Chapter 1 - Base-1 : Basic
- 1. Understanding Basic
- 2. About Domain
- 3. Domain Extraction
- 4. About Email
- 5. Email Extraction
- 6. About Server
- 7. Server Types
- 8. About OS
- 9. OS Types
- 10. About IP/networking
- 11. IP and Netwoking attack methodology
- 12. CDR analysis
- 13. Mobile Tracking
Chapter 1 - Base-2 : Cyber Awareness
- 1. Mobile Security
- 2. Social Media Security
- 3. Internet Banking Security
- 4. UPI and Payment Security
- 5. Fake ID and Internet Privacy
- 6. ATM Security
Chapter - 2 : Web Development Front End and Server setup
- 1. HTML 1
- 2. HTML 2
- 3. PHP web Server Hosting 1
- 4. Apache web Server Hosting 2
- 5. Static IP
- 4. Log Analysis
Chapter - 2 : Web Development Back End and Server setup
- 1. PHP Basic 1
- 2. Connecting Frontend & Backend
- 3. PHP Basic 2
- 4. PHP Basic 3
- 5. Setting up Server and Live attack
- 6. All About Web Hosting
- 7. Setting up Cloud Hosting Server
- 8. All about DNS Server
Chapter - 3 : Social Media Hacking
- 1. About Social Media Hacking
- 2. Ways to attack Social Account
- 3. Live Demo pishing Attack
- 4. Live PayPal Account Hacking
- 5. Complete Web App coding
- 6. Instagram Account Hacking
- 7. Google Account Hacking
- 8. FaceBook Account Hacking
- 9. NetFlix Account Hacking
- 10. ADobe Account Hacking
- 11. SnapChat Account Hacking
- 12. Spotify Account Hacking
- 13. Twitch Account Hacking
- 14. Twitter Account Hacking
- 15. Spear phishing Attack
- 16. Python KeyLogger
- 17. PHP KeyLogger
- 18. Live KeyLogger attack
- 19. About Session attack
- 20. Session Attack
- 21. Google Session Attack(Live)POC
- 22. FITBIT Session Attack(Live)POC
- 23. TripAdvisor Session Attack(Live)POC
Chapter - 4 : Web Hacking
- 1. About IDN Attack
- 2. About Spf Attack
- 3. Spf Live Attack
- 4. Attacking the Attacker
- 5. Burp SetUp
- 6. All About Burp
- 7. Brute Forcing Attack with Burp
- 8. Dictionary Attack with Burp
- 9. Stealing Attacker DB
- 10. Hijacking Attacker DB
- 11. Prevention
Chapter - 5 : Mobile Hacking
- 1. About Mobile Hacking
- 2. Creating Trojan
- 3. Delivering Trojan
- 4. Understanding Console
- 5. Mobile Shell
- 6. Activity Starting
- 7. SMS Hacking
- 8. Path Explore
- 9. WebCam Hacking
- 10. Port Forwarding
- 11. Getting Connection
- 12. Static Ip
- 13. Static IP Setup
- 14. Payload with Static IP
- 15. Getting Connection (SIP)
- 16. Automated Hacking
- 17. Hacking Android with Python
- 18. Hacking Android with Bash
- 19. Hacking Android with Link
- 20. Hacking Android with USB
- 21. Hacking someone android(LIVE)IP
- 21. Android Prevention
Chapter Base - 6 : Real Time Cyber Crime case
- 1. Case 1
- 2. Case 2
- 3. Case 3
Chapter Base - 7 : Rf Hacking
- 1. About RF
- 2. RF Hacking 1
- 3. RF Hacking 2
Chapter Base - 8 : ATM Card Hacking
- 1. About ATM Card
- 2. Exploiting ATM Card
Chapter Base - 9 : Call / Mobile Tracking
- 1. Real-World CDR analysis
- 2. Mobile Tracking