Beruflich Dokumente
Kultur Dokumente
o o
Attacks on E-Mail Password o Attackers Anatomy and Psychology while hacking the passwords o Technical Attacks Using Fake Websites: Phishing Keyloggers o Non-Technical Attacks Shoulder Surfing Dumpster Diving Social Engineering
Securing the E-Mail Passwords o Password Policies o Benefits of SSL Certificate for a User. o Anti Trust Policies Email Forensics o E-Mail Header Analysis o WhoisLookUp Query o Tracing a Sender of an E-Mail Tracing Senders IP Address Tracing Senders Location
Attacks on Windows Login Password o Resetting Windows login password without the old password 3
Other Security Measure o BIOS User and Supervisory password o Biometric o Implementing Syskey File Encryption Windows Inbuilt Flaws and Security Loopholes o Hidden Accounts o Backdoor Via Sticky Keys o Administrator Escalation on Limited accounts Invading into Computer System o Recovering BIOS Password o Recovering Biometric Password o Disabling Syskey File Encryption Optimizing Windows Computer System o Steganography Hiding Files behind an Image Restrict Hackers into box o Restricting Access to Files & Folders ACLs Calculation o Configuring Strong Password o Changing Boot Order o BIOS Password o Physical Security
Batch Programming Programming Development of Folder lockers Developing Professional Security tools Compilation and EXE Generation Detection and Manual Removal o Detecting Viruses o Process Monitoring o Manual Removal of Viruses o
Secure Network Configuration o Configuring Anti-Sniffers o MAC Filtering Restrictions o Configuration of WPA2 Keys
Directory Traversal Attacks Sever Side code Retrieval Putting breaks on Web Application attacks o Proper Monitoring o Proper Input Validation o Deny Google to your Website o Finding Backdoors in the Website o Secure Programming Mozilla Firefox as a Hacking tool Bypassing Proxy Intermediate o What is Proxy o Bypassing a Proxy Opening Block Websites o Using Google as Proxy o
o Manipulating the Code of EXEs Dis-assemblers & Debuggers o Olly DBG o Windows Dis-assembler Software Cracking & Serial Key Phishing o Analysing Assembly Code of Software o Tracing the Error Message o Setting Break Point o Stepping the Assembly Code o Checking the Registers for the Key Software Patching o Disassembling a Software o Error Tracing o Decoding the Instructions o Generating Patch to inject the instruction o Running the Patch Applying Application Security o Introduction to Application Encryption o Using the Setup Encrypters o Applying strong Serial Key Algorithms