Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Complete Ethical Hacking Course 2023 | Zero To Professional

    Posted By: ELK1nG
    Complete Ethical Hacking Course 2023 | Zero To Professional

    Complete Ethical Hacking Course 2023 | Zero To Professional
    Published 8/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 18.60 GB | Duration: 32h 50m

    Learn 20+ Ethical Hacking Modules ! 130+ Labs and Realtime scenarios with lab activities | Enterprise pentesting tools

    What you'll learn

    20+ Ethical hacking modules with practical explanation and hands-on labs

    Complete kali linux commands, architecture, file-system, and Servers

    kali Communication commands and filter commands

    Web Application penetration testing with OWASP top 10

    Understanding SQL injection with real-time explanation

    Discover CSRF & SSRF attacks

    Working with NMAP and latest firewall evasion techniques and tactics

    Using wireshark to sniff the traffic and gather plain text passwords, and understand MITM attacks

    Real-time practical sessions with advanced tools and techniques

    Working with Session hijacking to understand session exploitation techniques and process

    Understand DOS and DDOS attacks using wireshark and HPING3

    working with System hacking to understand how systems are exploited and countermeasures

    understand nessus and web application scanning using nessus

    Shell scripting with pentest automation scripts and loops, operators, and shell code

    Vulnerability assessment using automation tools and manual tools as well

    Understanding Android hacking with root and backdoor to gain unauthorized access

    database hacking and gain unauthorized access

    Complete ethical hacking bootcamp and ethical hacking course

    Requirements

    No prior experience needed, This course designed from scratch to mastery

    Description

    Hi Techies..! Welcome this Latest tactics, techniques of Complete Ethical Hacking course 2023 | This course Designed from scratch to professional with latest tools and techniques and ethical hacking concepts along with Web application, network, wireless, cloud, server, and system/endpoint based pentesting. in this course you'll learn 20+ ethical hacking modules with NO prior Experience & knowledge and end of this course you'll become a Security Expert & Pentesting Professional This course is both theory and practical sessions. first, we explain Kali Linux's complete setup, architecture, File-systems, and effective usage of commands and servers in Linux machines, then we'll dive you to an ethical hacking theory party along with practical hands-on sessions and each session Tools are attached, you can learn how to install tool and practical while learning also.You'll learn web applications, network scanning & exploitations, wireless, servers, system hacking & endpoint exploitation and cloud pentesting also. We understand student view thats why we divided this course into two sections (Theory and practical). End of the course you will learn latest ethical hacking tactics, techniques and tools used for hacking and penetration testing in various levels. Topics covered in this course: 1. Lab Setup (Kali linux & windows VMware installation and configuration) 2. Complete kali Linux course (commands, architecture, file-system, services, and servers) 3. Practical Shell scripting & Pentesting automation scripts (you'll learn how to create automation scripts using shell scripting) 4. Understand Ethical hacking overview & Footprinting 5. Understanding network security and network scanning techniques (using NMAP, angryip-scanner, Ping, HPING3 other 10+ tools) 6. Understanding enumeration process and create active connections 7. System hacking (Windows, Unix using latest tools and techniques) 8. Understanding Sniffing and MITM attacks (Wireshark) 9. Understanding Social Engineering and Phising, Smishing, and Spear-phishing attacks 10. Understanding Vulnerability analysis using automation and manual 11. Denial of service and distributed denial of service attacks and mitigation process12. Session hijacking in web applications and mitigation steps and counter attacks 13. understanding Web application pentesting and OWASP top 1014. Learn Practical SQL Injection (error, boolean, time based, union, and blind Injections) 15. Understanding server exploitations and mitigation steps 16. Understanding Wireless attacks and latest tools with countermeasures 17. Understanding Andriod and IOS exploitation and working with backdoors to gain unauthorized access 18. Understanding Cloud attacks and deployments 19, Cryptography techniques Who this course is for:1. Ethical hacking professionals 2. Student who wants to learn cyber security3. Cyber security interested students4. Security experts and professionals

    Overview

    Section 1: Ethical Hacking Lab Setup

    Lecture 1 Kali linux Virtual Machine setup

    Lecture 2 Windows virtual machine setup

    Lecture 3 Important tools in Ethical Hacking

    Section 2: Complete Kali Linux Command-Line & Shell Scripting

    Lecture 4 Directories in Kali Linux

    Lecture 5 Services in Kali Linux

    Lecture 6 Servers in kali Linux

    Lecture 7 Users management

    Lecture 8 Metasploit Framework

    Lecture 9 Important Tools in Cyber Security

    Lecture 10 Cat Command

    Lecture 11 Cal Command (calendar)

    Lecture 12 CD Command

    Lecture 13 cmp diff Command

    Lecture 14 cp command (copy files)

    Lecture 15 Date command

    Lecture 16 Egrep Command

    Lecture 17 File Permissions

    Lecture 18 Find command

    Lecture 19 Find files by names command

    Lecture 20 Find files by type and perm

    Lecture 21 grep command

    Lecture 22 ls command (List)

    Lecture 23 Mkdir command (make the directory)

    Lecture 24 Modes command

    Lecture 25 Paste command

    Lecture 26 pwd command (present working directory)

    Lecture 27 rm command (to remove the files)

    Lecture 28 Sort command

    Lecture 29 touch command

    Lecture 30 tr command (translate)

    Lecture 31 Uname command

    Lecture 32 uniq command

    Lecture 33 Users_last command

    Lecture 34 w command (who)

    Lecture 35 wc command (word count)

    Lecture 36 whereis command

    Lecture 37 whoami command

    Lecture 38 who command

    Lecture 39 who-is-logged command

    Lecture 40 Vi editor

    Lecture 41 Filter commands

    Lecture 42 Communication commands

    Lecture 43 Shell Scripting introduction

    Lecture 44 Shell Scripting Command line Arguments

    Lecture 45 Shell Scripting operators

    Lecture 46 Shell scripting functions

    Lecture 47 Shell Scripting Control Statements

    Lecture 48 Shell Scripting Loops

    Lecture 49 Pentest automate - Project 1

    Lecture 50 Pentest automate - Project 2

    Lecture 51 Pentest automate - Project 3

    Section 3: Introduction to Ethical Hacking & Threat vectors

    Lecture 52 Information Security Overview

    Lecture 53 Information Security Threats and Attack Vectors

    Lecture 54 Hacking Concepts

    Lecture 55 Ethical Hacking Concepts

    Lecture 56 Penetration Testing Concepts

    Section 4: Understanding Footprinting and Information gathering

    Lecture 57 Footprinting Concepts

    Lecture 58 Footprinting through Search Engines

    Lecture 59 Footprinting through Social Networking Sites

    Lecture 60 Email Footprinting

    Lecture 61 Competitive Intelligence

    Lecture 62 Who is Footprinting

    Lecture 63 DNS Footprinting

    Lecture 64 Network Footprinting

    Lecture 65 Footprinting through Social Engineering

    Lecture 66 Footprinting Tools

    Lecture 67 Footprinting Countermeasures

    Lecture 68 Footprinting Penetration Testing

    Lecture 69 lab1 - Open Source Information Gathering Using Windows Command Line Utilities

    Lecture 70 lab 2 - Collecting Information About a Target Website Using Firebug

    Lecture 71 lab 3 - Mirroring Website Using HTTrack Web Site Copier

    Lecture 72 lab 4 - Advanced Network Route Tracing Using Path Analyzer Pro

    Lecture 73 lab 5 - Information Gathering Using Metasploit

    Section 5: Understanding Scanning Networks

    Lecture 74 Network Scanning Concepts

    Lecture 75 Scanning Techniques part 1

    Lecture 76 Scanning Techniques part 2

    Lecture 77 Scanning Beyond IDS and Firewall part 1

    Lecture 78 Scanning Beyond IDS and Firewall

    Lecture 79 Banner Grabbing

    Lecture 80 Draw Network Diagrams

    Lecture 81 Scanning Pen Testing

    Lecture 82 lab 1 - UDP and TCP Packet Crafting Techniques using HPING3

    Lecture 83 lab 2 - Scanning The Network Using The Colasoft Packet Builder

    Lecture 84 lab 3 - Basic Network Troubleshooting Using MegaPing

    Lecture 85 lab 4 - Understanding Network Scanning Using Nmap

    Lecture 86 lab 5 - Exploring Various Network Scanning Techniques

    Lecture 87 lab 6 - Scanning a Network Using NetScan Tools Pro

    Lecture 88 lab 7 - Avoiding Scanning Detection using Multiple Decoy IP Addresses

    Lecture 89 lab 8 - Drawing Network Diagrams Using Network Topology Mapper

    Lecture 90 lab 9 - Checking for Live Systems Using Angry IP Scanner

    Lecture 91 lab 10 - Scanning for Network Traffic Going Through a Computer’s Adapter Using I

    Lecture 92 lab 11 - Identify Target System OS with TTL and TCP Window Sizes using Wireshark

    Lecture 93 Scanning_network Practical Tools

    Section 6: Working Enumeration & Exploit services at network level

    Lecture 94 Enumeration Concepts

    Lecture 95 NetBIOS Enumeration

    Lecture 96 SNMP Enumeration

    Lecture 97 LDAP Enumeration

    Lecture 98 NTP Enumeration

    Lecture 99 Other Enumeration Techniques

    Lecture 100 Enumeration Countermeasures

    Lecture 101 Enumeration Pen Testing

    Lecture 102 lab 1 - NetBIOS Enumeration Using Global Network Inventory

    Lecture 103 lab 2 - Enumerating Network Resources Using Advanced IP Scanner

    Lecture 104 lab 3 - Performing Network Enumeration Using SuperScan

    Lecture 105 lab 4 - Enumerating Resources in a Local Machine Using Hyena

    Lecture 106 lab 5 - Performing Network Enumeration Using NetBIOS Enumerator

    Lecture 107 lab 6 - Enumerating a Network Using SoftPerfect Network Scanner

    Lecture 108 lab 7 - Enumerating a Target Network using Nmap and Net Use

    Lecture 109 lab 8 - Enumerating Services on a Target Machine

    Lecture 110 lab 9 - SNMP Enumeration Using snmp_enum

    Lecture 111 lab 10 - LDAP Enumeration Using Active Directory Explorer (ADExplorer)

    Lecture 112 lab 11 - Enumerating information from Windows and Samba host using Enum4linux

    Lecture 113 Enumeration Practical Tools

    Section 7: Understanding Network based Vulnerability Analysis

    Lecture 114 Vulnerability Assessment Concepts

    Lecture 115 Vulnerability Assessment Solutions

    Lecture 116 Vulnerability Scoring Systems

    Lecture 117 Vulnerability Assessment Tools

    Lecture 118 Vulnerability Assessment Reports

    Lecture 119 lab1 - Vulnerability Analysis Using Nessus

    Lecture 120 lab2 - CGI Scanning with Nikto

    Lecture 121 VA practical Tools

    Section 8: Understanding System Hacking & Endpoint Exploitation

    Lecture 122 System Hacking Concepts

    Lecture 123 Cracking Passwords part 1

    Lecture 124 Cracking Passwords part 2

    Lecture 125 Cracking Passwords part 3

    Lecture 126 Escalating Privileges

    Lecture 127 Steganography

    Lecture 128 Hiding Files part 2

    Lecture 129 Hiding Files part 3

    Lecture 130 Covering Tracks

    Lecture 131 Penetration Testing

    Lecture 132 lab1 - Dumping and Cracking SAM Hashes to Extract Plaintext Passwords

    Lecture 133 lab2 - Creating and Using Rainbow Tables

    Lecture 134 lab3 - Auditing System Passwords Using L0phtCrack

    Lecture 135 lab5 - Escalating Privileges by Exploiting Client Side Vulnerabilities

    Lecture 136 lab6 - Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpre

    Lecture 137 lab7 - User System Monitoring and Surveillance Using Spytech SpyAgent

    Lecture 138 lab8 - Web Activity Monitoring and Recording using Power Spy

    Lecture 139 lab9 - Hiding Files Using NTFS Streams

    Lecture 140 lab10 - Hiding Data Using White Space Steganography

    Lecture 141 lab11 - Image Steganography Using OpenStego

    Lecture 142 lab12 - Image Steganography Using Quick Stego

    Lecture 143 lab13 - Viewing, Enabling, and Clearing Audit Policies Using Auditpol

    Lecture 144 lab14 - Hacking Windows Server 2012 with a Malicious Office Document Using TheFa

    Lecture 145 lab15 - Active Online Attack using Responder

    Lecture 146 Practical Tools - System hacking

    Section 9: Working with Malware Threats and Gaining Access & Maintaining Access

    Lecture 147 Malware Concepts

    Lecture 148 Trojan Concepts part 1

    Lecture 149 Trojan Concepts part 2

    Lecture 150 Trojan Concepts part 3

    Lecture 151 Virus and Worm Concepts part 1

    Lecture 152 Virus and Worm Concepts part 2

    Lecture 153 Virus and Worm Concepts part 3

    Lecture 154 Malware Analysis part 1

    Lecture 155 Malware Analysis part 2

    Lecture 156 Malware Analysis part 3

    Lecture 157 Countermeasures

    Lecture 158 Anti-Malware Software

    Lecture 159 Malware Penetration Testing

    Lecture 160 lab1 - Creating an HTTP Trojan and Remotely Controlling a Target Machine Using H

    Lecture 161 lab2 - Creating a Trojan Server Using the GUI Trojan MoSucker

    Lecture 162 lab3 - Gaining Control over a Victim Machine Using njRAT

    Lecture 163 lab4 - Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Var

    Lecture 164 lab5 - Creating a Server Using the ProRat Tool

    Lecture 165 lab6 - Creating a Trojan Server Using Theef

    Lecture 166 lab7 - Creating a Virus Using the JPS Virus Maker Tool

    Lecture 167 lab8 - Creating a Worm Using Internet Worm Maker Thing

    Lecture 168 lab9 - Virus Analysis using IDA

    Lecture 169 lab10 - Virus Analysis Using OllyDbg

    Lecture 170 lab11 - Detecting Trojans

    Lecture 171 lab12 - Monitoring TCP/IP Connections Using the CurrPorts

    Lecture 172 lab13 - Removing Malware using Clamwin

    Lecture 173 lab14 - Performing Registry Entry Monitoring

    Lecture 174 lab15 - Startup Program Monitoring Tool

    Lecture 175 Practical Tools

    Section 10: Understanding Sniffing and MITM attacks

    Lecture 176 Sniffing Techniques part 1

    Lecture 177 Sniffing Techniques part 2

    Lecture 178 Sniffing Techniques part 3

    Lecture 179 Sniffing tools

    Lecture 180 Countermeasures

    Lecture 181 Sniffing Detection Techniques

    Lecture 182 Sniffing Pen Testing

    Lecture 183 lab1 - Sniffing Passwords using Wireshark

    Lecture 184 lab2 - Analyzing a Network Using Capsa Network Analyzer

    Lecture 185 lab3 - Spoofing MAC Address Using SMAC

    Lecture 186 lab4 - Performing Man-in-the-Middle Attack using Cain & Abel

    Lecture 187 lab5 - Detecting ARP Poisoning in a Switch Based Network

    Lecture 188 lab6 - Detecting ARP Attacks with XArp Tool|| lab duration

    Lecture 189 Sniffing Practical Tools

    Section 11: Understanding Social Engineering attacks and countermeasures

    Lecture 190 Social Engineering Concepts

    Lecture 191 Social Engineering Techniques

    Lecture 192 Insider Threats

    Lecture 193 Impersonation on Social Networking Sites

    Lecture 194 Identity Theft

    Lecture 195 Countermeasures

    Lecture 196 Social Engineering Pen Testing

    Lecture 197 lab1 - Sniffing Website Credentials Using Social Engineering Toolkit (SET)

    Section 12: Denial-Of-Service & DDOS attacks

    Lecture 198 DOS/DDoS Concepts

    Lecture 199 DOS/DDOS Attack Techniques

    Lecture 200 Botnets

    Lecture 201 DDoS Case Study

    Lecture 202 DoS/DDOS Attack Tools

    Lecture 203 Countermeasures

    Lecture 204 DoS/DDoS Protection Tools

    Lecture 205 DoS/DDoS Penetration Testing

    Lecture 206 lab1 - SYN Flooding a Target Host Using Metasploit

    Lecture 207 lab2 - SYN Flooding a Target Host Using hping3

    Lecture 208 lab3 - Performing Distributed Denial of Service Attack Using HOIC

    Section 13: Working with Session Hijacking

    Lecture 209 Session Hijacking Concepts

    Lecture 210 Application Level Session Hijacking

    Lecture 211 Network Level Session Hijacking

    Lecture 212 Session Hijacking Tools

    Lecture 213 Countermeasures

    Lecture 214 Countermeasures - 2

    Lecture 215 Penetration Testing

    Lecture 216 lab1 - Session Hijacking Using the Zed Attack Proxy (ZAP)

    Lecture 217 Session Hijacking Practical Tools

    Section 14: Understanding Bypassing IDS, Firewalls, and Honeypots at perimeter level

    Lecture 218 IDS, Firewall and Honeypot Concepts

    Lecture 219 IDS, Firewall and Honeypot Solutions- 1

    Lecture 220 IDS, Firewall and Honeypot Solutions - 2

    Lecture 221 Evading IDS

    Lecture 222 Evading Firewalls

    Lecture 223 IDS/Firewall Evading Tools

    Lecture 224 Detecting Honeypots

    Lecture 225 IDS/Firewall Evasion Countermeasures

    Lecture 226 Penetration Testing

    Lecture 227 lab1 - Detecting Intrusions Using Snort

    Lecture 228 lab2 - Detecting Malicious Network Traffic Using HoneyBOT

    Lecture 229 lab3 - Bypassing Windows Firewall Using Nmap Evasion Techniques

    Lecture 230 lab 4 - Bypassing Firewalls using HTTP/FTP Tunneling

    Lecture 231 lab 5 - Bypassing Windows Firewall using Metasploit

    Lecture 232 Practical Tools

    Section 15: Hacking Web Servers and footprinting web servers

    Lecture 233 Web Server Concepts

    Lecture 234 Web Server Attacks

    Lecture 235 Web Server Attack Methodology

    Lecture 236 Web Server Attack Tools

    Lecture 237 Countermeasures

    Lecture 238 Patch Management

    Lecture 239 Web Server Security Tools

    Lecture 240 Web Server Pen Testing

    Lecture 241 lab1 - Performing Web Server Reconnaissance using Skipfish

    Lecture 242 lab 2 - Footprinting a Web Server Using the httprecon Tool

    Lecture 243 lab3 - Footprinting a Web Server Using ID Serve

    Lecture 244 lab4 - Cracking FTP Credentials Using Dictionary Attack

    Lecture 245 lab5 - Uniscan Web Server Fingerprinting in Kali Linux

    Lecture 246 Practical Web server Tools

    Section 16: Hacking Web Applications & OWASP TOP 10 attacks

    Lecture 247 Introduction of Web Application hacking

    Lecture 248 Web Application Threats

    Lecture 249 Web Application pentesting tools

    Lecture 250 Countermeasures

    Lecture 251 Web Application security tools

    Lecture 252 lab1 - Exploiting Parameter Tampering and XSS Vulnerabilities in Web Application

    Lecture 253 lab2 - Enumerating and Hacking a Web Application Using WPScan and Metasploit

    Lecture 254 lab3 - Exploiting Remote Command Execution Vulnerability to Compromise a Target

    Lecture 255 lab4 - Auditing Web Application Framework Using Vega

    Lecture 256 lab5 - Website Vulnerability Scanning Using Acunetix WVS

    Lecture 257 lab6 - Exploiting File Upload Vulnerability at Different Security Levels

    Lecture 258 lab7 - Performing Cross-Site Request Forgery (CSRF) Attack

    Section 17: Understanding SQL Injection attacks

    Lecture 259 SQL Injection Concepts

    Lecture 260 Types of SQL Injection

    Lecture 261 SQL Injection Methodology part 1

    Lecture 262 SQL Injection Methodology part 2

    Lecture 263 SQL Injection Tools

    Lecture 264 Evasion Techniques

    Lecture 265 Countermeasures

    Lecture 266 lab1 - SQL Injection Attacks on an MS SQL Database

    Lecture 267 lab2 - Scanning Web Applications Using N-Stalker Tool

    Lecture 268 lab3 - Performing SQL Injection attack against MSSQL to extract Databases and We

    Lecture 269 Practical Tools - SQL Injection

    Section 18: Working with Hacking Wireless Networks

    Lecture 270 Wireless Concepts

    Lecture 271 Wireless Encryption

    Lecture 272 Wireless Threats

    Lecture 273 Wireless Hacking Methodology part 1

    Lecture 274 Wireless Hacking Methodology part 2

    Lecture 275 Wireless Hacking Tools

    Lecture 276 Countermeasures

    Lecture 277 Wireless Security Tools

    Lecture 278 Wireless Pen Testing

    Lecture 279 lab1 - WiFi Packet Analysis using Wireshark

    Lecture 280 lab2 - Cracking a WEP with Aircrack-ng

    Lecture 281 lab3 - Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng

    Lecture 282 Practical Tools - Wireless

    Section 19: Working with Hacking Mobile platforms (Android & IOS)

    Lecture 283 Mobile Platform Attack Vectors

    Lecture 284 Hacking Android OS part 1

    Lecture 285 Hacking Android OS part 2

    Lecture 286 Hacking iOS

    Lecture 287 Mobile Spyware

    Lecture 288 Mobile Device Management

    Lecture 289 Mobile Security Guidelines and Tools

    Lecture 290 Mobile Pen Testing

    Lecture 291 lab 1 - Creating Binary Payloads using Kali Linux to Hack Android

    Lecture 292 lab 2- Harvesting the user's credentials using the Social Engineering

    Lecture 293 Practical Tools - Android

    Section 20: Understanding Cloud Computing overview and attacks

    Lecture 294 Cloud Computing Concepts

    Lecture 295 Cloud Computing Threats

    Lecture 296 Cloud Computing Attacks

    Lecture 297 Cloud Security

    Lecture 298 Cloud Security Tools

    Lecture 299 Cloud Penetration Testing

    Lecture 300 lab1 - Creating User Accounts and Assigning User Rights in ownCloud

    Lecture 301 lab2 - Securing ownCloud from Malicious File uploads using ClamAV

    Lecture 302 lab3 - Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux

    Lecture 303 lab4 - Implementing DoS Attack on Linux Cloud Server Using Slowloris Script

    Section 21: Working with advanced Cryptography techniques and tactics

    Lecture 304 Cryptography Concepts

    Lecture 305 Encryption Algorithms

    Lecture 306 Cryptography Tools

    Lecture 307 Public Key Infrastructure (PKI)

    Lecture 308 Email Encryption

    Lecture 309 Disk Encryption

    Lecture 310 Cryptanalysis

    Lecture 311 Countermeasures

    Lecture 312 lab1 - Calculating One-Way Hashes Using HashCalc

    Lecture 313 lab2 - Calculating MD5 Hashes Using MD5 Calculator

    Lecture 314 lab3 - Understanding File and Text Encryption Using CryptoForge

    Lecture 315 lab4 - Encrypting and Decrypting the Data Using BCTextEncoder

    Lecture 316 lab5 - Creating and Using Self-Signed Certificate

    Lecture 317 lab6 - Basic Disk Encryption Using VeraCrypt

    Lecture 318 lab7 - Basic Data Encryption Using CrypTool

    VAPT professionals,Cyber security experts,Students who are interested in cyber security domain,Ethical hacker