Resell Pentesting Advance Course
Web Based Course
Ethical Hacking Pentesting with Resale Rights is a hands-on course for Ethical Hackers to test networks to identify any loopholes and accordingly it can be mitigated
Resell Pentesting Advance Course – Check the whole contents
Section 1: Introduction and installation
1 Before we begin
2 Virtual Box install tutorial1
3 Kali Linux install tutorial
4 Going full screen in Kali Linux
Section 2: Basic Linux Commands
1 Basic Commands – Part 1
2 Basic Commands – Part 2
3 Basic Commands – Part 3
Section 3: Preparing your lab
1 Changing IP address and setting up wireless adapter
2 Creating bootable Kali USB
3 Important networking terms
4 Important hacking terms
5 Few things to do after installing Kali Linux
6 Changing our Mac Address – Macchanger
Section 4: Web Penetration Testing
1 Installing Owasp
2 HTTP Request
3 HTTP Response
4 Burp Suite Configuration
5 Editing Packets in Burp Suite
6 Whatweb & Dirb
7 Password Recovery Attack
8 Burp Suite Login Bruteforce
9 Hydra Login Bruteforce
10 Session Fixation
11 Injection Attacks
12 Simple Command Injection
13 Exploiting Command Injection Vulnerability
14 Finding Blind Command Injection
15 Webpentest – Basics of SQL
16 Manual SQL Injection – Part 1
17 Manual SQL Injection – Part 2
18 SQLmap Basics
19 XML Injection
20 Installing XCAT and Preventing Injection Attacks
21 Reflected XSS
22 Stored XSS
23 Changing HTML Code with XSS
24 XSSer & XSSsniper
Section 5: Python Basics
1 Variables
2 raw_input
3 IF ELSE statement
4 FOR loop
5 WHILE loop
6 Python Lists
7 Functions
8 Classes
9 Importing Libraries
10 Files in Python
11 Try and Except rule
Section 6: Coding Advance Backdoor
1 Theory behind Reverse Shell
2 Simple Server Code
3 Connection with Reverse Shell
4 Sending and Receiving Messages
5 Sending Messages with while true loop
6 Executing Commands on Target System
7 Fixing Backdoor Bugs & Adding Functions
8 Installing Pyinstaller
9 First Performance Test of our Backdoor
10 Trying to Connect every 20 seconds
11 Creating Persistence – Part 1
12 Creating Persistence – Part 2
13 Changing Directory
14 Uploading & Downloading Files
15 Downloading files from Internet
16 Starting Programs from our Backdoor
17 Capturing Screenshot on Target PC
18 Embedding Backdoor in Image – Part 1
19 Embedding Backdoor in Image – Part 2
20 Checking for Administrator Privileges
21 Adding Help Option
Section 7: Creating Keylogger for Backdoor
1 Importing Pynput
2 Simple Keylogger
3 Adding Report Function
4 Writing Keystrokes to a File
5 Adding Keylogger to our Reverse Shell – Part 1
6 Adding Keylogger to our Reverse Shell – Part 2
7 Final Project Test
Section 8: Basic Authentication Bruteforcer
1 Printing Banner
2 Adding Available Options
3 Starting Threads for Bruteforce
4 Making Function to run the Attack
5 Bruteforcing Router Login
6 Bypassing Antivirus with all your future programs
7 Sending Malware with Spoofed Email
8 Making password lists with Cupp————————————————————————————————————————————-