Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

The Complete Ethical Hacking Course 2023

Posted By: ELK1nG
The Complete Ethical Hacking Course 2023

The Complete Ethical Hacking Course 2023
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.06 GB | Duration: 6h 46m

Learn Ethical Hacking & Network Penetration Testing From Basic To Advanced

What you'll learn

Setting The Lab

Setting Up Kali Linux

Setting Up Windows Machine

Metasploitable

VirtualBox Snapshots

Kali Linux: Basic & Advanced

Configuring Kali Linux

Network Penetration

Wireless Adapter

MAC Address

Wireless Adapter Modes

Packet Sniffing

De-Authentication Attack

Fake Access Point

Gaining Access To Networks (WIFI Hacking)

WEP Cracking

Packet Injection

ARP Request Replay

WPA/WPA2 Cracking

Exploiting WPS Features

Best Tool For WIFI Hacking

Capturing Handshake

Capturing a Wordlist

Wordlist Attack

Post Connection Attacks

Nmap

ARP Poisoning Using arpspoof

ARP Poisoning Using MITMf

Bypassing HTTPS Pages Using MITMf

Session Hijacking

DNS Spoofing Using MITMf

Eathernet

Wireshark

Security and Protection

Requirements

Anyone With Basic Computer Knowledge

Description

Welcome to ethical hacking course 2023. My name is Niraj Jha. I am an ethical hacker and a penetration tester. And I will be with you throughout this course. This course is actually designed for people who have a little knowledge about computer. And if you don't know anything about hacking, you don't have to worry about it.I will be starting from a basic level and I will take you to a higher intermediate level. So you will be learning each and everything in this course. So first of all, I will tell you how to set up a lab. You need to set up a lab environment where there will be a Kali machine. Kali machine is our attacker machine and each and everything we'll be doing on Kali Linux machine.After that, we will install a Metasploitable machine and then there will be Windows 10 machine. All the executables we run will be in a virtual environment and you don't have to worry about your host machine. You don't have to use your host machine. Each and everything will be done on a virtual environment and all of these machines will be interconnected.Things You Will Learn In This Course: - Setting The Lab- Network Penetration (WIFI Hacking)- Gaining Access To Systems (System Hacking)- Maintaining Access- Mobile Hacking- Website Penetration (Web Hacking)- Post Exploitation- SecurityThe course will be updated time to time and you will learn each and everything to become an ethical hacker in this single course.

Overview

Section 1: 51 Hacking Lessons

Lecture 1 Course Overview

Lecture 2 Basics of Hacking

Lecture 3 Lab Setup

Lecture 4 Setting Up Kali Linux

Lecture 5 Setting Up Kali Linux Using ISO Image

Lecture 6 Setting Up Windows Machine

Lecture 7 Metasploitable

Lecture 8 VirtualBox Snapshots

Lecture 9 Basics of Kali Linux

Lecture 10 Basic Linux Commands

Lecture 11 Configuring Kali Linux

Lecture 12 Basics of Network Penetration

Lecture 13 Basics of Network

Lecture 14 Wireless Adapter

Lecture 15 MAC Address

Lecture 16 Wireless Adapter Modes

Lecture 17 Packet Sniffing

Lecture 18 Targeted Packet Sniffing

Lecture 19 De-Authentication Attack

Lecture 20 Creating A Fake Access Point

Lecture 21 Creating A Fake Access Point (Practical)

Lecture 22 Gaining Access To Networks (WIFI Hacking)

Lecture 23 WEP Cracking

Lecture 24 WEP Cracking (Simple Case)

Lecture 25 Packet Injection

Lecture 26 ARP Request Replay

Lecture 27 WPA/WPA2 Cracking

Lecture 28 Exploiting WPS Features

Lecture 29 Best Tool For WIFI Hacking

Lecture 30 Capturing Handshake

Lecture 31 Capturing Handshake Part 2

Lecture 32 Capturing a Wordlist

Lecture 33 Launching the Wordlist Attack

Lecture 34 De-Authentication Attack safety

Lecture 35 Post Connection Attacks

Lecture 36 Discovering Connected Client/Devices

Lecture 37 Nmap

Lecture 38 Nmap Practical

Lecture 39 Nmap Practical 2

Lecture 40 ARP Poisoning Using arpspoof

Lecture 41 ARP Poisoning Using MITMf

Lecture 42 Bypassing HTTPS Pages Using MITMf

Lecture 43 Session Hijacking

Lecture 44 DNS Spoofing Using MITMf

Lecture 45 DNS Spoofing Part2

Lecture 46 Eathernet

Lecture 47 Wireshark

Lecture 48 Wireshark Practical

Lecture 49 Wireshark Part3

Lecture 50 Security and Protection

Lecture 51 Detecting Any Suspicious Activities Using Wireshark

Beginners to Advanced