Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Ethical Hacker (Cehv12) Practical Hands On Labs

    Posted By: ELK1nG
    Certified Ethical Hacker (Cehv12) Practical Hands On Labs

    Certified Ethical Hacker (Cehv12) Practical Hands On Labs
    Published 6/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.12 GB | Duration: 6h 0m

    Complete CEH practical exam preparation course with free challenges and resources

    What you'll learn

    CEH Practical Exam Structure and type of questions expected in the exam

    Setting up a personal lab for CEH Practical practice

    Scanning and Enumerating services on the target

    System Hacking and pentesting methodolgy

    Web applications hacking including wordpress hacking, bruteforcing login forms and Sql Injection

    Wifi hacking and cracking Wifi Passwords

    Using tools for Cryptography and Steganography

    Requirements

    PC or Laptop with 4GB (8GB Recommended) RAM

    No Programming or Linux Skills Required. We teach you from scratch!

    Description

    CEH Practical Complete Training with Free Resources and ChallengesWelcome to the comprehensive and complete practical course on CEH Practical Certification Preparation. In this course, you will embark on an exciting journey to master ethical hacking techniques, specifically tailored to help you succeed in the Certified Ethical Hacker (CEH) practical labs exam. The course provides step-by-step instructions to set up your own hacking lab for practising labs for CEH. You will also be presented with hands-on challenges on free platforms like Try hack me and Hack the Box that will solidify your hacking skills.Learning Objectives:Gain In-Depth Knowledge of Ethical Hacking: Understand the fundamentals of ethical hacking, including various hacking methodologies, reconnaissance techniques, vulnerability assessment, and system exploitation.Master CEH Practical Lab Concepts: Acquire a deep understanding of the CEH practical lab environment, tasks, and challenges.Develop Practical Skills: Engage in hands-on exercises to enhance your practical skills in penetration testing, vulnerability identification, network scanning, and more.Explore Advanced Techniques: Discover advanced hacking techniques such as privilege escalation, password cracking, reverse engineering, and social engineering.Strengthen Cybersecurity Awareness: Learn about the latest cybersecurity threats, attack vectors, and mitigation strategies to protect systems and networks effectively.Course Highlights:Thorough Coverage of CEH Practical Labs: This course provides comprehensive coverage of the CEH practical lab scenarios, ensuring you are well-prepared to tackle the challenges. There are also some free resources provided to challenge yourself and solidify your concepts.Hands-On Labs: Dive into real-world, hands-on lab exercises to practice ethical hacking techniques in a controlled environment.Step-by-Step Guidance: Receive step-by-step guidance and explanations for each lab exercise, enabling you to understand the underlying concepts and techniques thoroughly.Interactive Learning Experience: Engage in interactive activities, quizzes, and challenges to reinforce your understanding and knowledge retention.Up-to-Date Content: Stay current with the latest trends, tools, and methodologies in ethical hacking, ensuring you are well-equipped to tackle contemporary cybersecurity challenges.Practical Tips and Tricks: Discover valuable tips, tricks, and best practices from industry professionals to enhance your efficiency and effectiveness in ethical hacking.Course Syllabus: Module 1: Introduction to CEH CourseCourse IntroIntroduction to CEH practical labs environmentModule 2: Basic Lab SetupInstalling Parrot OS on VMWAREInstall Kali Linux in a virtual environmentVirtualize a vulnerable environment with metasploitableModule 3: Footprinting and ReconnaissanceSubdomain and VHOST EnumerationCertificates and DNS  EnumerationModule 4: Scanning and EnumerationIdentifying live hostsService and OS discoveryEnumerating different servicesModule 5: System HackingScanning a vulnerable targetExploitation and Post ExploitationExploiting different services like FTP, SMB etcComplete hacking methodologyModule 6: SteganographyAlternate data streamsImage and white space SteganographyModule 7: Hacking Web ApplicationsComplete DVWA WalkthroughBrute forcing and SQL InjectionWordPress hackingModule 8: Network traffic analysis with WiresharkAnalyse DOS and DDOS attackExtracting credentialsAnalyse IoT trafficModule 9: Hacking Mobile PlatformsMetasploit and Meterpreter hacking phonesPhonesploit tutorialModule 10: Wireless Network HackingAssessing wireless network securityCracking WEP/WPA/WPA2 encryptionModule 11: Cloud  SecurityEnumeration S3 BucketsExploiting cloud MisconfigurationsModule 12: CryptographyTechniques to hash data and filesEncryption and decryption toolsBy the end of this course, you will possess the knowledge, skills, and confidence necessary to excel in the CEH practical labs and pursue a successful career in ethical hacking and cybersecurity.Enrol now and embark on your journey to becoming a proficient Ethical Hacker.Notes:This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test. The instructor is not linked to any tool or service mentioned in the course in any capacity.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction to the Course

    Lecture 2 CEH Exam Environment & Structure

    Section 2: Basic Lab Setup

    Lecture 3 Install Parrot OS on VMWARE

    Lecture 4 Install Kali Linux on VMWARE (Optional)

    Lecture 5 Use Prebuilt Kali Linux on VMWARE

    Lecture 6 Setup Metasploitable 2 on VMWARE

    Section 3: Footprinting and Reconnaissance

    Lecture 7 Dir Busting and Vhost Enumeration - Web

    Lecture 8 Subdomain Enumeration Challenge (Takeover THM free room)

    Lecture 9 Passive Reconnaissance with Digital Certificates

    Lecture 10 DNS Footprinting and Enumeration

    Section 4: Scanning and Enumeration

    Lecture 11 Identifying Live Hosts

    Lecture 12 Service and OS Discovery

    Lecture 13 NetBios Enumeration

    Lecture 14 SMB Enumeration

    Section 5: System Hacking

    Lecture 15 Introduction to Module

    Lecture 16 Introduction to Metasploit and Windows 10 Hacking Demo

    Lecture 17 Scanning Networks

    Lecture 18 Vulnerability Assessment

    Lecture 19 Exploitation

    Lecture 20 Post Exploitation

    Lecture 21 Hacking Windows Challenge (Blue THM Free Room)

    Lecture 22 Setting up Hack the Box and Crack Meow Machine

    Lecture 23 FTP Exploitation

    Lecture 24 FTP Exploitation Challenge 1 - HTB Fawn

    Lecture 25 SMB Exploitation

    Lecture 26 SMB Exploitation Challenge - HTB Dancing

    Lecture 27 Telnet Exploitation

    Lecture 28 Redis Database Exploitation (Optional) - HTB Redeemer

    Section 6: Steganography and Hiding Activities

    Lecture 29 Covert Communication Channels

    Lecture 30 Hide Files Using Alternate Data Streams

    Lecture 31 White Space Steganography - Snow

    Lecture 32 Image Steganography

    Section 7: Hacking Web Applications and Web Servers

    Lecture 33 Install DVWA on Kali

    Lecture 34 Install DVWA on Windows

    Lecture 35 Command Execution Vulnerabilities - Linux

    Lecture 36 Command Execution Vulnerabilities - Windows

    Lecture 37 Command Execution Challenge (Pickle Rickle THM Free Room)

    Lecture 38 File Upload Vulnerabilities

    Lecture 39 Brute Forcing Web Applications Passwords with Burp and Hydra

    Lecture 40 Brute Forcing Challenge (Brute it THM Free Room)

    Lecture 41 Chaining Multiple Vulnerabilities (Command Injection + File Upload)

    Lecture 42 SQL Injection Vulnerabilities -1

    Lecture 43 SQL Injection Vulnerabilities -2

    Lecture 44 SQL Injection Challenge (SQLMAP THM Free Room)

    Lecture 45 Hacking Wordpress Websites with WPscan

    Section 8: Packet Analysis with Wireshark

    Lecture 46 Detect DDOS attack with Wireshark

    Lecture 47 Credentials extraction from Wireshark

    Lecture 48 Detect IoT traffic

    Section 9: Hacking Mobile Platforms

    Lecture 49 Install Android on Vmware

    Lecture 50 Hacking Android Devices with msfvenom

    Lecture 51 Hacking Android Devices with Phonesploit over ADB

    Section 10: Wifi Hacking

    Lecture 52 Introduction to Wifi Hacking

    Lecture 53 Crack Wifi with Aircrack

    Lecture 54 Capturing Handshakes with Hcxdumptool

    Lecture 55 Preparing captured Handshakes for Cracking

    Lecture 56 Cracking WIFI passwords with hashcat

    Lecture 57 Cracking Wifi Passwords with FERN

    Section 11: Cloud Security

    Lecture 58 Enumerating S3 Buckets

    Lecture 59 Exploiting S3 Buckets Unauthenticated

    Lecture 60 Exploiting S3 Buckets Authenticated

    Section 12: Cryptography

    Lecture 61 Disk Encryption Using Veracrypt

    Lecture 62 File and Text Message Encryption using Cryptoforge

    Lecture 63 File encryption using Advanced encryption package

    Lecture 64 Encrypt and Decrypt data using BCtextEncoder

    Lecture 65 Calculating Hashes on Windows with different tools

    Lecture 66 Cryptanalysis using Cryptool

    Students aiming to pass the EC-Council Certified Ethical Hacker (CEH) Practical exam.,Cybersecurity enthusiasts interested in enhancing their skills and knowledge,Beginners White Hat Hackers and Pentesters looking to learn practical hacking and pentesting,Anybody interested in learning ethical hacking / penetration testing,Ethical Hacking professional who are looking for more practical stuff