Ethical Hacking and Penetration Testing ( Kali Linux )

Learning outcomes from this course : Install hacking lab & needed software (works on Windows, OS X and Linux). Install windows & vulnerable operating systems as virtual machines for testing. Discover vulnerabilities & exploit them hack into servers. Hack & secure both WiFi & wired networks. Use many hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc. Hack secure systems using client-side and social engineering attacks. Learn Network Penetration Testing. Learn linux commands and how to interact with the terminal.Network basics & how devices interact inside a network. Gather detailed information about clients and networks like their OS, opened ports ...etc. Crack WEP/WPA/WPA2 encryptions using a number of methods. ARP Spoofing/ARP Poisoning. Gain control over computer systems using server side attacks. Create undetectable backdoors. Use social engineering to gain full control over target systems. Discover, exploit & fix local file inclusion vulnerabilities. Discover, fix, and exploit SQL injection vulnerabilities. Bypass login forms and login as admin using SQL injections.

Module 1 : You will learn extensive hands-on with installation and configuration of Virtualization and Kali Linux.


    • ---- Introduction to Ethical Hacking and Pentesting
    • ---- VMWare Installation
    • ---- Installation of Kali Linux
    • ---- Kali Linux Configuration and VMWare Tools
    • ---- Introduction to Kali Linux
    • ---- Concept of Operating Systems

      • Module 2 : Master your commandline skills to navigate and administer Kali Linux and Windows Command lines

                • ---- Linux terminal basics
                • ---- Kali Linux editors
                • ---- Kali Linux administrative commands
                • ---- Windows and Networking command

Module 3 : Prepare Your Lab


    • ---- Changing IP address and setting up Wireless Adapter
    • ---- Creating Bootable Kali USB
    • ---- Important Networking Terms
    • ---- Important Hacking Terms
    • ---- Few Things to Do After Installing Kali Linux
    • ---- Changing Our Mac Address - MacChanger

Module 4 : Footprinting


    • ---- Google Hacking
    • ---- Working with Nikto
    • ---- DNS Footprinting
    • ---- The Harvester
    • ---- Shodan
    • ---- Zone Transfer With Dig

    Module 5 : Scanning


      • ---- Installing Metasploitable
      • ---- Working with Nmap
      • ---- Working with Zenmap
      • ---- TCP scans
      • ---- Nmap Bypassing Defences
      • ---- Nmap Scripts

    Module 6 : Phishing Attacks and Mass mailer attack


      • ---- Introduction To Social Engineering and information Gathering
      • ---- Types Of Social Engineering
      • ---- Social Engineering Attacks
      • ---- Spear Phishing Attacks
      • ---- Phishing Attack
      • ---- Phishing Attack Consequences
      • ---- Mass Mailer Attack

    Module 7 : Arp Poisioning, DNS & DHCP Spoofing & Port Stealing


      • ---- ARP Poisoning
      • ---- DNS Spoofing vs DNS Poisoning
      • ---- Advanced Concepts on DNS Spoofing
      • ---- DHCP Spoofing
      • ---- Port Stealing

    Module 8 : Backdoors and Rootkits


      • ---- Backdoor Overview
      • ---- Backdoor Process and Functions
      • ---- Backdoor Gaining Access
      • ---- Backdoor Maitaining Access
      • ---- Introducing Command Prompt Backdoor
      • ---- Meterpreter Backdoor
      • ---- Gaining Root

    Module 9 : Jack the Ripper, Embedded Trojan Horse, Java Applet Attack, MITM Attacks, ICMP, Driftnet and EvilGrade


      • ---- Jack the Ripper
      • ---- Embedded Trojan Horse
      • ---- Introduction To Java Applet Attack Method
      • ---- Man in the Middle : MITM Attack
      • ---- ICMP Redirection
      • ---- Killing a Network
      • ---- Ddosing Unauthorised Network
      • ---- Working with Driftnet
      • ---- Working with EvilGrade

    Module 10 : Meterpreter, MsfConsole and MsDConsole


      • ---- Meterpreter Overview
      • ---- Activating Payloads
      • ---- MsFconsole explained
      • ---- MsDconsole Commands
      • ---- Exploits
      • ---- Payloads
      • ---- Generating Payloads

    Module 11 : Password Cracking


      • ---- Introduction To Password Cracking
      • ---- Password Cracking Strategy
      • ---- Windows Password Cracking Overview
      • ---- Nuts And Bolts Of Windows Password Cracking Strategy
      • ---- Introduction To Linux Hash Cracking
      • ---- Linux Hash Cracking Strategy
      • ---- Generating Wordlist Overview
      • ---- Generating Wordlist Process and Functions
      • ---- CeWL Cracking

    Module 12 : DDos Attacks on Windows & SAM Hacking


      • ---- Introduction To Denial of Service
      • ---- DoS Vs DDoS
      • ---- Levels Of DDos Attacks
      • ---- Preventing DDos Attacks
      • ---- Introduction To DDoSing Windows 7
      • ---- DDosing Windows 7 Methods
      • ---- Hacking Win7 SAM database

    Module 13 : Cryptography


      • ---- Introduction To Cryptography
      • ---- Basic Concepts On Cryptography
      • ---- Hash Func and Oracle Method
      • ---- Birthday Theorem & Digital Signature
      • ---- Pros and Cons Of Cryptography

    Module 14 : SQL Injections Attacks


      • ---- Introduction To SQL injection
      • ---- SQL Injection To Google Dorks
      • ---- SQL Mapping Via Kali Linux
      • ---- Gathering Password And Cracking The Hash
      • ---- Website Hacking - SQL Injections with Sqlmap

    Module 15 : Wireless Attacks


      • ---- Introduction to WEP and WPA
      • ---- 802 1X Standard
      • ---- Wireless Cracking Overview
      • ---- Wriless Cracking Via Kali Linux