Khichdi Online - just about everything

So you think you can Hack -Here are 60 skills you must Know

Category : All, Education, Future, Tech-Digital · by Feb 19th, 2015

Does intrusion detection, social engineering, denial of service, session hijacking and being able to hack web servers sound like your idea of fun? If so, then a career as an Information Security professional, or ethical hacker, might just be for you .

Today all Businesses and government-related organizations are serious about their network security hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud.

60 skills you must have to become a successful ethical hacker

  1. Information Intelligence
  2. Organize Your Information
  3. Google/Bing Hacking
  4. Hunting And Profiling People
  5. Gathering Email Accounts Sub domains/host.
  6. Whois Lookup.
  7. OS Info Hunting.
  8. Uptime Info Hunting.
  9. Web server Info Hunting.
  10. Trace route Target IP Address.
  11. TCP Port Scanning.
  12. TCP SYN Port Scanning.
  13. TCP ACK Firewall Scanning.
  14. Finding Live Hosts.
  15. UDP Sweeping And Probing.
  16. Database Enumerating.
  17. MySQL Server Enumerating.
  18. DNS Enumerating.
  19. SNMP Enumerating.
  20. Password Attacks.
  21. Advanced Web Server Fingerprinting.
  22. Advanced Web Application Fingerprinting.
  23. Advanced Web Application Firewall Fingerprinting.
  24. Advanced OS Fingerprinting.
  25. Attacking DHCP Servers.
  26. Writing Virus Codes.
  27. Writing Advance Backdoors for Windows.
  28. Attacking Network Switches.
  29. Attacking FTP Servers.
  30. Advanced Social Engineering Attacks.
  31. Advanced Cross Site Scripting attacks.
  32. From Reflected XSS To Reverse Shell.
  33. From Stored XSS To Reverse Shell.
  34. Advanced File Handling Attacks.
  35. From File Upload To Reverse Shell.
  36. From Remote File Inclusion To Reverse Shell.
  37. From Local File Inclusion To Reverse Shell.
  38. From SQL Injection To Reverse Shell.
  39. Advanced CSRF Attacks.
  40. Session Hijacking Attacks.
  41. Advanced System Command Injection Attack.
  42. Sniffing Network Passwords.
  43. Sniffing HTTP Passwords.
  44. Sniffing Ftp And Telnet Passwords.
  45. Advanced Sniffing.
  46. Sniffing Facebook Cookies.
  47. Advanced SSL Sniffing.
  48. Advanced Network Attacks.
  49. From Man In The Middle Attack To Full Network.
  50. Advanced Mobile Hacking Tactics.
  51. Attacking WEP Protected 802.11 Networks.
  52. Attacking WPA/WPA2 Protected 802.11 Networks.
  53. Attacking Apache Web Server.
  54. Attacking IIS Web Server.
  55. Buffer Overflow Attacks.
  56. Advanced Stateful Packet Inspection Firewall Evasion And Bypassing.
  57. Advanced Antivirus Detection Evasion And Bypassing.
  58. Advanced Firewall Outbound/Inbound Rules Evasion And Bypassing.
  59. Advanced Windows User Access Control (UAC) Evasion And Bypassing.
  60. Vulnerability Vs Penteration Testing.

Like this post? Or have something to share? Write to us: , or

Don't be Selfish :) Share

(4) comments

[…] you know that you can get a degree in Ethical Hacking or Rural Study ? Or that you could earn a whopping amount of salary by Doing Humanitarian work ? Or […]

Your method of describing the whole thing in this article is truly
pleasant, all can simply understand it, Thanks a lot.

Wonderful blog! I found it while surfing around on Yahoo News.
Do you have any suggestions on how to get listed in Yahoo News?

I’ve been trying for a while but I never seem to get there!
Many thanks

Remarkable! Its in fact amazing article, I have got much clear idea regarding from this post.

Leave a Reply

Your email address will not be published.