40% OFF HACKING COURSES

Advanced Ethical Hacking Level 2

Instructor
Raj Kishore Panda
Last Update January 16, 2024
4.38 /5
(8)
0 already enrolled

About This Course

Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!

This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites .....etc. We'll never have any boring dry theoretical lectures.

The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses to hack this system.

By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks. 

Curriculum

14 Lessons 1 Month
Course Introduction & Overview
What Is Hacking & Why Learn It ?
Gaining Access Introduction
Gaining Access - Server Side Attacks
Installing Metasploitable As a Virtual Machine
Introduction to Server-Side Attacks
Basic Information Gathering & Exploitation
Hacking a Remote Server Using a Basic Metasploit Exploit
Exploiting a Code Execution Vulnerability to Hack Remote Server
Nexpose - Installing Nexpose
Nexpose - Scanning a Target Server For Vulnerabilities
Nexpose - Analysing Scan Results & Generating Reports
Server-Side Attacks Conclusion
Introduction to Client-Side Attacks
Installing Veil Framework
Veil Overview & Payloads Basics
Generating An Undetectable Backdoor
Listening For Incoming Connections
Hacking Windows 10
Hacking Windows 10 Using Fake Update
Backdooring Downloads on The Fly to Hack Windows 10
How to Protect Yourself From The Discussed Delivery Methods
Introduction to Social Engineering
Maltego Basics
Discovering Websites, Links & Social Accounts Associated With Target
Discovering Twitter Friends & Associated Accounts
Discovering Emails Of The Target's Friends
Analysing The Gathered Info & Building An Attack Strategy
Intro to Trojans - Backdooring Any File Type (images, PDF's, etc.)
Compiling & Changing Trojan's Icon
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc)
Spoofing Emails - Setting Up an SMTP Server
Email Spoofing - Sending Emails as Any Email Account
Email Spoofing - Spoofing Sender Name
Email Spoofing - Method 2
BeEF Overview & Basic Hook Method
BeEF - Hooking Targets Using Bettercap
BeEF - Running Basic Commands On Target
BeEF - Stealing Passwords Using A Fake Login Prompt
BeEF - Hacking Windows 10 Using a Fake Update Prompt
Detecting Trojans Manually
Detecting Trojans Using a Sandbox
Overview of the Setup
Ex1 - Generating a Backdoor That Works Outside The Network
Configuring The Router To Forward Connections To Kali
Ex2 - Using BeEF Outside The Network
Introduction to Post Exploitation
Meterpreter Basics
Accessing the System Commands
Maintaining Access (Persistence)
Spying - Capturing Key Strikes & Taking Screenshots
Pivoting - Theory (What is Pivoting?)
Pivoting - Using a Hacked System to Hack Into Other Systems
Introduction - What Is A Website ?
How To Hack a Website?
Gathering Basic Information Using Whois Lookup
Discovering Technologies Used On The Website
Gathering Comprehensive DNS Information
Discovering Websites On The Same Server
Discovering Subdomains
Discovering Sensitive Files
Analysing Discovered Files
Discovering & Exploiting File Upload Vulnerabilities To Hack Websites
Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites
Discovering & Exploiting Local File Inclusion Vulnerabilities
Remote File Inclusion Vulnerabilities - Configuring PHP Settings
Remote File Inclusion Vulnerabilities - Discovery & Exploitation
Preventing The Above Vulnerabilities
What is SQL?
Dangers of SQL Injection Vulnerabilities
Discovering SQL injections In POST
Bypassing Login Pages Using SQL Injection
Discovering SQL Injections in GET
Reading Database Information
Discovering Database Tables
Extracting Sensitive Data From The Database (Such As Passwords, User info...etc)
Reading & Writing Files On The Server Using SQL Injection Vulnerability
Discovering SQL Injections & Extracting Data Using SQLmap
The Right Way To Prevent SQL Injection Vulnerabilities
Introduction to Cross Site Scripting?
Discovering Reflected XSS
Discovering Stored XSS
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
Preventing XSS Vulnerabilities
Automatically Scanning Target Website For Vulnerabilities
Analysing Scan Results
Website Hacking / Penetration Testing Conclusion
Writing a Pentest Report
4 Ways to Secure Websites & Apps
Bonus Lecture - Discounts

Your Instructors

instructor

Raj Kishore Panda

4.75 /5
8 Courses 4 Reviews 73 Students
See more

Student Feedback

Reviews (3)

Write a review

Live Chat Section