About This Course
Become Certified Ethical Hacker This course assumes you have NO basic knowledge and by the end of it you’ll be able to penetrate the system, web application and server like cybersecurity expert or a black hat hacker’s choice is yours!
In this course, you will learn highly practical but it won’t neglect theory we will start ethical hacking from very basics to advance. You will learn everything for example exploiting different systems such as networks, servers, client host, websites.. etc.
The course is divided into a number of sections, each section covers a penetration testing/hacking field, in each of these sections you’ll first learn how the target system works, the weaknesses of this system, and how to practically exploit these weaknesses to hack into this system.
Ethical Hacking – Become Certified Ethical Hacker
The course is divided into four main sections:
1. Network Hacking: –
In this section, you will learn how to intrude any network, hacking wifi, hacking network, this section divided into three categories :
- Pre Connection Attack – In this subsection, you will learn how to gather basic information before the attack
- Gaining Access – In this subsection you will learn how to hack wifi and intrude any network remotely
- Post Connection Attacks – Once you intrude on any network then you will learn the most common network attack like IP spoofing, mac spoofing, sniffing, arp spoofing. … etc.
2. Gaining Access:
In this section, you will learn how to gain full access to computer systems without user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed service.
Then use this information to discover weaknesses and vulnerabilities and exploit them to gain full control over the target. Finally you will learn how to automatically scan servers for vulnerabilities and generate different types of reports with your discoveries.
3. Post Exploitation:
In this section, you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target (capture key strikes, turn on the webcam, take screenshots….etc) and even use the target computer as a pivot to hack other systems.
4. Website / Web Application Penetration Testing:
In this section, you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ….etc).
And how to discover and exploit the following dangerous vulnerabilities to hack into websites:
- File Upload.
- Code Execution.
- Local File Inclusion.
- Remote File Inclusion.
- SQL Injection.
- Cross Site Scripting (XSS).
At the end of each section, you will learn how to detect, prevent and secure systems and yourself from the discussed attacks.
By the end of the course, you’ll be able to modify these techniques to launch more powerful attacks and adapt them to suit different situations and different scenarios.
Introduction of Hacking
Introduction of hacking and ethical hacking11:44
Phases of Hacking4:57
Ethical Hacking Terminology00:00:00
Setting up a Hacking Lab
Hacking Lab Overview or needed softwares00:00:00
Installing Kali 2020 As a Virtual Machine00:00:00
Basic Overview of Kali Linux & Basic Command of Kali Linux00:00:00
Introduction of IP00:00:00
IPv4 vs IPv600:00:00
How to check ip location00:00:00
TCP Packet and UDP Packet00:00:00
Introduction of Network Penetration Testing00:00:00
Connecting a Wireless Adapter to kali00:00:00
Wireless Modes (Managed & Monitor)00:00:00
What is Mac Address & How to change it00:00:00
Network Hacking – Pre Connection Attacks
Packet Sniffing Basics6:41
Targeted Packet Sniffing6:41
Network Hacking Gaining Access – Security
Create a wordlist using crunch6:42
Cracking WPA & WPA2 Using a Wordlist Attack2:36
Securing Your Network From Hackers00:00:00
Networking Hacking – Post Connection Attacks
Introduction of Post Connection Attacks2:52
Module 9 Network Network Hacking – Post Connection Attack – Information Gathering
Installing Windows as a Virtual Machine6:24
Discovering Devices Connected to the same network4:53
Gathering Senstive Info About Connected Devices (Device Name Ports)3:47
Gathering more sensitive info (Running Services, Operating System )4:44
Network Hacking – Post Connection Attacks – MITM Attacks
Introduction of MITM Attack3:07
What is ARP Spoofing3:54
Introduction of Wireshark6:23
Spying on Network Devices (Capturing remote host data )3:54
Arp spoofing with arpspoof tool00:00:00
Network Hacking – Detection & Security
Secure your network from hackers2:54
Gaining Access to Computers
Introduction of Gaining Access00:00:00
Gaining Access Server Side Attacks
Installing Metasploitable2 as a virtual machine00:00:00
Basic Information Gathering before server hacking00:00:00
Concept of Server Side Attack00:00:00
Hacking a Remote Server using metasploit00:00:00
Gaining Access -Client Side Attacks
Introduction of Client Side Attacks00:00:00
Fundamental of Metasploit Framework00:00:00
Window Hacking – Gaining Access00:00:00
Gaining Access – Post Exploitation
Post Exploitation Attacks – Steal Keylogs and monitor all information about the target00:00:00
Gaining Access – Client Side Attacks- Social enginnering and browser exploitation
Concept of Social Engineering00:00:00
Introduction of Phishing00:00:00
Expose Your Phishing00:00:00
Introduction of beef00:00:00
Change Default Password of Beef00:00:00
Gaining Access – Mail Spoofing
Web Application Penetration Testing
Introduction of Web Application00:00:00
Setup Vulnerable Machine00:00:00
Website Hacking -Information Gathering
Technologies Behind the Web Application and running server details00:00:00
Reverse Domain Lookup00:00:00
Banner Grabbing & Identify running services00:00:00
Website Hacking -File Upload, code Execution & File Inclusion
Introduction of File Upload Vulnerbility00:00:00
Exploitation of File Upload Vulnerbility
Website Hacking -SQL Injection Vulnerabilities
What is SQL Injection00:00:00
SQL Injection on Dvwa00:00:00
SQLI Lab Setup00:00:00
SQL Injection Point00:00:00
Website Hacking – Cross Site Scripting Vulnerabilities
Introduction of Cross Site Scripting00:00:00
Exploitation of XSS00:00:00
Cryptography & Steganography
Hash my file00:00:00
Introduction of Cryptography00:00:00
Generate own PGP Key00:00:00
Firewall and Honeypots
Introduction of Firewall00:00:00
Introduction of window firewall00:00:00
Founder & CEO