+91-8630368818 [email protected]

The Complete Mentorship Package for Ethical Hacking!

BE A SUPERHERO

DO COOL STUFF

LEARN BADASS SKILLS

I’ll help you get rid of years of experimentation and frustration!

Hey, I’m your mentor 🙂

Hacker 😎 | Trainer 👨‍🏫 | Author ✍ | Digital Marketer 🌐

Manish Pundeer

I’m Manish Pundeer, the founder of HackWorms, HackLikePro, and many other online ventures.

Back in 2014, I started my Cyber Security journey

With over 7 years of experience, I worked as a Web Developer, Network Security Engineer & Pentester

As of now, I am working as a pentester @Walmart & Running a Startup HackWorms

I have worked with multiple tech companies like Capgemini, Lucideus, TCS, ANR & Walmart.

Cyber Security is BOOMING Right Now!

Cyber Attacks are growing year after year!

Here’s your chance to take a sweet pie off this industry!

Introducing HackLikePro Masterclass

HackLikePro Masterclass Is the Ultimate Cyber Security Training Package

Many newbies need real-life guidance, where their questions will be addressed, hence I created this ultimate training program!

What You Will Get In This Masterclass?

Live 90+ Hours Training

In-depth live session, teaching you A-Z of hacking to dominate in Cyber Security field.

Processes and checklist

Checklists, documentations, templates and standard operating procedures to get better results.

Community of Like-Minded Hackers

You get to ask questions, network with hackers, get ongoing accountability and support with our community.

Why Masterclass?

R

Created by a practitioner who already worked for many tech companies.

R

Over 90+ in-depth live sessions that are easy to understand.

R

The core training videos are completely documented and summarized.

R

You get access to all the templates, checklists & resources.

R

We implement accountability mechanisms to ensure your success.

R

Full transparency (strategies, websites) – With over-the-shoulder guidance.

R

Community support to help you get ongoing support.

Masterclass is not for

Q

You don’t know the importance of borrowing  experience while learning new skills.

Q

You believe in shortcuts. You don’t want to learn basics.

Q

You don’t have a passion – Passion is the only thing that keeps you motivated.

Q

You don’t believe in the fact that cyber security is the future.

Q

You know that you fail to implement what I teach and just want intellectual entertainment.

Q

You treat investing in self-education as an expenditure.

Q

You don’t know the importance of proper mentorship.

PROBLEMS WITH OTHER COURSES

No personalized guidance and 121 interaction.

Not created by practitioners with proven results.

The lectures are structured poorly with no logical flow.

Filled full of theories with no support.

Just a set of videos and do not present you exact systems, processes & real world problems.

The HackLikePro Masterclass

20+ Modules

Live 90+ Hours

Support

What Will You Learn?

Introduction to Information Security

  • Introduction
  • Need of Information Security
  • Ethical Side of Hacking
  • Steganography
  • Latest Test Cases
  • Cyber Law & Indian IT Acts
  • Conclusion

Information Gathering & Foot printing

  • Digital Foot Print
  • Information Gathering
  • Who Is Information
  • Web Server Details
  • Reverse IP Mapping
  • People Search
  • Tools to perform Digital Foot printing

Email Security

  • Phishing Attacks – Desktop Phishing
  • Spear Phishing
  • IDN Homograph Attack
  • Social Engineering
  • Fake Emails
  • Identify Fake Emails
  • Key Loggers
  • Email Encryption
  • Security Counter Measures

IDS, Firewalls & Honey Pots

  • Introduction to Firewalls
  • Network Firewalls
  • Web Application Firewalls
  • Weakness in Firewalls
  • Intrusion Detection Systems and weakness
  • Intrusion Prevention Systems and weakness
  • Honey Pots and Security Misconfiguration

System Hacking

  • OS Login Bypass
    • Introduction to Authentication Mechanisms
    • Tools to Defeat Authentication
  • Malware Illustration – Virus, Worms, Trojans
  • Create Virus
  • Create Trojans
  • Evade Antivirus & Firewalls
  • Scan System for Malicious Applications

Network Attacks

  • Introduction to Network Attacks
  • Man in the Middle Attack
    • ARP Poisoning
    • SSL Stripping

Mobile Security

  • Introduction to Mobile Platforms
  • Security Architecture of Mobile Platforms
  • Introduction to VoIP
  • VoIP Calls from any number to any number – Fake Calls
  • Android Exploitation Framework

Network Attacks

  • Introduction to Network Sniffing
  • Packet Sniffing – Wireshark
  • Packet Analysis
  • Display & Capture Filters
  • Network Attacks – Ettercap
    • DNS Poisoning
    • ARP Poisoning
    • Denial of Service

Cryptography

  • Introduction to Crypto Techniques
  • Types of Encryptions & Hashes
  • Crypto Analysis
  • Insecure Cryptographic Storage

Network Vulnerability Scanning

  • Introduction to Network
  • Vulnerability Scanning
  • Vulnerability Assessment using Nessus
  • Scanning Policies
  • Vulnerability Assessment using Open VAS
  • Report Generation
  • Patch Critical Loopholes
  • System Hardening
  • Secure System Configuration

Exploitation:2 Metasploit Framework

  • OS Detection
  • Open Port & Service Detection
  • Metasploit Framework Architecture
  • Various Interfaces of Metasploit Framework
  • Basic Terminologies
  • Vulnerability Analysis
  • Exploitation on Various Platforms
  • Evade Anti-Virus & Firewalls
  • Metasploit Scripting
  • Create Custom API to test Window Security
  • Configure Nmap with Metasploit Framework
  • SET
  • Ways to deliver Expolits

Basics of Network & Web Technology

  • Introduction
  • IP Address
  • NAT
  • IP Subnets
  • DHCP Server
  • Ports
  • DNS
  • Proxy Servers
  • Virtual Private Networks
  • DNS Server
  • OSI Model
  • Web Architecture
  • Server Configuration
  • HTML Basics
  • PHP Basics
  • Python Basics
  • JavaScript Basics

Google Hacking Database

  • Use Google to craft attacks
  • Advanced operators of Google
  • Find Vulnerabilities using Google
  • Security Countermeasures

Web Application Vulnerability Assessment & Penetration Testing

  • Introduction to Web Architecture
  • Web Security Generic Misconceptions
  • Introduction to DBMS – MySQL, MS SQL, Oracle, DB2
  • Introduction to SQL
  • OWASP Top 10 Attacks
  • Brute Forcing Attack
  • Heartbleed Attack
  • Shell Shock / Bashbug
  • HTTP Response Splitting
  • Denial Of Service Attacks
  • Vulnerability Analysis using Burpsuite
  • Arbitrary File Upload
  • Applications to Automate VAPT

Linux Basics

  • Install and setup
  • Introduction to Linux based
  • Pentesting OS
  • System Architecture
  • Network Configuration
  • Essential Commands

Wireless Security

  • Introduction to Wireless Technology
  • MAC Filtering
  • Packet Encryption
  • Packet Sniffing
  • Types of Authentication
  • Types of Attacks
    • ARP Replay Attack
    • Fake Authentication Attack
    • De-Authentication Attack
  • Security Countermeasures
  • Cracking Password
  • Phishing

Reverse Engineering

  • Introduction to Reverse Engineering
  • Windows Memory Management System
  • Assembly Language Basics
  • Application Debuggers & Disassemblers
  • Application Cracking, Patching & Keygenning

Exploitation:1 Buffer Overflow Attacks

  • Introduction to X86 Architecture
  • Memory Analysis
  • Shell Code Compilation
  • Vanila Exploit
  • Stack Overflow
  • Egg Hunting

Penetration Testing

  • Ethics of a Penetration Tester
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Scope Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Router Penetration Testing
    • Brute Force Attacks
    • Router Exploitation
    • Reset Framework
  • Denial of Service Penetration Testing
    • Scalability Analysis
    • Load Balancer Testing
  • Physical Security Penetration Testing
     Input – Output Device Access Policy
  • Database Penetration Testing
    • Security Misconfigurations
    • Insecure Cryptographic Storage
  • VoIP Penetration Testing
  • VPN Penetration Testing & report generation
  • Penetration Testing Report Analysis
  • Penetration Testing Report and
  • Documentation Writing
  • Penetration Testing Deliverables and Conclusion

Start Your Journey Today

Instant access to the Masterclass

One-time payment. No hidden fees.

Need Help or Have Questions?

If you have any doubts regarding the training course OR

Want to get more clarity whether Masterclass is right for you? Get in touch with us.

Would You Like to Have
Manish Pundeer’s Experience Work For You?

HackWorms - Logo

HackWorms is the Best WebSite Designing, Logo Desiging, Website Development, App Development and Digital Marketing Company in Meerut. HackWorms also provide Ethical Hacking & Digital Marketring Training & According to Google Reviews HackWorms is the Best Ethical Hacking Training Institute in Meerut.

HackWorms

B-3 Old Sai Plaza, Near Canara ATM, Kankerkhera, Meerut Cantt.
Uttar Pradesh – 250001

Give Us a Call

+91-8630368818, +91-8791593765

Get In Touch