Description
In this course, you will :
- 145+ videos (15+ hours) to teach you ethical hacking & cybersecurity from scratch.
- Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap, etc.
- 85+ hands-on real-life hacking examples.
- No prior knowledge required
- Hack & secure WiFi & wired networks.
- Hack cloud servers.
- Create backdoors & Hack Windows.
- Start from 0 up to a high-intermediate level.
- Discover and exploit web application vulnerabilities to hack websites.
- Learn Network Hacking and Penetration Testing.
- Learn about the many hacking professions and hackers.
- Install a hacking lab and the necessary software (on Windows, OS X, and Linux).
- Discover and exploit vulnerabilities in order to hack into servers.
- Secure systems can be hacked utilizing client-side and social engineering.
- Protect systems against all of the assaults shown.
- Install and use Kali Linux, a hacker operating system.
- Linux basics.
- Linux commands
- How to use the Linux terminal.
- Network basics & how devices interact inside a network.
- Run attacks on networks without knowing its key.
- Control Wi-Fi connections without knowing the password.
- Create a fake Wi-Fi network with internet connection & spy on clients.
- Gather detailed information about networks & connected clients like their OS, ports ...etc.
- Crack WEP/WPA/WPA2 encryptions.
- ARP Spoofing / ARP Poisoning.
- Launch various Man In The Middle attacks.
- Access any account accessed by any client on the network.
- Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
- Intercept network communication and change it on the fly.
- Discover which devices are linked to the same network.
- Inject Javascript into pages viewed by clients on the same network.
- Redirect DNS requests to any location (DNS spoofing).
- Protect networks from the aforementioned assaults.
- To ensure optimal security, edit the router settings.
- Discover any unusual activity in networks.
- How to prevent MITM attacks.
- Discover open ports, installed services and vulnerabilities on computer systems.
- Exploit buffer over flows & code execution vulnerabilities to gain control over systems.
- Hack systems using client side attacks.
- Hack Windows using fake updates.
- Backdoor normal programs.
- Backdoor any file type such as pictures, pdf's ...etc.
- Gather information about people, such as emails, social media accounts, emails and friends.
- Hack secure systems using social engineering.
- Send emails from ANY email account without knowing the password for that account.
- Analyse malware.
- Manually detect undetectable malware.
- Read, write download, upload and execute files on compromised systems.
- Capture keystrikes on a compromised system.
- Use a compromised computer as a pivot to hack other systems.
- Understand how websites & web applications work.
- Understand how browsers communicate with websites.
- Gather sensitive information about websites.
- Discover the servers, technologies, and services used on the target website.
- Discover the emails and sensitive data associated with a given website.
- Discover the subdomains associated with a website.
- Discover unpublished directories and files connected with a specific website.
- Discover which websites are housed on the same server as the target website.
- Exploit file upload vulnerabilities to acquire control of the target website.
- Identify, exploit, and resolve code execution vulnerabilities.
- Identify, exploit, and resolve local file inclusion vulnerabilities.
- Find, exploit, and patch SQL injection vulnerabilities.
- Bypass login forms and login as admin using SQL injections.
- Exploit SQL injections to find databases, tables & sensitive data such as usernames, passwords...etc
- Read / Write files to the server using SQL injections.
- Learn the right way to write SQL queries to prevent SQL injections.
- Discover reflected XSS vulnerabilities.
- Discover Stored XSS vulnerabilities.
- Hook victims to BeEF using XSS vulnerabilities.
- Fix XSS vulnerabilities & protect yourself from them as a user.
- Discover MITM & ARP Spoofing attacks.
Syllabus:
- Setting up a Hacking Lab
- Linux Basics
- Network Hacking
- Network Hacking - Pre Connection Attacks
- Network Hacking - Gaining Access - WEP Cracking
- Network Hacking - Gaining Access - WPA / WPA2 Cracking
- Network Hacking - Gaining Access - Security
- Network Hacking - Post Connection Attacks
- Network Hacking - Post-Connection Attacks - Information Gathering
- Network Hacking - Post Connection Attacks - MITM Attacks
- Network Hacking - Detection & Security
- Gaining Access To Computers
- Gaining Access - Server Side Attacks
- Gaining Access - Client Side Attacks
- Gaining Access - Client Side Attacks - Social Engineering
- Gaining Access - Hacking Outside The Local Network
- Post Exploitation
- Website Hacking
- Website Hacking - Information Gathering
- Website Hacking - File Upload, Code Execution & File Inclusion Vulns
- Website Hacking - SQL Injection Vulnerabilities
- Website Hacking - Cross Site Scripting (XSS) Vulnerabilities
- Website Hacking - Discovering Vulnerabilities Automatically