Shape Shape

Advance Ethical Hacking : Free Course

Shape
Shape
Shape Shape

Advance Ethical Hacking - Free Course

Section 1: Introduction and installation

1 Before we begin
2 Virtual Box install tutorial1
3 Kali Linux install tutorial
4 Going full screen in Kali Linux

Section 2: Basic Linux Commands

1 Basic Commands - Part 1
2 Basic Commands - Part 2
3 Basic Commands - Part 3

Section 3: Preparing your lab

1 Changing IP address and setting up wireless adapter
2 Creating bootable Kali USB
3 Important networking terms
4 Important hacking terms
5 Few things to do after installing Kali Linux
6 Changing our Mac Address - Macchanger

Section 4: Web Penetration Testing

1 Installing Owasp
2 HTTP Request
3 HTTP Response
4 Burp Suite Configuration
5 Editing Packets in Burp Suite
6 Whatweb & Dirb
7 Password Recovery Attack
8 Burp Suite Login Bruteforce
9 Hydra Login Bruteforce
10 Session Fixation
11 Injection Attacks
12 Simple Command Injection
13 Exploiting Command Injection Vulnerability
14 Finding Blind Command Injection
15 Webpentest - Basics of SQL
16 Manual SQL Injection - Part 1
17 Manual SQL Injection - Part 2
18 SQLmap Basics
19 XML Injection
20 Installing XCAT and Preventing Injection Attacks
21 Reflected XSS
22 Stored XSS
23 Changing HTML Code with XSS
24 XSSer & XSSsniper

Section 5: Python Basics

1 Variables
2 raw_input
3 IF ELSE statement
4 FOR loop
5 WHILE loop
6 Python Lists
7 Functions
8 Classes
9 Importing Libraries
10 Files in Python
11 Try and Except rule

Section 6: Coding Advance Backdoor

1 Theory behind Reverse Shell
2 Simple Server Code
3 Connection with Reverse Shell
4 Sending and Receiving Messages
5 Sending Messages with while true loop
6 Executing Commands on Target System
7 Fixing Backdoor Bugs & Adding Functions
8 Installing Pyinstaller
9 First Performance Test of our Backdoor
10 Trying to Connect every 20 seconds
11 Creating Persistence - Part 1
12 Creating Persistence - Part 2
13 Changing Directory
14 Uploading & Downloading Files
15 Downloading files from Internet
16 Starting Programs from our Backdoor
17 Capturing Screenshot on Target PC
18 Embedding Backdoor in Image - Part 1
19 Embedding Backdoor in Image - Part 2
20 Checking for Administrator Privileges
21 Adding Help Option

Section 7: Creating Keylogger for Backdoor

1 Importing Pynput
2 Simple Keylogger
3 Adding Report Function
4 Writing Keystrokes to a File
5 Adding Keylogger to our Reverse Shell - Part 1
6 Adding Keylogger to our Reverse Shell - Part 2
7 Final Project Test

Section 8: Basic Authentication Bruteforcer

1 Printing Banner
2 Adding Available Options
3 Starting Threads for Bruteforce
4 Making Function to run the Attack
5 Bruteforcing Router Login
6 Bypassing Antivirus with all your future programs
7 Sending Malware with Spoofed Email
8 Making password lists with Cupp

SSH Tunneling with Wireshark Part 4

Facebook Reviews:

If you are a training provider

Interested to offer our courses in your own platform with Life-time Resale License?