Description
Course curriculum
- Introduction to Ethical Hacking
- Introduction to ethical hacking. What is it in detail?
- Prerequisites for getting the most out of this course.
- Basic terminology – white hat, gray hat, and black hat hacking.
- Basic terminology – SQL injections, VPN, proxy, VPS, and keyloggers.
- Build your hacking environment!
- Installing VirtualBox with RPM and why use a virtual machine.
- Installing VirtualBox using the default package manager from repositories.
- Creating the virtual environment.
- Installing VirtualBox on Windows.
- Kali Linux installation within a virtual environment.
- Booting up Kali Linux for the first time.
- Installing VirtualBox Guest Additions.
- Linux Terminal and CLI
- Introduction to the Linux terminal.
- Linux command line interface (CLI) basics.
- Linux CLI explained in greater detail.
- What is Tor? How can you use it to protect your anonymity online?
- Using Tor to protect your anonymity online.
- Tor continued.
- ProxyChains for using proxy servers, hiding your ip, and obtaining access.
- Proxychains for using proxy servers, hiding your IP, and obtaining access.
- Proxychains – part 2.
- Proxychains – part 3.
- What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
- Staying anonymous with a virtual private network (VPN).
- VPN continued.
- What is a macchanger? How can you use it to change your mac address?
- Macchanger – part 1.
- Macchanger – part 2.
- Footprinting with Nmap and external resources.
- Footprinting with nmap.
- Nmap continued.
- External resources using public listings of known vulnerabilities.
- Attacking wireless networks. Overview of the tools.
- Introduction to wifi cracking WPA/WPA2.
- Aircrack and reaver installation.
- Installing aircrack-ng on Windows and crunch on Linux.
- Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
- Aircrack-ng and crunch usage example – part 1.
- Aircrack-ng and crunch usage example – part 2.
- Aircrack-ng and crunch usage example – part 3.
- Cracking WPS pins with reaver – part 1.
- Cracking WPS pins with reaver – part 2.
- Cracking WPS pins with reaver – part 3.
- Signal jamming and denial of service.
- Signal jamming and denial of service.
- Signal jamming and denial of service – continued.
- SSL strips.
- SSL strip – part 1.
- SSL strip – part 2.
- SSL strip – part 3.
- Let’s have a bit of fun!
- Funny things – part 1.
- Funny things – part 2.
- Funny things – part 3.
- Evil twin method! Clone wireless access points to steal data.
- Evil twin – part 1.
- Evil twin – part 2.
- Evil twin – part 3.
- Attacking routers to give you free reign over the entire network!
- Using known vulnerabilities – part 1.
- Using know vulnerabilities – part 2.
- Using known vulnerabilities – part 3.
- DNS setting hacking to redirect users with post authentication exploitation.
- Post authentication exploitation (DNS) – part 1.
- Post authentication exploitation (DNS) – part 2.
- Post authentication exploitation (DNS) – part 3.
- Website attacks with SQL injections.
- SQL injection – part 1.
- SQL injection – part 2.
- SQL injection – part 3.
- SQL injection – part 4.
- SQL injection – part 5.
- Brute-forcing methods for cracking passwords.
- Cracking hashes.
- Cracking linux passwords with john the ripper – part 1.
- Cracking linux passwords with john the ripper – part 2.
- Cracking Windows passwords with john the ripper.
- Hydra usage – part 1.
- Hydra usage – part 2.
- Denial of Service (DoS) attacks demonstrated and explained.
- DoS attack demo part 1 – introduction to denial of service attacks.
- DoS attack demo part 2 – combine slowloris.pl with nmap.
- DoS attack demo part 3 – featuring ha.ckers.org.
- Reverse shells. Gain remote control of any device!
- Intro to metasploit and reverse shells.
- Metasploit continued.
- Making reverse shells persistent on another system and escalating privileges.
- Creating a persistent reverse shell with Metasploit.
- Netcat.
- How to upload a reverse shell onto a web server.