Why?
So you get the most out of your own PC, among other things :)
What do you need to know?
Linux command line
Windows command line
Networking
Cyber laws
Internet governance
Reconnaissance ( footprinting )
Google Hacking (wha?)
Scanning
Enumeration
System Hacking
Proxy servers
Key loggers
Trojans and Backdoors
Viruses and worms
Sniffing
Social Engineering
Email Hacking and Prevention
Session Hijacking
Hacking Web Servers and Prevention
SQL Injection
XSS Attacks (Cross-Site Scripting)
CSRF Attacks (Cross-S Request Forgery)
DOS and DDOS Attacks
RFI and LFI
Working with Exploits
Buffer Overflows
Reverse Engineering
Cryptography
Firewalls and Honeypots
Physical Security
Hacking Wireless Networks
Penetration Testing
Hacking Routers
Hacking Mobile Phones
Computer Forensics
Web Application Penetration Testing
No comments:
Post a Comment