Special Halloween Offer

Save 20% on all courses by purchasing them now
watching now
89 Students

103 Lessons

Beginner

What You Will Learn?

  • Exploit the Web for Your Own Personal Needs
  • The Usage of Terminal
  • Creating an Inflicted USB
  • How to Utilize Social Engineering
  • How to Hack Hardware

Curriculum

13h 15m
Section 1: Basic Theory ( Optional )
19:29
Process of Hacking
07:12
Types of Penetration Testing
04:28
Section 2: Setting up the Operating System
09:00
Setup Kali Linux
04:35
VirtualBox Guest Additions
04:25
Section 3: Learn to use the Terminal
58:21
Navigation Commands
13:25
File Operations Part 1
11:27
File Operations Part 2
14:15
Permission and Ownership
19:14
Section 4: Web Hacking Lab
32:59
Setup DVWA on Localhost
05:51
Configure Database and User
13:32
Fixing Issues Part 1
09:26
Fixing Issues Part 2
04:10
Section 5: Pre-Requisite Tool - BurpSuite
17:42
Burp Installation
03:18
Scanner, Intruder and Repeater
05:02
Target, Proxy and Spider
05:25
Wrapping up BurpSuite
03:57
Section 6: Web Hacking on Low Security
1:39:08
CSRF on Low Security
09:15
XSS Reflected on Low Security
04:39
XSS Stored on Low Security
12:09
XSS DOM on Low Security
02:34
Cookie Stealing with XSS
18:10
File Upload on Low
04:28
Creating a Backdoor
11:46
File Inclusion on Low Security
05:09
Command Injection on Low Security
05:41
Brute Forcing on Low Security
08:10
SQL Injection on Low and Medium
17:07
Section 7: Web Hacking on Medium Security
28:11
CSRF on Medium Security
08:06
XSS Reflected on Medium Security
01:56
XSS Stored on Medium Security
05:28
XSS DOM on Medium Security
02:20
File Upload on Medium Security
05:00
Command Injection on Medium Secirity
05:21
Section 8: Get Deep in Web Hacking
44:29
File Upload on High Security
07:59
Introduction to Weevely
08:07
XSS Reflected on High Security
05:05
XSS Stored on High Security
04:55
SQL Injection Manual Method
14:15
SQL Injection Hash Decoding
04:08
Section 9: Anonymity and Deception
1:43:07
Change your Mac Address
12:43
Introduction to AirVPN
07:13
Watch for DNS Leaks
04:30
FAKE ID (LIVE DEMO)
02:55
Using a Virtual Private Network
05:55
VPN to TOR Circuit
02:34
TOR to VPN Circuit
06:51
Using TOR ( The Onion Browsing )
10:17
Temporary Email Can Help!
02:39
Random Identity
04:08
Changing IP using Proxy
05:19
Port Forwarding over VPN
08:33
How to Spoof your Phone Call
09:34
How to create a FAKE ID
14:46
Making Temporary Debit Cards
05:10
Section 10: Human is the Weakest link
41:37
Open Source Intelligence Data Gethering on People
17:04
SE Techniques 1
02:57
SE Techniques 2
04:39
SE Techniques 3
04:17
SE Techniques 4
05:59
SE Techniques 5
06:41
Section 11: HID Bad Usb Attack
1:16:27
Getting Arudino
16:15
Arduino Basic Setup
08:05
Writing Ducky Scripts
16:23
Meterpreter Shell Through HID
17:53
Meterpreter Shell Demo
06:23
DigiSpark - A Compact Alternative
07:52
DigiSpark Continued
03:36
Section 12: GoPhish Framework - The Most Advance Phishing Tool
1:32:24
Getting GoPhish
03:04
Starting GoPhish
02:43
GoPhish on a Server
13:33
Domain Name on GoPhish Server
09:28
SSL on GoPhish Server
09:14
SSL on GoPhish Server Continued
15:18
GoPhish Sending Profile
11:05
Launching out the Campaign
08:12
Sending E-Mails
08:05
Opening the Spoofed E-Mail
09:03
Analysing the Submitted Data
02:39
Section 13: Information Gathering
1:00:52
Downloading the Source Code of the Website
05:27
Using Components with Known Vulnerabilities
05:38
Enemurating Subdomains
10:24
Looking for Some Archived Page for Information Gathering
05:16
Google Dorks live demo
05:33
Enemurating Directories
04:26
Information Gathering Using WhatWeb
03:31
Information Gathering Using TheHarvester
06:04
Different Type of Nmap Scan Theory
05:50
Different Type of Nmap Scan Demo
04:38
Banner Grabbing Using Nmap
04:05
Section 14: Attack Like a Pro using MetaSploit
46:14
Setting Up the Database
04:29
Overview to Meterpreter
12:02
MetaSploit - MultiHandler
09:49
MetaSploit - MSFVenom
06:55
Metasploit - Encoders
12:59
Section 15: The Venom
40:00
Introduction to venom
10:34
Setup Venom on your System
14:35
Venom Android Payload
07:02
Venom Windows Payload
07:49
Section 16: Reporting to Clients
25:03
Reporting Part 1
09:31
Reporting Part 2
01:52
Reporting Part 3
08:39
Reporting Part 4
05:01

Description

Requirements

  • The very Fundamental Basics of Terminal
  • Hardware Knowledge is Advised

About the Instructor

Reviews 85
Students 14,431
Massive audience
Courses 4

He is a Best Selling Infosec Author. The MyTutorialRack calls him a Top IT Ninja on the web, VestaCP says he is one of the top experts, and 20000+ Students says he created one of the Best Ethical Hacking Courses on the Planet. He was recognized as a top 100 Cyber Geek at the age of 18 by International Science Association and a top 200 Information Security Researcher by the Infosec4tc.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo