Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z

    Posted By: ELK1nG
    Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z

    Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z
    Last updated 11/2020
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.13 GB | Duration: 5h 46m

    Learn ethical hacking:Become a Pro ethical hacker that can hack computer systems like black hat hackers.

    What you'll learn

    95+ ethical hacking &security video lectures.

    Start from 0 to become pro hacker.

    Learn ethical hacking & the different types of hackers.

    Learn to install a hacking lab & needed softwares.

    Learn kali linux commands and basics of using terminal.

    Basic to adnvance Ethical hacking.

    Hack and secure server and client operating system.

    Create undetecable backdoors.

    Learn to secure and protect any network from hackers and loss of data.

    step by step instructions for instalation of virtual boc and creating your virtual environment.

    Learn basics of website and its technology.

    what is websitre and its components.

    Gathering information about website like black hat hackers do.

    learn to crack wifi password of any security level WEP,WPA,WPA2.

    World class tools for gatting best results.

    All the attacks are performed live.

    Requirements

    Internet Connection & Computer (minimum 4gb RAM or more).

    Basic computer skill.

    Wireless networking card.

    Description

    Welcome to Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:ZThis Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals.Ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.The course is divided into four main sections so let's see what we are going to learn:Network Penetration TestingNetwork penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.Gaining accessGaining access attack is the second part of the network penetration testing. In this section, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn't use encryption, we can just connect to it and sniff out unencrypted data. If a network is wired, we can use a cable and connect to it, perhaps through changing our MAC address. The only problem is when the target use encryption like WEP, WPA, WPA2. If we do encounter encrypted data, we need to know the key to decrypt it, that's the main purpose of this section.Post-Connection AttacksAll the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section.Website / Web Application Hacking In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ….etc) and how to discover and exploit the  dangerous vulnerabilities to hack into websites.Who this course is for:Anyone interested in learning ethical hackingAnyone interested in  how hackers hack computer systemsAnyone interested in  how to secure systems from hackersNotes:This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.

    Overview

    Section 1: Introduction

    Lecture 1 Ethical Hacking

    Lecture 2 Hacking Field

    Lecture 3 Hackers World

    Section 2: Hacking Lab Setup

    Lecture 4 Virtual Box- Virtual environment

    Lecture 5 Hacker's OS- Kali Linux

    Lecture 6 Vulnerable Machine- Metasploitable 2

    Lecture 7 Broken WEB: OWASP BWA

    Lecture 8 Getting Kali linux

    Lecture 9 Getting Metasploitable 2

    Lecture 10 Getting OWASP BWA

    Section 3: Kali Linux Basics

    Lecture 11 Introduction

    Lecture 12 Overview

    Lecture 13 Linux Terminal

    Lecture 14 Linux Basics 1

    Lecture 15 Linux Basics 2

    Lecture 16 Linux Basics 3

    Lecture 17 Linux Basics 4

    Section 4: Network Penetration Testing

    Lecture 18 Introduction

    Lecture 19 Network Basics

    Lecture 20 Wireless Communication

    Lecture 21 Wireless standards

    Lecture 22 Frequency spectrum

    Lecture 23 Adapter modes

    Lecture 24 Mapping adpater

    Section 5: Pre-connection attack

    Lecture 25 Overview

    Lecture 26 Monitor Mode

    Lecture 27 Airodump-ng

    Lecture 28 Sniffing Network

    Lecture 29 Deauthentication attack

    Section 6: Gaining access

    Lecture 30 Overview

    Lecture 31 WEP- Wired Equivalent Privacy

    Lecture 32 WEP Cracking

    Lecture 33 Fake authentication attack

    Lecture 34 ARP request replay attack

    Lecture 35 Wifi Protected Access-WPA

    Lecture 36 Handshake

    Lecture 37 Capturing Handshake

    Lecture 38 Creating wordlist

    Lecture 39 Cracking key

    Section 7: Post-connection attack

    Lecture 40 Post-connection attack

    Lecture 41 Netdiscovery

    Lecture 42 Zenmap

    Section 8: Computer Hacking

    Lecture 43 Computer hacking

    Section 9: Server-side attack

    Lecture 44 Server-side attack basics

    Lecture 45 Server side vulnerability

    Lecture 46 Attacking Metasploitable 2

    Lecture 47 Advance server hacking

    Section 10: System Hacking- Client-side attack

    Lecture 48 Introduction

    Lecture 49 Veil Evasion

    Lecture 50 Installation

    Lecture 51 Overview

    Lecture 52 Generating backdoor

    Lecture 53 Listening to connection

    Lecture 54 Sending Backdoor

    Section 11: Web Application technologies

    Lecture 55 HTTP Protocol

    Lecture 56 HTTP request

    Lecture 57 HTTP response

    Lecture 58 HTTP methods

    Lecture 59 URL

    Lecture 60 HTTP header

    Lecture 61 General header

    Lecture 62 Request header

    Lecture 63 Response header

    Lecture 64 Cookies

    Lecture 65 Status code

    Section 12: Web Application Information Gathering

    Lecture 66 Information gathering

    Lecture 67 Whois

    Lecture 68 NSLookup

    Lecture 69 Netcraft

    Lecture 70 Dmitry

    Lecture 71 Reverse DNS Lookup

    Lecture 72 ROBtex

    Lecture 73 Subdomain

    Section 13: BruteForce attack

    Lecture 74 Brute forcing

    Lecture 75 Attacking

    Section 14: Cross-site scripting

    Lecture 76 XSS

    Lecture 77 Reflected XSS

    Lecture 78 Basic attack

    Lecture 79 Advance attack

    Lecture 80 Stored based xss

    Lecture 81 Basic attack

    Lecture 82 advance attack

    Section 15: File Upload Vulnerability

    Lecture 83 FUV- Introduction

    Lecture 84 Attacking FUV

    Lecture 85 Advance attacking FUV

    Section 16: Structured query language-SQLi

    Lecture 86 SQL injection

    Lecture 87 SQL Basics 1

    Lecture 88 SQL Basics 2

    Lecture 89 SQL Basics 3

    Lecture 90 SQL Basics 4

    Lecture 91 SQL Basics 5

    Lecture 92 SQL Basics 6

    Lecture 93 SQL mannual

    Lecture 94 Union Based SQLi

    Lecture 95 Attacking

    ethical hacker,cyber security,penetration testing,network penetration testing,python developer,programmer,coder,data science,web developer,port programmer,computer network,hacker,computer fundamentals,it skill,computer skill,network hacking