Special Halloween Offer

Save 20% on all courses by purchasing them now
watching now
2 Students

133 Lessons

Intermediate

What You Will Learn?

  • Know what is hacking, ethical hacking and different types of hackers
  • Create a fake Wi-Fi network with internet connection & spy on clients
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • Understand how websites & web applications work
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.

Curriculum

13h 48m
Section 2: Setting up The Lab
23:38
Lab Overview & Needed Software
07:49
Creating & Using Snapshots
05:36
Section 3: Linux Basics
16:32
Basic Overview of Kali Linux
05:11
The Terminal & Linux Commands
11:21
Section 4: Network Hacking
27:18
Network Penetration Testing Introduction
02:22
Networks Basics
04:29
Connecting a Wireless Adapter To Kali
05:09
What is MAC Address & How To Change It
08:20
Wireless Modes (Managed & Monitor)
06:58
Section 5: Network Hacking - Pre Connection Attacks
31:57
Packet Sniffing Basics Using Airodump-ng
06:41
WiFi Bands - 2.4Ghz & 5Ghz Frequencies
07:55
Targeted Packet Sniffing Using Airodump-ng
10:30
Deauthentication Attack (Disconnecting Any Device From The Network)
06:51
Section 6: Network Hacking - Gaining Access (WEPWPAWPA2 Cracking)
1:09:52
Gaining Access Introduction
01:10
WEP Cracking - Theory Behind Cracking WEP Encryption
05:48
WEP Cracking - Basic Case
06:18
WEP Cracking - Fake Authentication
06:46
WEP Cracking - ARP Request Replay Attack
06:10
WPAWPA2 Cracking - Introduction
03:43
WPAWPA2 Cracking - Exploiting WPS Feature
10:12
WPAWPA2 Cracking - How To Capture The Handshake
06:49
WPAWPA2 Cracking - Creating a Wordlist
07:33
WPAWPA2 Cracking - Using a Wordlist Attack
06:27
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network
06:26
Section 7: Network Hacking - Post Connection Attacks
2:12:51
Introduction
02:10
Installing Windows As a Virtual Machine
03:32
Information Gathering - Discovering Connected Clients using netdiscover
08:40
Gathering More Information Using Zenmap
06:46
Gathering Even More Information Using Zenmap
08:08
MITM - ARP Poisoning Theory
09:04
MITM - ARP Spoofing using arpspoof
06:30
MITM - ARP Spoofing Using MITMf
05:15
MITM - Bypassing HTTPS
06:40
MITM - DNS Spoofing
04:54
MITM - Capturing Screen Of Target & Injecting a Keylogger
09:51
MITM - Injecting JavascriptHTML Code
09:00
MITM - Using MITMf Against Real Networks
09:10
Wireshark - Basic Overview & How To Use It With MITM Attacks
09:09
Wireshark - Sniffing Data & Analysing HTTP Traffic
08:01
Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network
05:34
Creating a Fake Access Point (Honeypot) - Theory
09:15
Creating a Fake Access Point (Honeypot) - Practical
11:12
Section 8: Network Hacking - Detection & Security
11:01
Detecting ARP Poisoning Attacks
05:10
Detecting suspicious Activities Using Wireshark
05:51
Section 9: Gaining Access To Computer Devices
04:14
Gaining Access Introduction
04:14
Section 10: Gaining Access - Server Side Attacks
1:24:10
Installing Metasploitable As a Virtual Machine
06:22
Introduction
04:05
Basic Information Gathering & Exploitation
10:06
Using a Basic Metasploit Exploit
07:32
Exploiting a Code Execution Vulnerability
10:03
MSFC - Installing MSFC (Metasploit Community)
05:47
MSFC - Scanning Target(s) For Vulnerabilities
03:21
MSFC - Analysing Scan results & Exploiting Target System
09:42
Nexpose - Installing Nexpose
09:59
Nexpose - How To Configure & Launch a Scan
09:16
Nexpose - Analysing Scan Results & Generating Reports
07:57
Section 11: Gaining Access - Client Side Attacks
1:02:22
Introduction
02:20
Installing Veil 3.1
06:20
Veil Overview & Payloads Basics
07:21
Generating An Undetectable Backdoor Using Veil 3
09:44
Listening For Incoming Connections
07:19
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
07:13
Backdoor Delivery Method 1 - Using a Fake Update
09:49
Backdoor Delivery Method 2 - Backdooring Downloads on The Fly
08:24
How to Protect Yourself From The Discussed Delivery Methods
03:52
Section 12: Gaining Access - Client Side Attacks - Social Engineering
1:48:17
Introduction
02:44
Maltego Basics
05:49
Discovering Websites, Links & Social Networking Accounts Associated With Target
07:33
Discovering Twitter Friends & Associated Accounts
04:58
Discovering Emails Of The Target's Friends
08:41
Discovering Emails Of The Target's Friends
08:41
Backdooring Any File Type (images, pdf's ...etc)
04:41
Compiling & Changing Trojan's Icon
06:17
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc)
08:29
Spoofing Emails - Setting Up am SMTP Server
07:34
Email Spoofing - Sending Emails as Any Email Account
14:03
BeEF Overview & Basic Hook Method
06:39
BeEF - hooking targets using MITMf
02:58
BeEF - Running Basic Commands On Target
04:24
BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt
02:17
BeEF - Gaining Full Control Over Windows Target
03:40
Detecting Trojans Manually
05:32
Detecting Trojans Using a Sandbox
03:17
Section 13: Gaining Access - Using The Above Attacks Outside The Local Network
24:20
Overview of the Setup
06:07
Ex1 - Generating a Backdoor That Works Outside The Network
05:24
Configuring The Router To Forward Connections To Kali
06:59
Ex2 - Using BeEF Outside The Network
05:50
Section 14: Post Exploitation
43:32
Introduction
02:02
Meterpreter Basics
06:22
File System Commands
05:10
Maintaining Access - Basic Methods
05:07
Maintaining Access - Using a Reliable & Undetectable Method
06:53
Spying - Capturing Key Strikes & Taking Screen Shots
02:40
Pivoting - Theory (What is Pivoting)
07:07
Pivoting - Exploiting Devices on The Same Network As The Target Computer
08:11
Section 15: Website Hacking
08:08
Introduction - What Is A Website
04:16
How To Hack a Website
03:52
Section 16: Website Hacking - Information Gathering
42:37
Gathering Basic Information Using Whois Lookup
05:36
Discovering Technologies Used On The Website
06:04
Gathering Comprehensive DNS Information
10:24
Discovering Websites On The Same Server
03:43
Discovering Subdomains
05:06
Discovering Sensitive Files
07:26
Analysing Discovered Files
04:18
Section 17: Website Hacking - File Upload, Code Execution & File Inclusion Vulns
36:16
Discovering & Exploiting File Upload Vulnerabilities
06:44
Discovering & Exploiting Code Execution Vulnerabilities
07:26
Discovering & Exploiting Local File Inclusion Vulnerabilities
05:16
Remote File Inclusion Vulnerabilities - Configuring PHP Settings
03:46
Remote File Inclusion Vulnerabilities - Discovery & Exploitation
05:44
Preventing The Above Vulnerabilities
07:20
Section 18: Website Hacking - SQL Injection Vulnerabilities
59:44
What is SQL
05:49
Dangers of SQL Injection Vulnerabilities
02:54
Discovering SQL injections In POST
07:57
Bypassing Logins Using SQL injection Vulnerability
04:49
Discovering SQL injections in GET
07:02
Reading Database Information
05:26
Finding Database Tables
03:34
Extracting Sensitive Data Such As Passwords
04:29
Reading & Writing Files On The Server Using SQL Injection Vulnerability
05:58
Discovering SQL Injections & Extracting Data Using SQLmap
06:48
The Right Way To Prevent SQL Injection
04:58
Section 19: Website Hacking - Cross Site Scripting Vulnerabilities
20:37
Introduction - What is XSS or Cross Site Scripting
03:09
Discovering Reflected XSS
03:47
Discovering Stored XSS
02:57
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
05:31
Preventing XSS Vulnerabilities
05:13
Section 20: Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
08:30
Scanning Target Website For Vulnerabilities
04:19
Analysing Scan Results
04:11

Description

Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY – Wireless adapter that supports monitor mode (more info provided in the course).

About the Instructor

100% of students rated this instructor as excellent!
Reviews 0
Students 5
Courses 3

My name is Zaid, I am an ethical hacker, a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo