection Attacks
SQL Injection using Backtrack
Wireless Hacking
Introduction to Wireless Networks
Wireless Security
Poisoned Hotspots
War Driving
War Driving & GPS Mapping
De-Authentication Attacks
Wireless Data Sniffers
How are Wireless Connections Established?
MAC Filtering Attacks
DOS Attacks against Wireless Networks
WEP Security Loopholes
Cracking WEP, WPA, WPA2: Tools
ARP Request Relay Attack
Fake Authentication Attack
Cracking WEP Keys
Caffe Latte Attack
Cracking WPA & WPA2
Computer Forensics
Honeypots
25 Attacks with Backtrack
Fuzzing
Social Engineering Toolkit
Site Cloning Attacks
QR Code Attacks
Spearphishing Attacks
Mass Mail Attack
Firewalking
How to get a Shell on Victim's Computer?
Reverse Shell Attacks
Advanced Metasploit
Meterpreter
Post Exploitation Attacks

Award Winning Speaker

ANKIT FADIA is an award winning speaker and has delivered more than a 1000 talks in 25+ countries. He is widely sought after speaker worldwide among a variety of different audiences including colleges, companies, industry meets and government conferences.

Invite Ankit Fadia

Facebook Live Feeds

Knowledge Store

Videos

  • Ankit Fadia in LIVE Discussion on 'Mobile Phone Security Issues' on CNN IBN on 20th July 2010
    Ankit Fadia in LIVE Discussion on "Mobile Phone Security Issues"...
  • Ankit Fadia in Panel Discussion on 'Blackberry & Security Issues' on UTV Bloomberg FINAL WORD show 3rd August 2010
    Ankit Fadia in Panel Discussion on 'Blackberry & Security Issues'...
  • ANKIT FADIA's New Avatar
    ANKIT FADIA's New Avatar
  • Ankit Fadia in Flying Machine Advertisement on Star World show How I Met Your Mother
    Ankit Fadia in Flying Machine Advertisement on Star World show...
  • Ankit Fadia Seminar & Workshop on Ethical Hacking at Adobe India on 16th July 2010
    Ankit Fadia Seminar & Workshop on Ethical Hacking at Adobe India...
  • ANKIT FADIA on NDTV 24x7 China - India Cyber War
    ANKIT FADIA on NDTV 24x7 China - India Cyber War
  • ANKIT FADIA on Fox News. Live from the Dallas, TX, USA Studio.
    ANKIT FADIA on Fox News. Live from the Dallas, TX, USA Studio.
  • Ankit Fadia in LIVE Discussion on 'Mobile Phone Security Issues' on CNN IBN on 20th July 2010
    Ankit Fadia in LIVE Discussion on "Mobile Phone Security Issues"...
  • Ankit Fadia in Panel Discussion on 'Blackberry & Security Issues' on UTV Bloomberg FINAL WORD show 3rd August 2010
    Ankit Fadia in Panel Discussion on 'Blackberry & Security Issues'...
  • ANKIT FADIA's New Avatar
    ANKIT FADIA's New Avatar

View all »

Proud to have Partnered With:

  • Vikas Publishing
  • Thomson Learning
  • Macmillan
  • MTV India
  • BPI
  • OOH Media
  • Reliance World
  • Flying Machine
  • Gail Davis
  • IMT - Ghaziabad
  • Penguin India
  • IndiaCan