What you will learn:
Requirements of Ethical Hacking Bootcamp :
- Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
- Learn Python from scratch so you are able to write your own tools for ethical hacking
- Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
- Create additional virtual *vulnerable* machines that we can practice our attacks on
- Create trojans, viruses, keyloggers for ethical hacking
- Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
- Learn how to crack Wireless Access Point passwords
- Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
- Learn how to gain access to any type of machine: Windows/Linux/MacOS
- Sniff passwords over the local area network with Man In The Middle Attacks
- SQL Injection, XSS, Command Injection and other techniques
- Learn how to trick people into opening your program (i.e Social Engineering)
- Learn Advance Metasploit Framework usage
- Learn Basics of Linux and Linux Terminal
- Master Information Gathering and Footprinting
- Learn how to perform Vulnerability Analysis
- Perform advanced scanning of an entire network
- Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
- Learn Website Application Penetration Testing from scratch
- Learn Advance Nmap Usage
- Code your own Advanced Backdoor that you can use in your Penetration Tests
- Create Persistence on target machines
- Perform newest Windows 7 + 10 exploits & attacks
- Learn how to gain access to a router in various ways
- Learn Networking & different Networking Protocols
- Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
Requirements of Ethical Hacking Bootcamp :
- No programming or hacking knowledge required. We teach you from scratch!
- Mac / Windows / Linux – all operating systems work with this course!
- Who this course is for:
- Anybody interested in learning ethical hacking and penetration testing
- Anybody interested in learning python and ethical hacking
- Anybody looking to go beyond a normal “beginner” tutorial that doesn’t give you a chance to practice
- Anybody looking to learn how hackers hack computer systems
- Any developer looking to secure their computer systems from hackers
- Course content of Ethical Hacking Bootcamp :
Introduction Of Ethical Hacking Bootcamp :- Course Outline
- Join Our Online Classroom!
- Exercise: Meet The Community
- What Is Ethical Hacking ?
- Course Resources + Guide
- Setting Up Our Hacking Lab:
- What is A Virtual Machine ?
- Why Linux ?
- Downloading Virtual Box & Kali Linux
- Note: Kali Linux Updates All The Time!
- Creating Our First Virtual Machine
- Installing Kali Linux Operating System
- Update 1 – New & Old Versions of Kali Linux
- Networking Basics
- Full Screen Mode & Network Settings
- Note: Getting Familiar With Kali Linux!
- 5 Stages Of A Penetration Test
- Linux Operating System:
- Navigating Through Linux System
- Creating Files & Managing Directories
- Network Commands & Sudo Privileges In Kali
- Note: Linux File System & Additional Commands
- Reconnaissance & Information Gathering:
- What is Information Gathering ?
- Obtaining IP Address, Physical Address Using Whois Tool
- Whatweb Stealthy Scan
- Aggressive Website Technology Discovering on IP Range
- Note: Same Tools Different Results!
- Gathering Emails Using theHarvester & Hunter.io
- How To Download Tools Online
- Finding Usernames With Sherlock
- Bonus – Email Scraper Tool In Python 3
- Note: More About Information Gathering
- Scanning:
- Theory Behind Scanning
- TCP & UDP
- Installing Vulnerable Virtual Machine
- Netdiscover
- Performing First Nmap Scan
- Different Nmap Scan Types
- ZTM Nmap Cheat Sheet
- Discovering Target Operating System
- Detecting Version Of Service Running On An Open Port
- Filtering Port Range & Output Of Scan Results
- What is a Firewall/IDS ?
- Using Decoys and Packet Fragmentation
- Security Evasion Nmap Options
- Note: Time To Switch Things Up!
- Python Coding Project #1 – Portscanner:
- The 2 Paths
- Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
- Coding a Portscanner in Python 3
- Vulnerability Analysis:
- Finding First Vulnerability With Nmap Scripts
- Manual Vulnerability Analysis & Searchsploit
- Nessus Installation
- Discovering Vulnerabilities With Nessus
- Scanning Windows 7 Machine With Nessus
- Lets cool down for a bit!
- Exploitation & Gaining Access:
- What is Exploitation ?
- What is a Vulnerability ?
- Reverse Shells, Bind Shells ..
- Metasploit Framework Structure
- Msfconsole Basic Commands
- Our First Exploit – vsftp 2.3.4 Exploitation
- Misconfigurations Happen – Bindshell Exploitation
- Information Disclosure – Telnet Exploit
- Software Vulnerability – Samba Exploitation
- Attacking SSH – Bruteforce Attack11:56
- Exploitation Challenge – 5 Different Exploits
- Explaining Windows 7 Setup
- Eternal Blue Attack – Windows 7 Exploitation
- DoublePulsar Attack – Windows Exploit15:04
- BlueKeep Vulnerability – Windows Exploit
- Note: We Can Also Target Routers!
- Update 2 – Routersploit
- Update 3 – Router Default Credentials
- SMBGhost CVE 2020-0796 – Windows 10 Manual Exploitation:
- Note: Not Everything Will Work Smooth!
- Setting Up Vulnerable Windows 10
- Crashing Windows 10 Machine Remotely
- Exploiting Windows 10 Machine Remotely
- Gaining Access (Viruses, Trojans, Payloads:
- Generating Basic Payload With Msfvenom
- Advance Msfvenom Usage Part 1
- Advance Msfvenom Usage Part 2
- Generating Powershell Payload Using Veil
- TheFatRat Payload Creation
- Note: My Payloads Are Getting Detected By An Antivirus!
- Hexeditor & Antiviruses
- Making Our Payload Open An Image
- <img src="/cdn-cgi/image/format=auto,quality=70/https://crax.pro/attachments/1688452310441-png.99257/" data-url="" class="bbImage" data-zoom-target="1" style="" alt="1688452310441" title="1688452310441" width="255" height="352" />
- Course Video Size : 12 GB High Quality Video Content
- part 01
- Download
- part 02
- Download
- part 03
- Download
- part 04
- Download
- part 05
- Download
- part 06
- Download
- part 07
- Download