ETHICAL HACKING
£0
Syllabus
Introduction
• Introduction to networking • Introduction to Internet • Introduction to Networking • Introduction to Ethical Hacking
Basic terminology
• white hat, gray hat, black hat • SQL injections, VPN, proxy, VPS, and keyloggers
Windows Hacking
• Phishing, Trojan & viruses • Introduction to windows batch commands • Creating Backdoor in Windows • Using Batch commands to create viruses • Steganography • Hiding and Locking Files in Windows using batch commands
Social Engineering Attacks
Phishing
Session hacking & Cookie grabbing
Charge/penalties against hacking in INDIA
Virtual Environment
• Virtual Box installation • Creating a virtual environment • Installing Virtual Box on Windows • Kali Linux installation/setup • Virtual Box Guest Additions installation
Kali Linux Live Environment
• Making a Kali Bootable USB Drive • Kali Linux Live USB Persistence
Working on Linux Operating System
• Linux terminal basics • Linux command line interface basics
• Tor browser setup • Proxy chains • Virtual private network • Changing your mac address with mac changer • Foot printing with network mapper (n map) and external resources
Wireless Attacks
• Attacking wireless networks cracking WPA/WPA2 • Ari cracking & crunch hacking example • Cracking WPS pins with reaver
DVWA
• Key Loggers • MITM attack • Performing denial of service attacks on wireless networks • SSL strip • SQL Injection
Password Cracking
• Brute force methods for cracking passwords – cracking hashes • Cracking Linux Passwords • Cracking windows passwords with john the ripper
Man-in-the-middle attack (MITM Attack) (Practical)
Cross site scripting attack (XSS) (Practical)
XSS Attack with cookie grabbing
Using Ettercap
• Hydra usage • Do’s attack • Intro to metasploit and reverse shells. • Metasploit starting from a two terminal setup. • Making reverse shells persistent on another system and escalating privileges. • Creating a persistent shell with metasploit. • Using netcat to make any kind of connection you may need. • How to upload a reverse shell onto a web server.
Reviews
Our course begins with the first step for generating great user experiences: understanding what people do, think, say, and feel. In this module, you’ll learn how to keep an open mind while learning.
Members
Our course begins with the first step for generating great user experiences: understanding what people do, think, say, and feel. In this module, you’ll learn how to keep an open mind while learning.