Course Highlights
  • Ethical Hacking
  • Linux Commands
  • Kali Linux
  • Creating a Secure Environment
  • Footprinting
  • Scanning
  • Website Penetration Testing
  • Wireless Cracking
  • Man in the Middle Attacks
  • System Hacking
  • Python Programming Fundamentals
  • Coding Custom Pentesting Tools
  • Tips for Building a Career in Cyber Security
Curriculum

6 Topics
Introduction to the course
Kali Linux in a virtual machine setup
VirtualBox installation
Kali Linux installation
Enabling full-screen
Section 1 Quiz

3 Topics
Basic commands part 1
Basic commands part 2
Basic commands part 3

6 Topics
Changing IP address and wireless adapter setup
Creating a bootable Kali USB drive
Essential networking terms
Essential hacking terms
Additional Kali tools to install
Changing our MAC address with macchanger

6 Topics
Google hacking
Nikto basics
Whois tool
Email harvesting
Shodan
Zone transfer with Dig

9 Topics
Installing Metasploitable
Nmap part 1
Nmap part 2
Nmap part 3
Zenmap
TCP scans
Nmap bypassing defenses
Nmap scripts part 1
Nmap scripts part 2

24 Topics
Installing OWASP
HTTP request
HTTP response
Burpsuite configuration
Editing packets in Burpsuite
Whatweb and Dirb
Password recovery attack
Burpsuite login bruteforce
Hydra login bruteforce
Session fixation
Injection attacks
Simple command injection
Exploiting command injection vulnerability
Finding blind command injection
SQL basics
Manual SQL injection part 1
Manual SQL injection part 2
SQLmap basics
XML injection
Installing XCAT and preventing injection attacks
Reflected XSS
Stored XSS
Changing HTML code with XSS
XSSer and XSSsniper

13 Topics
Wireless attacking theory
Enabling monitor mode
Capturing handshake with airodump
RockYou.txt
Cracking with Aircrack
Cracking with Hashcat
Creating password lists with Crunch
Creating password lists with Cupp
Rainbow tables part 1
Rainbow tables part 2
Installing Fluxion
Finding and cracking hidden networks
Preventing wireless attacks

11 Topics
ARP protocol basics
Man in the middle attack theory
Installing MITMf
Manual ARP spoofing
Problems while installing MITMf
HTTP traffic sniffing
DNS spoofing and HTTPS password sniffing
Hooking browsers with BEEF
Screenshotting targets browser
Cloning any webpage
Ettercap basics

21 Topics
MSFconsole environment
Metasploit modules explained
Bruteforcing SSH with Metasploit
Attacking Tomcat with Metasploit
Getting Meterpreter with command injection
PHP code injection
2 Metasploitable exploits
Wine installation
Creating Windows payloads with Msfvenom
Encoders and Hex editor
Windows 10 Meterpreter shell
Meterpreter environment
Windows 10 privilege escalation
Preventing privilege escalation
Post exploitation modules
Getting Meterpreter over Internet with port forwarding
Eternalblue exploit
Persistence module
Hacking over the internet with Ngrok
Android device attack with Venom
The real hacking begins now!

11 Topics
Variables
Raw input
If-else statements
For loops
While loops
Python lists
Functions
Classes
Importing libraries
Files in Python
Try and except rule

20 Topics
Theory behind reverse shells
Simple server code
Connection with reverse shell
Sending and receiving messages
Sending messages with while true loop
Executing commands on target system
Fixing backdoor bugs and adding functions
First test using our backdoor
Trying to connect every 20 seconds
Creating persistence part 1
Creating persistence part 2
Changing directory
Uploading and downloading files
Downloading files from the internet
Starting programs using our backdoor
Capturing screenshot on the target PC
Embedding backdoor in an image part 1
Embedding backdoor in an image part 2
Checking for administrator privileges
Adding help option

7 Topics
Importing Pynput
Simple keylogger
Adding report function
Writing keystrokes to a file
Adding the keylogger to our reverse shell part 1
Adding the keylogger to our reverse shell part 2
Final project test

7 Topics
Printing banner
Adding available options
Starting threads for bruteforce
Writing function to run the attack
Bruteforcing router login
Bypassing antivirus with your future programs
Sending malware with spoofed email

6 Topics
What will you learn in this section?
Why is ethical hacking a valuable skill?
What is the best ethical hacking certification?
Tips for getting your first job as an ethical hacker
How I started my career as an ethical hacker
How to price your work

  Write a Review

Learn Ethical Hacking: Beginner to Advanced

Go to Paid Course