Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Certified Ethical Hacker (Cehv12) Practical Hands On Labs

Posted By: ELK1nG
Certified Ethical Hacker (Cehv12) Practical Hands On Labs

Certified Ethical Hacker (Cehv12) Practical Hands On Labs
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.12 GB | Duration: 6h 0m

Complete CEH practical exam preparation course with free challenges and resources

What you'll learn

CEH Practical Exam Structure and type of questions expected in the exam

Setting up a personal lab for CEH Practical practice

Scanning and Enumerating services on the target

System Hacking and pentesting methodolgy

Web applications hacking including wordpress hacking, bruteforcing login forms and Sql Injection

Wifi hacking and cracking Wifi Passwords

Using tools for Cryptography and Steganography

Requirements

PC or Laptop with 4GB (8GB Recommended) RAM

No Programming or Linux Skills Required. We teach you from scratch!

Description

CEH Practical Complete Training with Free Resources and ChallengesWelcome to the comprehensive and complete practical course on CEH Practical Certification Preparation. In this course, you will embark on an exciting journey to master ethical hacking techniques, specifically tailored to help you succeed in the Certified Ethical Hacker (CEH) practical labs exam. The course provides step-by-step instructions to set up your own hacking lab for practising labs for CEH. You will also be presented with hands-on challenges on free platforms like Try hack me and Hack the Box that will solidify your hacking skills.Learning Objectives:Gain In-Depth Knowledge of Ethical Hacking: Understand the fundamentals of ethical hacking, including various hacking methodologies, reconnaissance techniques, vulnerability assessment, and system exploitation.Master CEH Practical Lab Concepts: Acquire a deep understanding of the CEH practical lab environment, tasks, and challenges.Develop Practical Skills: Engage in hands-on exercises to enhance your practical skills in penetration testing, vulnerability identification, network scanning, and more.Explore Advanced Techniques: Discover advanced hacking techniques such as privilege escalation, password cracking, reverse engineering, and social engineering.Strengthen Cybersecurity Awareness: Learn about the latest cybersecurity threats, attack vectors, and mitigation strategies to protect systems and networks effectively.Course Highlights:Thorough Coverage of CEH Practical Labs: This course provides comprehensive coverage of the CEH practical lab scenarios, ensuring you are well-prepared to tackle the challenges. There are also some free resources provided to challenge yourself and solidify your concepts.Hands-On Labs: Dive into real-world, hands-on lab exercises to practice ethical hacking techniques in a controlled environment.Step-by-Step Guidance: Receive step-by-step guidance and explanations for each lab exercise, enabling you to understand the underlying concepts and techniques thoroughly.Interactive Learning Experience: Engage in interactive activities, quizzes, and challenges to reinforce your understanding and knowledge retention.Up-to-Date Content: Stay current with the latest trends, tools, and methodologies in ethical hacking, ensuring you are well-equipped to tackle contemporary cybersecurity challenges.Practical Tips and Tricks: Discover valuable tips, tricks, and best practices from industry professionals to enhance your efficiency and effectiveness in ethical hacking.Course Syllabus: Module 1: Introduction to CEH CourseCourse IntroIntroduction to CEH practical labs environmentModule 2: Basic Lab SetupInstalling Parrot OS on VMWAREInstall Kali Linux in a virtual environmentVirtualize a vulnerable environment with metasploitableModule 3: Footprinting and ReconnaissanceSubdomain and VHOST EnumerationCertificates and DNS  EnumerationModule 4: Scanning and EnumerationIdentifying live hostsService and OS discoveryEnumerating different servicesModule 5: System HackingScanning a vulnerable targetExploitation and Post ExploitationExploiting different services like FTP, SMB etcComplete hacking methodologyModule 6: SteganographyAlternate data streamsImage and white space SteganographyModule 7: Hacking Web ApplicationsComplete DVWA WalkthroughBrute forcing and SQL InjectionWordPress hackingModule 8: Network traffic analysis with WiresharkAnalyse DOS and DDOS attackExtracting credentialsAnalyse IoT trafficModule 9: Hacking Mobile PlatformsMetasploit and Meterpreter hacking phonesPhonesploit tutorialModule 10: Wireless Network HackingAssessing wireless network securityCracking WEP/WPA/WPA2 encryptionModule 11: Cloud  SecurityEnumeration S3 BucketsExploiting cloud MisconfigurationsModule 12: CryptographyTechniques to hash data and filesEncryption and decryption toolsBy the end of this course, you will possess the knowledge, skills, and confidence necessary to excel in the CEH practical labs and pursue a successful career in ethical hacking and cybersecurity.Enrol now and embark on your journey to becoming a proficient Ethical Hacker.Notes:This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test. The instructor is not linked to any tool or service mentioned in the course in any capacity.

Overview

Section 1: Introduction

Lecture 1 Introduction to the Course

Lecture 2 CEH Exam Environment & Structure

Section 2: Basic Lab Setup

Lecture 3 Install Parrot OS on VMWARE

Lecture 4 Install Kali Linux on VMWARE (Optional)

Lecture 5 Use Prebuilt Kali Linux on VMWARE

Lecture 6 Setup Metasploitable 2 on VMWARE

Section 3: Footprinting and Reconnaissance

Lecture 7 Dir Busting and Vhost Enumeration - Web

Lecture 8 Subdomain Enumeration Challenge (Takeover THM free room)

Lecture 9 Passive Reconnaissance with Digital Certificates

Lecture 10 DNS Footprinting and Enumeration

Section 4: Scanning and Enumeration

Lecture 11 Identifying Live Hosts

Lecture 12 Service and OS Discovery

Lecture 13 NetBios Enumeration

Lecture 14 SMB Enumeration

Section 5: System Hacking

Lecture 15 Introduction to Module

Lecture 16 Introduction to Metasploit and Windows 10 Hacking Demo

Lecture 17 Scanning Networks

Lecture 18 Vulnerability Assessment

Lecture 19 Exploitation

Lecture 20 Post Exploitation

Lecture 21 Hacking Windows Challenge (Blue THM Free Room)

Lecture 22 Setting up Hack the Box and Crack Meow Machine

Lecture 23 FTP Exploitation

Lecture 24 FTP Exploitation Challenge 1 - HTB Fawn

Lecture 25 SMB Exploitation

Lecture 26 SMB Exploitation Challenge - HTB Dancing

Lecture 27 Telnet Exploitation

Lecture 28 Redis Database Exploitation (Optional) - HTB Redeemer

Section 6: Steganography and Hiding Activities

Lecture 29 Covert Communication Channels

Lecture 30 Hide Files Using Alternate Data Streams

Lecture 31 White Space Steganography - Snow

Lecture 32 Image Steganography

Section 7: Hacking Web Applications and Web Servers

Lecture 33 Install DVWA on Kali

Lecture 34 Install DVWA on Windows

Lecture 35 Command Execution Vulnerabilities - Linux

Lecture 36 Command Execution Vulnerabilities - Windows

Lecture 37 Command Execution Challenge (Pickle Rickle THM Free Room)

Lecture 38 File Upload Vulnerabilities

Lecture 39 Brute Forcing Web Applications Passwords with Burp and Hydra

Lecture 40 Brute Forcing Challenge (Brute it THM Free Room)

Lecture 41 Chaining Multiple Vulnerabilities (Command Injection + File Upload)

Lecture 42 SQL Injection Vulnerabilities -1

Lecture 43 SQL Injection Vulnerabilities -2

Lecture 44 SQL Injection Challenge (SQLMAP THM Free Room)

Lecture 45 Hacking Wordpress Websites with WPscan

Section 8: Packet Analysis with Wireshark

Lecture 46 Detect DDOS attack with Wireshark

Lecture 47 Credentials extraction from Wireshark

Lecture 48 Detect IoT traffic

Section 9: Hacking Mobile Platforms

Lecture 49 Install Android on Vmware

Lecture 50 Hacking Android Devices with msfvenom

Lecture 51 Hacking Android Devices with Phonesploit over ADB

Section 10: Wifi Hacking

Lecture 52 Introduction to Wifi Hacking

Lecture 53 Crack Wifi with Aircrack

Lecture 54 Capturing Handshakes with Hcxdumptool

Lecture 55 Preparing captured Handshakes for Cracking

Lecture 56 Cracking WIFI passwords with hashcat

Lecture 57 Cracking Wifi Passwords with FERN

Section 11: Cloud Security

Lecture 58 Enumerating S3 Buckets

Lecture 59 Exploiting S3 Buckets Unauthenticated

Lecture 60 Exploiting S3 Buckets Authenticated

Section 12: Cryptography

Lecture 61 Disk Encryption Using Veracrypt

Lecture 62 File and Text Message Encryption using Cryptoforge

Lecture 63 File encryption using Advanced encryption package

Lecture 64 Encrypt and Decrypt data using BCtextEncoder

Lecture 65 Calculating Hashes on Windows with different tools

Lecture 66 Cryptanalysis using Cryptool

Students aiming to pass the EC-Council Certified Ethical Hacker (CEH) Practical exam.,Cybersecurity enthusiasts interested in enhancing their skills and knowledge,Beginners White Hat Hackers and Pentesters looking to learn practical hacking and pentesting,Anybody interested in learning ethical hacking / penetration testing,Ethical Hacking professional who are looking for more practical stuff