MASTER IN HACKING
(FROM BEGINNER TO ADVANCED)
All Advanced Hacking Techniques Are Covered In This Course
With This Course You Can Really Become A Hacker And penetration Tester
In Today's generation The World Are Controlled By Hackers
You Can Also Take A Part In That
"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us."
"Hackers are actually good, pleasant and extremely intelligent people who could keep computer criminals on the run."
The quieter you become, the more you are able to hear...
Topics Cover In This Course
PART - 1
Introduction:
- Course Introduction Overview
- Teaser - Hacking a Windows 10 Computer Accessing Their Webcam
- What Is Hacking Why Learn It
- Lab Overview Needed Software
- Installing Kali 2017 As a Virtual Machine
- Installing Metasploitable As a Virtual Machine
- Installing Windows As a Virtual Machine
- Creating Using Snapshots
- Basic Overview of Kali Linux
- The Terminal Linux Commands
- Updating Sources Installing Programs
- Network Penetration Testing Introduction
- Networks Basics
- Connecting a Wireless Adapter To Kali
- What is MAC Address How To Change It
- Wireless Modes Managed Monitor
- Enabling Monitor Mode Manually 2nd method
- Enabling Monitor Mode Using airmon-ng 3rd method
PART - 2
Network Penetration Testing - Pre Connection Attacks:
- Packet Sniffing Basics Using Airodump-ng
- Targeted Packet Sniffing Using Airodump-ng
- Deauthentication Attack Disconnecting Any Device From The Network
- Creating a Fake Access Point Honeypot - Theory
- Creating a Fake Access Point Honeypot - Practical
- Gaining Access Introduction
- WEP Cracking - Theory Behind Cracking WEP Encryption
- WEP Cracking - Basic Case
- WEP Cracking - Fake Authentication
- WEP Cracking - ARP Request Replay Attack
- WPA Cracking - Introduction
- WPA Cracking - Exploiting WPS Feature
- WPA Cracking - Theory Behind WPAWPA2 Cracking
- WPA Cracking - How To Capture The Handshake
- WPA Cracking - Creating a Wordlist
- WPA Cracking - Using a Wordlist Attack
- Securing Your Network From The Above Attacks
- How to Configure Wireless Security Settings To Secure Your Network
- Introduction
- Information Gathering - Discovering Connected Clients using netdiscover
- Gathering More Information Using Autoscan
- Gathering Even More Information Using Zenmap
- MITM - ARP Poisonning Theory
- MITM - ARP Spoofing using arpspoof
- MITM - ARP Spoofing Using MITMf
- MITM - Bypassing HTTPS
- MITM - Session Hijacking
- MITM - DNS Spoofing
- MITM - Capturing Screen Of Target Injecting a Keylogger
- MITM - Injecting JavascriptHTML Code
- MITM - Using MITMf Against Real Networks
- Wireshark - Basic Overview How To Use It With MITM Attacks
- Wireshark - Sniffing Data Analysing HTTP Traffic
- Wireshark - Capturing Passwords Cookies Entered By Any Device In The Network
- Detecting ARP Poisonning Attacks
- Detecting suspicious Activities Using Wireshark
PART - 3
Gaining Access To Computer Devices:
- Gaining Access Introduction
- Introduction
- Basic Information Gathering Exploitation
- Using a Basic Metasploit Exploit
- Exploiting a Code Execution Vulnerability
- MSFC - Installing MSFC Metasploit Community
- MSFC - Scanning Targets For Vulnerabilities
- MSFC - Analysing Scan results Exploiting Target System
- Nexpose - Installing Nexpose
- Nexpose - How To Configure Launch a Scan
- Nexpose - Analysing Scan Results Generating Reports
- Introduction
- Installing Veil 3
- Veil Overview Payloads Basics
- Generating An Undetectable Backdoor Using Veil 3
- Listening For Incoming Connections
- Using A Basic Deliver Method To Test The Backdoor Hack Windows 10
- Backdoor Delivery Method 1 - Using a Fake Update
- Backdoor Delivery Method 2 - Backdooring Downloads on The Fly
- How to Protect Yourself From The Discussed Delivery Methods
- Introduction
- Maltego Basics
- Discovering Websites Links Social Networking Accounts Associated With Target
PART - 4
Gaining Access - Client Side Attacks - Social Engineering:
- Discovering Twitter Friends Associated Accounts
- Discovering Emails Of The Targets Friends
- Analysing The Gathered Info Building An Attack Stratigy
- Backdooring Any File Type images pdfs ...etc
- Compiling Changing Trojans Icon
- Spoofing .exe Extension To Any Extension jpg pdf ...etc
- Spoofing Emails - Send Emails As Any Email Account You Want
- BeEF Overview Basic Hook Method
- BeEF - hooking targets using MITMf
- BeEF - Running Basic Commands On Target
- BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt
- BeEF - Gaining Full Control Over Windows Target
- Detecting Trojans Manually
- Detecting Trojans Using a Sandbox
- Overview of the Setup
- Ex1 - Generating a Backdoor That Works Outside The Network
- Configuring The Router To Forward Connections To Kali
- Ex2 - Using BeEF Outside The Network
- Introduction
- Meterpreter Basics
- File System Commands
- Maintaining Access - Basic Methods
- Maintaining Access - Using a Reliable Undetectable Method
- Spying - Capturing Key Strikes,Taking Screen Shots
- Pivoting - Theory What is Pivoting
- Pivoting - Exploiting Devices on The Same Network As The Target Computer
- Introduction - What Is A Website
- How To Hack a Website
PART - 5
Website Pentesting - Information Gathering:
- Gathering Basic Information Using Whois Lookup
- Discovering Technologies Used On The Website
- Gathering Comprehensive DNS Information
- Discovering Websites On The Same Server
- Discovering Subdomains
- Discovering Sensitive Files
- Analysing Discovered Files
- Discovering Exploiting File Upload Vulnerabilities
- Discovering Exploiting Code Execution Vulnerabilities
- Discovering Exploiting Local File Inclusion Vulnerabilities
- Remote File Inclusion Vulnerabilities - Configuring PHP Settings
- Remote File Inclusion Vulnerabilities - Discovery Exploitation
- Preventing The Above Vulnerabilities
- What is SQL
- Dangers of SQL Injection Vulnerabilities
- Discovering SQL injections In POST
- Bypassing Logins Using SQL injection Vulnerability
- Discovering SQL injections in GET
- Reading Database Information
- Finding Database Tables
- Extracting Sensitive Data Such As Passwords
- Reading Writing Files On The Server Using SQL Injection Vulnerability
- Discovering SQL Injections Extracting Data Using SQLmap
- The Right Way To Prevent SQL Injection
- Introduction - What is XSS or Cross Site Scripting
- Discovering Reflected XSS
- Discovering Stored XSS
- Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
- Preventing XSS Vulnerabilities
- Scanning Target Website For Vulnerabilities
- Analysing Scan Results
0 Comments