Ethical Hacking with Kali Linux Tailor Made: Advanced

Learn Ethical Hacking with Kali Linux Complete Bootcamp 2021: Go from ZERO to HERO: go all the way to Expert with Examples and More

Advanced 0(0 Ratings) 5 Students enrolled
Created by Online Courses Learn Online, On Your Schedule | Firste Last updated Fri, 15-Jul-2022 English
What will i learn?
  • • Create undetectable backdoors
  • • Backdoor normal programs
  • • Backdoor any file type such as pictures, pdf's ...etc.
  • • Read, write download, upload and execute files on compromised systems
  • • Discover, exploit and fix code execution vulnerabilities • Discover, exploit & fix local file inclusion vulnerabilities • Discover, fix, and exploit SQL injection vulnerabilities
  • • Capture keystrokes on a compromised system • Use a compromised computer as a pivot to gain access to other computers on the same network • Exploit file upload vulnerabilities & gain full control over the target website • Bypass login forms and login as admin using SQL injections
  • • Writing SQL queries to find databases, tables and sensitive data such as usernames and passwords using SQL injections • Understand how websites & web applications work • Understand how browsers communicate with websites • Gather sensitive information about websites
  • • Fix XSS vulnerabilities & protect yourself from them as a user • Discover servers, technologies and services used on target website • Discover emails and sensitive data associated with a specific website • Find all subdomains associated with a website
  • • Discover unpublished directories and files associated with a target website • Hook victims to BeEF using XSS vulnerabilities • Find all websites hosted on the same server as the target website • Read / Write files to the server using SQL injections
  • • Learn the right way to write SQL queries to prevent SQL injections • Discover reflected XSS vulnerabilities • Discover Stored XSS vulnerabilities

Curriculum for this course
52 Lessons 10:16:32 Hours
1 Kali Linux Crash Course
11 Lessons 01:46:33 Hours
  • 1. Variables 00:13:41
  • 2. Raw input 00:10:47
  • 3. If else statements 00:10:18
  • 4. For loops 00:06:31
  • 5. While loops 00:08:24
  • 6. Python lists 00:08:04
  • 7. Functions 00:14:33
  • 8. Classes 00:10:21
  • 9. Importing libraries 00:06:59
  • 10. Files in Python 00:11:43
  • 11. Try and except the rule 00:05:12
  • 12. Theory behind reverse shells 00:06:48
  • 13. Simple server code 00:12:41
  • 14. Connection with reverse shell 00:07:07
  • 15. Sending and receiving messages 00:10:47
  • 16. Sending messages with while true loop 00:07:53
  • 17. Executing commands on target system 00:09:37
  • 18. Fixing backdoor bugs and adding functions 00:20:09
  • 19. First test using our backdoor 00:18:00
  • 20. Trying to connect every 20 seconds 00:12:24
  • 21. Creating persistence part 1 00:06:10
  • 22. Creating persistence part 2 00:16:46
  • 23. Changing directory 00:11:52
  • 24. Uploading and downloading files 00:22:30
  • 25. Downloading files from the internet 00:22:43
  • 26. Starting programs using our backdoor 00:06:45
  • 27. Capturing screenshots on the target PC 00:18:44
  • 28. Embedding backdoor in an image part 1 00:13:27
  • 29. Embedding backdoor in an image part 2 00:08:38
  • 30. Checking for administrator privileges 00:12:11
  • 31. Adding help option 00:08:51
  • 32. Importing Pynput 00:10:20
  • 33. Simple keylogger 00:09:56
  • 34. Adding report function 00:10:33
  • 35. Writing key strokes to a file 00:14:00
  • 36. Adding the keylogger to our reverse shell part 1 00:22:59
  • 37. Adding the keylogger to our reverse shell part 2 00:07:40
  • 38. Final project test 00:14:25
  • 39. Printing banner 00:11:20
  • 40. Adding available options 00:11:13
  • 41. Starting threads for bruteforce 00:08:24
  • 42. Writing function to run the attack 00:11:03
  • 43. Bruteforcing router login 00:09:38
  • 44. Bypassing antivirus with your future programs 00:13:41
  • 45. Sending malware with spoofed email 00:15:14
  • 46. What will you learn in this section 00:02:34
  • 47. Why is ethical hacking a valuable skill 00:23:01
  • 48. What is the best ethical hacking certification 00:16:32
  • 49. Tips for getting your first job as an ethical hacker 00:18:24
  • 50. How I started my career as an ethical hacker 00:14:12
  • 51. How to price your work 00:10:47
  • 52. Bonus Lectures. Enjoy the Benefits
Requirements
  • • Intermediate knowledge is preferred.
  • • No prerequisite knowledge is required to take this course. This course starts at the very beginning and will teach you everything you need to know to be an outstanding Ethical Hacker
  • • You will need a computer, Laptop, Tablet or a smartphone.
  • • All devices work: Mac or PC, iOS or Android
  • • Wireless networking card.
  • • For WiFi cracking - Wireless adapter that supports monitor mode (more info provided in the course).
  • • Also for experienced programmers who are interested to learn Ethical Hacking
  • • All you need is YOU and YOU! Just have an open mind and willingness to learn and implement
+ View more
Description

Ethical Hacking with Kali Linux Tailor Made for Advanced Learners

Learn Ethical Hacking with Kali Linux  Complete Bootcamp 2021: Go from ZERO to HERO: go all the way to Expert with Examples and More

 

If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking full course with many hours of HD video tutorials!

Learn cyber security and ethical hacking with us today starting as a complete beginner working through coding your own advanced back doors!  We start with how to setup a Linux system and use basic Unix system commands.  Next, we see how to create a secure penetration testing environment and begin footprinting, scanning, and website penetration testing.  Then, we cover WPA2 wireless network cracking, man in the middle attacks, system hacking, and Kali Linux  programming fundamentals.  Finally, conclude with the "real hacking" where we are writing our own pen-testing tools featuring a reverse shell, keylogger and bruteforcer!

This course was designed for absolute beginners to expand your skillset and help secure your own websites, devices, and properties online!, so no previous ethical hacking or programming knowledge is necessary. After you take this course, you can be more confident to get a job as an ethical hacker.

 

We will cover the following topics in this course:

<!--[if !supportLists]-->·       <!--[endif]-->Create undetectable backdoors

<!--[if !supportLists]-->·       <!--[endif]-->Backdoor normal programs

<!--[if !supportLists]-->·       <!--[endif]-->Backdoor any file type such as pictures, pdf's ...etc.

<!--[if !supportLists]-->·       <!--[endif]-->Read, write download, upload and execute files on compromised systems

<!--[if !supportLists]-->·       <!--[endif]-->Discover, exploit and fix code execution vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover, exploit & fix local file inclusion vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover, fix, and exploit SQL injection vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Capture keystrokes on a compromised system

<!--[if !supportLists]-->·       <!--[endif]-->Use a compromised computer as a pivot to gain access to other computers on the same network

<!--[if !supportLists]-->·       <!--[endif]-->Exploit file upload vulnerabilities & gain full control over the target website

<!--[if !supportLists]-->·       <!--[endif]-->Bypass login forms and login as admin using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Writing SQL queries to find databases, tables and sensitive data such as usernames and passwords using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Understand how websites & web applications work

<!--[if !supportLists]-->·       <!--[endif]-->Understand how browsers communicate with websites

<!--[if !supportLists]-->·       <!--[endif]-->Gather sensitive information about websites

<!--[if !supportLists]-->·       <!--[endif]-->Fix XSS vulnerabilities & protect yourself from them as a user

<!--[if !supportLists]-->·       <!--[endif]-->Discover servers, technologies and services used on target website

<!--[if !supportLists]-->·       <!--[endif]-->Discover emails and sensitive data associated with a specific website

<!--[if !supportLists]-->·       <!--[endif]-->Find all subdomains associated with a website

<!--[if !supportLists]-->·       <!--[endif]-->Discover unpublished directories and files associated with a target website

<!--[if !supportLists]-->·       <!--[endif]-->Hook victims to BeEF using XSS vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Find all websites hosted on the same server as the target website

<!--[if !supportLists]-->·       <!--[endif]-->Read / Write files to the server using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Learn the right way to write SQL queries to prevent SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Discover reflected XSS vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover Stored XSS vulnerabilities

 

You could also end up using these skills in your work for Your #Clients, and much more.

We really hope you find this course valuable, but either way, please leave a review and share your experience...

Thank you for taking the time to read this and we hope to see you in the course!

 

+ View more
Other related courses
21:54:36 Hours
5 6 $199 $2
01:59:31 Hours
5 4 Free
41:20:04 Hours
4 6 $199 $2
01:37:34 Hours
Updated Mon, 07-Jun-2021
0 4 Free
01:31:49 Hours
4 5 $199 $2
About the instructor
  • 24 Reviews
  • 33 Students
  • 87 Courses
+ View more
Online Courses - Learn Online, On Your Schedule | Firste

Firste Academy is an online learning platform with online top best online courses taught by the world's best instructors. Personalized, on-demand e-learning in programming, marketing, data science, development and more.

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$2 $199
Buy now
Includes:
  • 10:16:32 Hours On demand videos
  • 52 Lessons
  • Full lifetime access
  • Access on mobile and tv