CCST EH WAP Course Modules
CCST EH WAP Course Modules
Bug Bounty
Hunter
ETHICAL HACKING
&
WEB APPLICATION PENETRATION TESTING
No Coding Required.
Basic knowledge of Computer Systems.
One year in an information security role or equivalent experience is recommended.
Ability to read and understand python code will help, although it is not mandatory.
CLASSROOM TRAINING
ONLINE TRAINING
We are providing training through Online LIVE with a real time live instructor. The
live instructor teaches the course and provides the opportunity for students to ask
live questions via voice or instant message during the live training event with
practicals
WORKSHOPS
Networking
Introduction to Networking
Types of Networks
UDP
TCP/IP
TCP/IP Three Way Handshake
TCP Flags
1. URG
2. ACK
3. PUSH
4. RST
5. SYN
6. FIN
Basic Protocols
1. FTP (File Transfer Protocol)
2. Telnet
3. SMTP (Simple Mail Transfer Protocol)
4. HTTP (Hyper Text Transfer Protocol)
5. HTTPS (Hyper Text Transfer Protocol Secure)
Enumeration
NetBIOS Enumeration
SNMP Enumeration
SMB Enumeration
Telnet Enumeration
SMTP Enumeration
5.Encoder Module
6.Evasions Module
7Nops Module
8.Post Module
Exploiting the Victim Machine
Setting up Lhost, Rhost for getting access
Creating a payload using msfvenom
System Hacking
OS Bypassing
Error Generation Method (Cracking Password)
Ngrok configuration
Windows Reverse Shell
Windows Machine Hacking
Getting the live screen with VNC
Mobile Hacking
Introduction to Mobile OS
Creating reverse shell with msfvenom
Binding the reverse shell
Tunnel forwarding with open-source tool
Getting Access in WAN connection
Getting Access in LAN connection
Exploiting the Mobile Platforms
Malware
Introduction to Malwares
Types of Malware
Virus
Worms
Trojans
Crypters for hiding the malwares
Sniffing
Introduction to Sniffing
Introduction to Wireshark tool
Analyzing the data packets from Wireshark
Introduction to Bettercap
MAC address spoofing
Performing MAC flooding attack
Man-in-the-Middle Attack – ARP Poisoning
Wireless Hacking
Wireless Encryptions
WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
Social Engineering
Introduction to Social Engineering
Types of Social Engineering
Human-based Social Engineering
Computer based Social Engineering
Insider Attacks
External Attacks
Password Cracking
Hack Windows Password using CMD
Hack Linux Password
Crack SSH Password
Crack Telnet Password
Cryptography
Types of Cryptography
Symmetric Key
Asymmetric key
Encryption Algorithms
Cryptography Tools (MD5 and MD6 HashCalc)
Generate Hashes with HashCalc
Calculate MD5 Hashes using MD5 Calculator
Decoding and Encoding
Hide plain text in files (Steganography)