VJ Security

VJ Security Is An Free Online Learning Website

MASTER IN HACKING

MASTER IN HACKING

MASTER IN HACKING
(FROM BEGINNER TO ADVANCED)

All Advanced Hacking Techniques Are Covered In This Course

With This Course You Can Really Become A Hacker And penetration Tester



In Today's generation The World Are Controlled By Hackers

You Can Also Take A Part In That

"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us."



"Hackers are actually good, pleasant and extremely intelligent people who could keep computer criminals on the run."


 The quieter you become, the more you are able to hear...

Topics Cover In This Course

PART - 1

Introduction:
  • Course Introduction  Overview
  • Teaser - Hacking a Windows 10 Computer  Accessing Their Webcam
  • What Is Hacking  Why Learn It
Setting up The Lab:
  • Lab Overview Needed Software
  • Installing Kali 2017 As a Virtual Machine
  • Installing Metasploitable As a Virtual Machine
  • Installing Windows As a Virtual Machine
  • Creating  Using Snapshots
Linux Basics:
  • Basic Overview of Kali Linux
  • The Terminal  Linux Commands
  • Updating Sources  Installing Programs
Network Penetration Testing:
  • Network Penetration Testing Introduction
  • Networks Basics
  • Connecting a Wireless Adapter To Kali
  • What is MAC Address How To Change It
  • Wireless Modes Managed  Monitor
  • Enabling Monitor Mode Manually 2nd method
  • Enabling Monitor Mode Using airmon-ng 3rd method

PART - 2

Network Penetration Testing - Pre Connection Attacks:
  • Packet Sniffing Basics Using Airodump-ng
  • Targeted Packet Sniffing Using Airodump-ng
  • Deauthentication Attack Disconnecting Any Device From The Network
  • Creating a Fake Access Point Honeypot - Theory
  • Creating a Fake Access Point Honeypot - Practical
Network Penetration Testing - Gaining Access WEP,WPA,WPA2 Cracking:
  • Gaining Access Introduction
  • WEP Cracking - Theory Behind Cracking WEP Encryption
  • WEP Cracking - Basic Case
  • WEP Cracking - Fake Authentication
  • WEP Cracking - ARP Request Replay Attack
  • WPA Cracking - Introduction
  • WPA Cracking - Exploiting WPS Feature
  • WPA Cracking - Theory Behind WPAWPA2 Cracking
  • WPA Cracking - How To Capture The Handshake
  • WPA Cracking - Creating a Wordlist
  • WPA Cracking - Using a Wordlist Attack
  • Securing Your Network From The Above Attacks
  • How to Configure Wireless Security Settings To Secure Your Network
Network Penetration Testing - Post Connection Attacks:
  • Introduction
  • Information Gathering - Discovering Connected Clients using netdiscover
  • Gathering More Information Using Autoscan
  • Gathering Even More Information Using Zenmap
  • MITM - ARP Poisonning Theory
  • MITM - ARP Spoofing using arpspoof
  • MITM - ARP Spoofing Using MITMf
  • MITM - Bypassing HTTPS
  • MITM - Session Hijacking
  • MITM - DNS Spoofing
  • MITM - Capturing Screen Of Target  Injecting a Keylogger
  • MITM - Injecting JavascriptHTML Code
  • MITM - Using MITMf Against Real Networks
  • Wireshark - Basic Overview  How To Use It With MITM Attacks
  • Wireshark - Sniffing Data  Analysing HTTP Traffic
  • Wireshark - Capturing Passwords Cookies Entered By Any Device In The Network
Network Penetration Testing - Detection  Security:
  • Detecting ARP Poisonning Attacks
  • Detecting suspicious Activities Using Wireshark

PART - 3

Gaining Access To Computer Devices:
  • Gaining Access Introduction
Gaining Access - Server Side Attacks:
  • Introduction
  • Basic Information Gathering  Exploitation
  • Using a Basic Metasploit Exploit
  • Exploiting a Code Execution Vulnerability
  • MSFC - Installing MSFC Metasploit Community
  • MSFC - Scanning Targets For Vulnerabilities
  • MSFC - Analysing Scan results  Exploiting Target System
  • Nexpose - Installing Nexpose
  • Nexpose - How To Configure Launch a Scan
  • Nexpose - Analysing Scan Results Generating Reports
Gaining Access - Client Side Attacks:
  • Introduction
  • Installing Veil 3
  • Veil Overview Payloads Basics
  • Generating An Undetectable Backdoor Using Veil 3
  • Listening For Incoming Connections
  • Using A Basic Deliver Method To Test The Backdoor Hack Windows 10
  • Backdoor Delivery Method 1 - Using a Fake Update
  • Backdoor Delivery Method 2 - Backdooring Downloads on The Fly
  • How to Protect Yourself From The Discussed Delivery Methods
Gaining Access - Client Side Attacks - Social Engineering:
  • Introduction
  • Maltego Basics
  • Discovering Websites Links Social Networking Accounts Associated With Target

PART - 4

Gaining Access - Client Side Attacks - Social Engineering:
  • Discovering Twitter Friends  Associated Accounts
  • Discovering Emails Of The Targets Friends
  • Analysing The Gathered Info  Building An Attack Stratigy
  • Backdooring Any File Type images pdfs ...etc
  • Compiling Changing Trojans Icon
  • Spoofing .exe Extension To Any Extension jpg pdf ...etc
  • Spoofing Emails - Send Emails As Any Email Account You Want
  • BeEF Overview  Basic Hook Method
  • BeEF - hooking targets using MITMf
  • BeEF - Running Basic Commands On Target
  • BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt
  • BeEF - Gaining Full Control Over Windows Target
  • Detecting Trojans Manually
  • Detecting Trojans Using a Sandbox
Gaining Access - Using The Above Attacks Outside The Local Network:
  • Overview of the Setup
  • Ex1 - Generating a Backdoor That Works Outside The Network
  • Configuring The Router To Forward Connections To Kali
  • Ex2 - Using BeEF Outside The Network
Post Exploitation:
  • Introduction
  • Meterpreter Basics
  • File System Commands
  • Maintaining Access - Basic Methods
  • Maintaining Access - Using a Reliable  Undetectable Method
  • Spying - Capturing Key Strikes,Taking Screen Shots
  • Pivoting - Theory What is Pivoting
  • Pivoting - Exploiting Devices on The Same Network As The Target Computer
Website Penetration Testing:
  • Introduction - What Is A Website
  • How To Hack a Website

PART - 5

Website Pentesting - Information Gathering:
  • Gathering Basic Information Using Whois Lookup
  • Discovering Technologies Used On The Website
  • Gathering Comprehensive DNS Information
  • Discovering Websites On The Same Server
  • Discovering Subdomains
  • Discovering Sensitive Files
  • Analysing Discovered Files
Website Pentesting - File Upload Code Execution  File Inclusion Vulns:
  • Discovering  Exploiting File Upload Vulnerabilities
  • Discovering  Exploiting Code Execution Vulnerabilities
  • Discovering  Exploiting Local File Inclusion Vulnerabilities
  • Remote File Inclusion Vulnerabilities - Configuring PHP Settings
  • Remote File Inclusion Vulnerabilities - Discovery  Exploitation
  • Preventing The Above Vulnerabilities
Website Pentesting - SQL Injection Vulnerabilities:
  • What is SQL
  • Dangers of SQL Injection Vulnerabilities
  • Discovering SQL injections In POST
  • Bypassing Logins Using SQL injection Vulnerability
  • Discovering SQL injections in GET
  • Reading Database Information
  • Finding Database Tables
  • Extracting Sensitive Data Such As Passwords
  • Reading  Writing Files On The Server Using SQL Injection Vulnerability
  • Discovering SQL Injections  Extracting Data Using SQLmap
  • The Right Way To Prevent SQL Injection
Website Pentesting -  Cross Site Scripting Vulnerabilities:
  • Introduction - What is XSS or Cross Site Scripting
  • Discovering Reflected XSS
  • Discovering Stored XSS
  • Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
  • Preventing XSS Vulnerabilities
Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP, ZAP:
  • Scanning Target Website For Vulnerabilities
  • Analysing Scan Results

Requirements:
  • Laptop or PC
  • Min 4 GB Of Ram
  • Good Internet Connection
  • Other Every Tools Are Explained In The Course
  • Willingness To Learn

That Is All

Brought To You By VJ SECURITY

Click Below To Download The Course


Subscribe Our YouTube Channel And Stay Tuned


Thank You

Post a Comment

0 Comments