watching now
4 Students

Description

What Will You Learn?

  • What different types of hackers represent
  • How to improve the security of your own computer
  • How to help others find vulnerabilities in their systems

Requirements

  • Basics in Python
  • Basics in C
  • NFT Certificate
  • 144 Lessons
  • Beginner
  • English
  • 5.0 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 27h 33min of content, in total.

Section 2: Basic Commands!
43:36
Basic Commands Part 2
21:06
Basic Commands Part 3
12:48
Section 3: Prepare Your Lab!
53:17
Changing IP address and setting up Wireless Adapter
04:54
Creating Bootable Kali USB
05:00
Important Networking Terms
10:18
Important Hacking Terms
18:05
Few Things to Do After Installing Kali Linux
08:33
Changing Our Mac Address - Macchanger
06:27
Section 4: Footprinting!
54:33
Google Hacking
13:12
Nikto Basics
10:56
Whois Tool
06:41
Email Harvesting
06:09
Shodan
10:25
Zone Transfer With Dig
07:10
Section 5: Scanning!
1:51:28
Installing Metasploitable
07:00
Nmap Part 1
15:34
Nmap Part 2
11:44
Nmap Part 3
12:26
Zenmap
07:55
TCP scans
15:53
Nmap Bypassing Defences
17:24
Nmap Scripts 1
09:31
Nmap Scripts 2
14:01
Section 6: Web Penetration Testing!
4:39:25
Installing Owasp
08:28
HTTP request
10:01
HTTP Response
10:30
Burpsuite Configuration
12:51
Editing Packets in Burpsuite
12:21
Whatweb & Dirb
10:12
Password Recovery Attack
15:35
Burpsuite Login Bruteforce
11:06
Hydra Login Bruteforce
08:48
Session Fixation
13:55
Injection Attacks
05:35
Simple Command Injection
11:11
Exploiting Command Injection Vulnerability
07:44
Finding Blind Command Injection
13:46
Webpentest - Basics Of SQL
10:27
Manual SQL Injection Part 1
13:17
Manual SQL Injection Part 2
21:00
SQLmap basics
16:37
XML Injection
16:00
Installing XCAT and Preventing Injection Attacks
05:53
Reflected XSS
10:53
Stored XSS
12:01
Changing HTML Code with XSS
07:34
XSSer & XSSsniper
13:40
Section 7: WPA2 Cracking
2:25:27
Wireless Attacks Theory
10:52
Putting Network Card in Monitor Mode
04:41
Capturing Handshake With Airodump
14:40
RockYou.txt
14:00
Cracking with Aircrack
15:36
Cracking with Hashcat
15:00
Making Password Lists With Crunch
18:23
Making Password Lists With Cupp
07:13
Rainbowtables Part 1
16:37
Rainbowtables Part 2
05:41
Installing Fluxion
06:21
Finding and Cracking Hidden Network
08:22
Preventing Wireless Attacks
08:01
Section 8: Man In The Middle
1:59:43
ARP Protocol Basics
10:31
MITM Attack Theory
07:22
Installing MITMf
06:38
Manual Arpspoofing
12:51
Problems While Installing MITMf
06:22
HTTP Traffic Sniffing
08:32
DNS Spoofing and HTTPS Password Sniffing
24:21
Hooking Browsers With BEEF
16:04
Screenshotting Targets Browser
11:04
Cloning Any Webpage
08:57
Ettercap Basics
07:01
Section 9: System Hacking
4:14:19
MSFconsole Environment
16:10
Metasploit Modules Explained
12:14
Bruteforcing SSH with Metasploit
15:20
Attacking Tomcat With Metasploit
08:53
Getting Meterpreter With Command Injection
25:08
PHP Code Injection
05:46
2 Metasploitable Exploits
07:01
Wine installation
12:05
Crafting Windows Payloads With Msfvenom
10:05
Encoders & Hexeditor
18:45
Windows 10 Meterpreter Shell
12:02
Meterpreter Environment
11:31
Windows 10 Privilege Escalation
11:31
Preventing Privilege Escalation
06:24
Post Exploitation Modules
14:14
Getting Meterpreter Over Internet With Port Forwarding
10:43
Eternalblue Exploit
20:20
Persistence Module
13:19
Hacking Over Internet With Ngrok
10:26
Android Device Attack With Venom
09:56
Real Hacking Begins Now!
02:26
Section 10: Python Basics
1:46:57
Variables
13:45
raw_input
10:50
IF ELSE statement
10:20
FOR loop
06:33
WHILE loop
08:24
Python Lists
08:07
Functions
14:34
Classes
10:25
Importing Libraries
07:01
Files in Python
11:44
Try and Except rule
05:14
Section 11: Coding Advance Backdoor
4:17:11
Theory Behind Reverse Shell
06:50
Simple Server Code
12:44
Connection With Reverse Shell
07:11
Sending and Receiving Messages
10:49
Sending Messages With While True Loop
07:54
Executing Commands On Target System
09:38
Fixing Backdoor Bugs & Adding Functions
20:10
Installing Pyinstaller
02:26
First Performance Test of Our Backdoor
18:01
Trying to Connect Every 20 seconds
12:27
Creating Persistence Part 1
06:12
Creating Persistence Part 2
16:50
Changing Directory
11:55
Uploading & Downloading Files
22:32
Downloading Files From Internet
22:46
Starting Programs From Our Backdoor
06:47
Capturing Screenshot On Target PC
18:46
Embedding Backdoor In Image Part 1
13:29
Embedding Backdoor In Image Part 2
08:40
Checking For Administrator Privileges
12:12
Adding Help Option
08:52
Section 12: Creating Keylogger For Backdoor
1:30:11
Importing Pynput
10:24
Simple Keylogger
10:00
Adding Report Function
10:36
Writing Keystrokes To a File
14:01
Adding Keylogger To Our Reverse Shell Part 1
23:01
Adding Keylogger To Our Reverse Shell Part 2
07:43
Final Project Test
14:26
Section 13: Basic Authentication Bruteforcer
1:25:04
Printing Banner
11:21
Adding Available Options
11:16
Starting Threads For Bruteforce
08:27
Making Function To Run The Attack
11:05
Bruteforcing Router Login
09:40
Bypassing Antivirus With All Your Future Programs
13:43