You will be taken to the basics of Linux, Computer systems, Networks and also learn how the devices communicate with one another and how to carry out a number of attacks how we can exploit these systems will be shown to you in this course. You will begin as a beginner without any prior knowledge about testing or hacking in penetrating. You will learn basic information about ethical hacking and its various fields. You will gain the theoretical concept behind the attacks as this very is focuses more on practical knowledge. First, you will learn to set up a lab and how to install the required software so that you can practice the testing of penetration on your own machine.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
4 Sections:
- Network Penetration Testing
- Pre-Connection
- Post-Connection
- Gaining Access
- Gaining Access
- Server Side Attacks
- Client-Side Attacks
- Post Exploitation
- Web Application Penetration Testing
Following are the basics you will acquire:
- Ethical Hacking and Computer Security 120 Videos
- Learn about what exactly is ethical hacking about and computer security
- Different ethical hacking fields
- To practice, hacking learn to set a lab environment
- How to intall Kali Linux
- How to install Windows and the operating systems that are vulnerable
- Learn about the network penetration testing
- How devices interact inside a Network and the basics of network
- Practical attacks which can be used to the target network without knowing about the key.
- ARP – Spoofing and Poisoning
- By using a number of methods crack WEP/WPA/WPA2
- Clients and Networks like OS Opened Ports
- Spying on the clients and creating a Fake Wi-Fi Network
- Without knowing the password control the Connections of clients
- Gain access to an account that is client accessed in your network
- Fix XSS vulnerabilities & protect yourself from them as a user
Target en-rollers for this course:
- Techies and IT Professionals seeking forward to learn network penetration testing
- Folks who are keen to discover ways of protecting networks from hackers
Some exceptional benefits associated with this course enrolment are:
- Quality course material
- Lifetime access to the course
- Instant & free course updates
- Access to all Questions & Answers initiated by other students as well
- Personalized support from the instructor’s end on any issue related to the course
- Few free lectures for a quick overview
- Certificate of completion
It’s time for you to grab the opportunity and make the most out of this course.
Enroll today!!
Course Curriculum
- Gaining Access Introduction
- WEP Cracking Theory Behind Cracking WEP Encryption
- WEP Cracking Basic Case
- WEP Cracking Fake Authentication
- WEP Cracking ARP Request Replay Attack
- WPA Cracking Introduction
- WPA Cracking Exploitation WPS Feature
- WPA Cracking Theory Behind WPA/ WPA 2 Cracking
- WPA Cracking How to Capture the Handshake
- WPA Cracking Creating A WordList
- WPA Cracking Using A Wordlist attack
- Section
- How to Configure Wireless Security Settings To Secure Your Network
- Introduction
- Information Gathering – Discovering Connected Clients using net discover
- Gathering More Information Using Autoscan
- Gathering Even More Information Using Zenmap
- MITM – ARP Poisoning Theory
- MITM – ARP Spoofing using arpspoof
- MITM – ARP Spoofing Using MITMf
- MITM – Bypassing HTTPS
- MITM – Session Hijacking
- MITM – DNS Spoofing
- MITM – Capturing Screen Of Target & Injecting a Keylogger
- MITM – Injecting Javascript/HTML Code
- MITM – Using MITMf Against Real Networks
- Wireshark – Basic Overview & How To Use It With MITM Attacks
- Wireshark – Sniffing Data & Analysing HTTP Traffic
- Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network
- Introduction
- Basic Information Gathering and Exploitation
- Using A Basic Metaspoilt Exploit
- Exploiting a Code Execution Vulnerability
- MSFC Installing MSFC Metaspoilt Community
- MSFC Scanning Targets For Vulnerabilities
- MSFC SAnalysing Scan Results and Exploiting Target System
- Nexpose Installing Nexpose
- Nexpose How to configure and Launch a Scan
- Nexpose Analyzing scan results and generating reports
- Gaining Access- Client Side Attacks Introduction
- Installing Veil 3
- Veil Overview and Payloads Basics
- Generating and Undetectable Backdoor Using Viel 3
- Listening For Incoming Connections
- Using a Basic Delivery Metgod To Test The Backdoor and Hack Windows 10
- Hacking Windows 10 Using Fake Update
- Backdooring Downloads on The Fly to Hack Windows 10
- How to Protect Yourself From The Discussed Delivery Methods
- Introduction
- Maltego Basics
- Discovering Websites Links Social Networking Accounts Associated with Target
- Discovering Twitter Friends and Associated Accounts
- Discovering Email of the Target Friends
- Analysing The Gathered Info & Building An Attack Strategy
- Backdooring Any File type (images, pdfs)
- Compiling and Changing Trojan’s Icon
- BeEF Overview and Basic Hook Method
- BeEF Hooking Targets Using MITMf
- BeEF Running Basic Commands on Targets
- BeEF Stealing Credentials/ Passwords Using A Fake Login Prompt
- BeEF Gaining Full Control Over Windows Target
- Detecting Trojan Manually
- Detecting Trojan Using a Sandbox
- Post Exploitation Introduction
- Meter Basics
- File System Commands
- Maintaining Access- Basic Methods
- Maintaining Access- Using a Reliable and Undetectable Methods
- Spying Capturing Key Strikes and Taking Screen Shots
- Pivoting Theory (What is Pivoting)
- Pivoting- Exploiting Devices on the Same Network As The Target Computer
- Discovering & Exploiting File Upload Vulnerabilities
- Discovering & Exploiting Code Execution Vulnerabilities
- Discovering & Exploiting Local File Inclusion Vulnerabilities
- Remote File Inclusion Vulnerabilities – Configuring PHP Settings
- Remote File Inclusion Vulnerabilities – Discovery & Exploitation
- Preventing The Above Vulnerabilities
- What is SQL
- Dangers of SQL Injection Vulnerabilities
- Discovering SQL Injections in POST
- Bypassing Logins Using SQL Injection Vulnerability
- Discovering SQL Injections in GET
- Reading Database Information
- Finding Database Tables
- Extracting Sensitive Data Such As Passwords
- Reading & Writing Files On The Server Using SQL Injection Vulnerability
- Discovering SQL Injections & Extracting Data Using SQLmap
- The Right Way To Prevent SQL Injection