Ethical Hacking with Kali Linux Tailor Made: Intermediate

Learn Ethical Hacking with Kali Linux Complete Bootcamp 2021: Go from ZERO to HERO: go all the way to Expert with Examples and More

Intermediate 0(0 Ratings) 1 Students enrolled
Created by Online Courses Learn Online, On Your Schedule | Firste Last updated Wed, 09-Jun-2021 English
What will i learn?
  • • Website penetration testing
  • • WPA2 wireless network cracking
  • • Man in the middle attacks
  • • System hacking using Metasploit
  • • Kali Linux programming fundamentals • Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer) • Tips for building a career in cyber security • Learn Network Penetration Testing • Gather information about people, such as emails, social media accounts, emails and friends • Use social engineering to gain full control over target systems • Send emails from ANY email account without knowing the password for that account
  • • Network basics & how devices interact inside a network • A number of practical attacks that can be used without knowing the key to the target network • Control connections of clients around you without knowing the password. • Gather detailed information about clients and networks like their OS, opened ports ...etc. • ARP Spoofing/ARP Poisoning • Gain control over computer systems using client side attacks • Gain control over computer systems using fake updates • Gain control over computer systems by backdooring downloads on the fly • Launch Various Man In The Middle attacks.
  • • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc. • Discover open ports, installed services and vulnerabilities on computer systems • Gain control over computer systems using server side attacks • Exploit buffer over flows and code execution vulnerabilities to gain control over systems

Curriculum for this course
70 Lessons 13:15:13 Hours
1 Website Penetration Testing
24 Lessons 04:37:52 Hours
  • 1. Installing OWASP 00:08:27
  • 2. HTTP request 00:09:58
  • 3. HTTP response 00:10:28
  • 4. Burpsuite configuration 00:12:49
  • 5. Editing packets in Burpsuite 00:12:21
  • 6. Whatweb and Dirb 00:10:11
  • 7. Password recovery attack 00:15:32
  • 8. Burpsuite login bruteforce 00:11:02
  • 9. Hydra login bruteforce 00:08:45
  • 10. Session fixation 00:13:51
  • 11. Injection attacks 00:05:32
  • 12. Simple command injection 00:11:05
  • 13. Exploiting command injection vulnerability 00:07:39
  • 14. Finding blind command injection 00:13:40
  • 15. SQL basics 00:10:22
  • 16. Manual SQL injection part 1 00:13:13
  • 17. Manual SQL injection part 2 00:20:50
  • 18. SQL map basics 00:16:35
  • 19. XML injection 00:15:55
  • 20. Installing XCAT and preventing injection attacks 00:05:51
  • 21. Reflected XSS 00:10:47
  • 22. Stored XSS 00:11:57
  • 23. Changing HTML code with XSS 00:07:29
  • 24. XSSer and XSS sniper 00:13:33
  • 25. Wireless attacking theory 00:10:50
  • 26. Enabling monitor mode 00:04:40
  • 27. Capturing handshake with airodump 00:14:36
  • 28. Rockyou.txt 00:13:54
  • 29. Cracking with aircrack 00:15:32
  • 30. Cracking with hashcat 00:14:56
  • 31. Creating password lists with crunch 00:18:20
  • 32. Creating password lists with cup 00:07:11
  • 33. Rainbow tables part 1 00:16:35
  • 34. Rainbow tables part 2 00:05:38
  • 35. Installing fluxion 00:06:18
  • 36. Finding and cracking hidden networks 00:08:19
  • 37. Preventing wireless attacks 00:07:58
  • 38. ARP protocol basics 00:10:29
  • 39. Man in the middle attack theory 00:07:19
  • 40. Installing MITMf 00:06:36
  • 41. Manual ARP spoofing 00:12:47
  • 42. Problems while installing MITMf 00:06:19
  • 43. HTTP traffic sniffing 00:08:30
  • 44. DNS spoofing and HTTPS password sniffing 00:24:19
  • 45. Hooking browser with BEEF 00:16:02
  • 46. Screenshotting targets browser 00:11:01
  • 47. Cloning any webpage 00:08:54
  • 48. Ettercap basics 00:06:58
  • 49. MFS console environment 00:16:06
  • 50. Metasploit modules explained 00:12:12
  • 51. Bruteforcing SSH with Metasploit 00:15:18
  • 52. Attacking tomcat with metasploit 00:08:50
  • 53. Getting meterpreter with command injection 00:25:06
  • 54. PHP code injection 00:05:44
  • 55. Metasploitable exploits 00:06:57
  • 56. Wine installation 00:12:02
  • 57. Creating windows payloads with Msfvenom 00:10:01
  • 58. Encoders and Hex editors 00:18:43
  • 59. Windows 10 meterpreter shell 00:11:57
  • 60. Meterpreter environment 00:11:26
  • 61. Windows 10 privilege escalation 00:11:29
  • 62. Preventing privilege escalation 00:06:22
  • 63. Post exploitation modules 00:14:11
  • 64. Getting Meterpreter over Internet with port forwarding 00:10:40
  • 65. Eternalblue exploit 00:20:16
  • 66. Persistence module 00:13:15
  • 67. Hacking over the internet with Ngrok 00:10:25
  • 68. Android device hacking with venom 00:09:55
  • 69. The real hacking begins now! 00:02:25
  • 70. Bonus Lectures. Enjoy the Benefits
Requirements
  • • All Levels. No prior knowledge is required.
  • • No prerequisite knowledge is required to take this course. This course starts at the very beginning and will teach you everything you need to know to be an outstanding Ethical Hacker
  • • You will need a computer, Laptop, Tablet or a smartphone.
  • • All devices work: Mac or PC, iOS or Android
  • • Wireless networking card.
  • • For WiFi cracking - Wireless adapter that supports monitor mode (more info provided in the course).
  • • Also for experienced programmers who are interested to learn Ethical Hacking
  • • All you need is YOU and YOU! Just have an open mind and willingness to learn and implement
+ View more
Description

Ethical Hacking with Kali Linux Tailor Made for Intermediate Learners

Learn Ethical Hacking with Kali Linux Complete Bootcamp 2021: Go from ZERO to HERO: go all the way to Expert with Examples and More

 

NOTE:

Once you finish this course, upgrade your knowledge and enroll in our Advanced Ethical Hacking Course.

 

If you would like to master ethical hacking, you are going to LOVE this course! Learn ethical hacking full course with many hours of HD video tutorials!

Learn cyber security and ethical hacking with us today starting as a complete beginner working through coding your own advanced back doors!  We start with how to setup a Linux system and use basic Unix system commands.  Next, we see how to create a secure penetration testing environment and begin footprinting, scanning, and website penetration testing.  Then, we cover WPA2 wireless network cracking, man in the middle attacks, system hacking, and Kali Linux programming fundamentals.  Finally, conclude with the "real hacking" where we are writing our own pen-testing tools featuring a reverse shell, keylogger and bruteforcer!

This course was designed for absolute beginners to expand your skillset and help secure your own websites, devices, and properties online!, so no previous ethical hacking or programming knowledge is necessary. After you take this course, you can be more confident to get a job as an ethical hacker.

 

We will cover the following topics in this course:

<!--[if !supportLists]-->·       <!--[endif]-->Website penetration testing

<!--[if !supportLists]-->·       <!--[endif]-->WPA2 wireless network cracking

<!--[if !supportLists]-->·       <!--[endif]-->Man in the middle attacks

<!--[if !supportLists]-->·       <!--[endif]-->System hacking using Metasploit

<!--[if !supportLists]-->·       <!--[endif]-->Kali Linux programming fundamentals

<!--[if !supportLists]-->·       <!--[endif]-->Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)

<!--[if !supportLists]-->·       <!--[endif]-->Tips for building a career in cyber security

<!--[if !supportLists]-->·       <!--[endif]-->Learn Network Penetration Testing

<!--[if !supportLists]-->·       <!--[endif]-->Gather information about people, such as emails, social media accounts, emails and friends

<!--[if !supportLists]-->·       <!--[endif]-->Use social engineering to gain full control over target systems

<!--[if !supportLists]-->·       <!--[endif]-->Send emails from ANY email account without knowing the password for that account

<!--[if !supportLists]-->·       <!--[endif]-->Network basics & how devices interact inside a network

<!--[if !supportLists]-->·       <!--[endif]-->A number of practical attacks that can be used without knowing the key to the target network

<!--[if !supportLists]-->·       <!--[endif]-->Control connections of clients around you without knowing the password.

<!--[if !supportLists]-->·       <!--[endif]-->Gather detailed information about clients and networks like their OS, opened ports ...etc.

<!--[if !supportLists]-->·       <!--[endif]-->ARP Spoofing/ARP Poisoning

<!--[if !supportLists]-->·       <!--[endif]-->Gain control over computer systems using client side attacks

<!--[if !supportLists]-->·       <!--[endif]-->Gain control over computer systems using fake updates

<!--[if !supportLists]-->·       <!--[endif]-->Gain control over computer systems by backdooring downloads on the fly

<!--[if !supportLists]-->·       <!--[endif]-->Launch Various Man In The Middle attacks.

<!--[if !supportLists]-->·       <!--[endif]-->Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.

<!--[if !supportLists]-->·       <!--[endif]-->Discover open ports, installed services and vulnerabilities on computer systems

<!--[if !supportLists]-->·       <!--[endif]-->Gain control over computer systems using server side attacks

<!--[if !supportLists]-->·       <!--[endif]-->Exploit buffer over flows and code execution vulnerabilities to gain control over systems

 

Once you finish this course, upgrade your knowledge and enroll in our Advanced Ethical Hacking Course. You will learn the following:

<!--[if !supportLists]-->·       <!--[endif]-->Create undetectable backdoors

<!--[if !supportLists]-->·       <!--[endif]-->Backdoor normal programs

<!--[if !supportLists]-->·       <!--[endif]-->Backdoor any file type such as pictures, pdf's ...etc.

<!--[if !supportLists]-->·       <!--[endif]-->Read, write download, upload and execute files on compromised systems

<!--[if !supportLists]-->·       <!--[endif]-->Discover, exploit and fix code execution vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover, exploit & fix local file inclusion vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover, fix, and exploit SQL injection vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Capture keystrokes on a compromised system

<!--[if !supportLists]-->·       <!--[endif]-->Use a compromised computer as a pivot to gain access to other computers on the same network

<!--[if !supportLists]-->·       <!--[endif]-->Exploit file upload vulnerabilities & gain full control over the target website

<!--[if !supportLists]-->·       <!--[endif]-->Bypass login forms and login as admin using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Writing SQL queries to find databases, tables and sensitive data such as usernames and passwords using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Understand how websites & web applications work

<!--[if !supportLists]-->·       <!--[endif]-->Understand how browsers communicate with websites

<!--[if !supportLists]-->·       <!--[endif]-->Gather sensitive information about websites

<!--[if !supportLists]-->·       <!--[endif]-->Fix XSS vulnerabilities & protect yourself from them as a user

<!--[if !supportLists]-->·       <!--[endif]-->Discover servers, technologies and services used on target website

<!--[if !supportLists]-->·       <!--[endif]-->Discover emails and sensitive data associated with a specific website

<!--[if !supportLists]-->·       <!--[endif]-->Find all subdomains associated with a website

<!--[if !supportLists]-->·       <!--[endif]-->Discover unpublished directories and files associated with a target website

<!--[if !supportLists]-->·       <!--[endif]-->Hook victims to BeEF using XSS vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Find all websites hosted on the same server as the target website

<!--[if !supportLists]-->·       <!--[endif]-->Read / Write files to the server using SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Learn the right way to write SQL queries to prevent SQL injections

<!--[if !supportLists]-->·       <!--[endif]-->Discover reflected XSS vulnerabilities

<!--[if !supportLists]-->·       <!--[endif]-->Discover Stored XSS vulnerabilities

 

You could also end up using these skills in your work for Your #Clients, and much more.

We really hope you find this course valuable, but either way, please leave a review and share your experience...

Thank you for taking the time to read this and we hope to see you in the course!

 

+ View more
Other related courses
21:54:36 Hours
0 1 $149 $5
01:59:31 Hours
0 0 Free
41:20:04 Hours
0 1 $199 $8
01:37:34 Hours
Updated Mon, 07-Jun-2021
0 0 Free
01:31:49 Hours
0 1 $129 $3
About the instructor
  • 0 Reviews
  • 2 Students
  • 86 Courses
+ View more
Online Courses - Learn Online, On Your Schedule | Firste

Firste Academy is an online learning platform with online top best online courses taught by the world's best instructors. Personalized, on-demand e-learning in programming, marketing, data science, development and more.

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$7 $149
Buy now
Includes:
  • 13:15:13 Hours On demand videos
  • 70 Lessons
  • Full lifetime access
  • Access on mobile and tv