Learn ethical hacking:Become a Pro ethical hacker that can hack computer systems like black hat hackers.
What you'll learn
95+ ethical hacking &security video lectures.
Start from 0 to become pro hacker.
Learn ethical hacking & the different types of hackers.
Learn to install a hacking lab & needed softwares.
Learn kali linux commands and basics of using terminal.
Basic to adnvance Ethical hacking.
Hack and secure server and client operating system.
Create undetecable backdoors.
Learn to secure and protect any network from hackers and loss of data.
step by step instructions for instalation of virtual boc and creating your virtual environment.
Learn basics of website and its technology.
what is websitre and its components.
Gathering information about website like black hat hackers do.
learn to crack wifi password of any security level WEP,WPA,WPA2.
World class tools for gatting best results.
All the attacks are performed live.
Requirements
Internet Connection & Computer (minimum 4gb RAM or more).
Basic computer skill.
Wireless networking card.
Description
Welcome to Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:ZThis Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals.Ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.The course is divided into four main sections so let's see what we are going to learn:Network Penetration TestingNetwork penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.Gaining accessGaining access attack is the second part of the network penetration testing. In this section, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn't use encryption, we can just connect to it and sniff out unencrypted data. If a network is wired, we can use a cable and connect to it, perhaps through changing our MAC address. The only problem is when the target use encryption like WEP, WPA, WPA2. If we do encounter encrypted data, we need to know the key to decrypt it, that's the main purpose of this section.Post-Connection AttacksAll the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section.Website / Web Application Hacking In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the dangerous vulnerabilities to hack into websites.Who this course is for:Anyone interested in learning ethical hackingAnyone interested in how hackers hack computer systemsAnyone interested in how to secure systems from hackersNotes:This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.
Overview
Section 1: Introduction
Lecture 1 Ethical Hacking
Lecture 2 Hacking Field
Lecture 3 Hackers World
Section 2: Hacking Lab Setup
Lecture 4 Virtual Box- Virtual environment
Lecture 5 Hacker's OS- Kali Linux
Lecture 6 Vulnerable Machine- Metasploitable 2
Lecture 7 Broken WEB: OWASP BWA
Lecture 8 Getting Kali linux
Lecture 9 Getting Metasploitable 2
Lecture 10 Getting OWASP BWA
Section 3: Kali Linux Basics
Lecture 11 Introduction
Lecture 12 Overview
Lecture 13 Linux Terminal
Lecture 14 Linux Basics 1
Lecture 15 Linux Basics 2
Lecture 16 Linux Basics 3
Lecture 17 Linux Basics 4
Section 4: Network Penetration Testing
Lecture 18 Introduction
Lecture 19 Network Basics
Lecture 20 Wireless Communication
Lecture 21 Wireless standards
Lecture 22 Frequency spectrum
Lecture 23 Adapter modes
Lecture 24 Mapping adpater
Section 5: Pre-connection attack
Lecture 25 Overview
Lecture 26 Monitor Mode
Lecture 27 Airodump-ng
Lecture 28 Sniffing Network
Lecture 29 Deauthentication attack
Section 6: Gaining access
Lecture 30 Overview
Lecture 31 WEP- Wired Equivalent Privacy
Lecture 32 WEP Cracking
Lecture 33 Fake authentication attack
Lecture 34 ARP request replay attack
Lecture 35 Wifi Protected Access-WPA
Lecture 36 Handshake
Lecture 37 Capturing Handshake
Lecture 38 Creating wordlist
Lecture 39 Cracking key
Section 7: Post-connection attack
Lecture 40 Post-connection attack
Lecture 41 Netdiscovery
Lecture 42 Zenmap
Section 8: Computer Hacking
Lecture 43 Computer hacking
Section 9: Server-side attack
Lecture 44 Server-side attack basics
Lecture 45 Server side vulnerability
Lecture 46 Attacking Metasploitable 2
Lecture 47 Advance server hacking
Section 10: System Hacking- Client-side attack
Lecture 48 Introduction
Lecture 49 Veil Evasion
Lecture 50 Installation
Lecture 51 Overview
Lecture 52 Generating backdoor
Lecture 53 Listening to connection
Lecture 54 Sending Backdoor
Section 11: Web Application technologies
Lecture 55 HTTP Protocol
Lecture 56 HTTP request
Lecture 57 HTTP response
Lecture 58 HTTP methods
Lecture 59 URL
Lecture 60 HTTP header
Lecture 61 General header
Lecture 62 Request header
Lecture 63 Response header
Lecture 64 Cookies
Lecture 65 Status code
Section 12: Web Application Information Gathering
Lecture 66 Information gathering
Lecture 67 Whois
Lecture 68 NSLookup
Lecture 69 Netcraft
Lecture 70 Dmitry
Lecture 71 Reverse DNS Lookup
Lecture 72 ROBtex
Lecture 73 Subdomain
Section 13: BruteForce attack
Lecture 74 Brute forcing
Lecture 75 Attacking
Section 14: Cross-site scripting
Lecture 76 XSS
Lecture 77 Reflected XSS
Lecture 78 Basic attack
Lecture 79 Advance attack
Lecture 80 Stored based xss
Lecture 81 Basic attack
Lecture 82 advance attack
Section 15: File Upload Vulnerability
Lecture 83 FUV- Introduction
Lecture 84 Attacking FUV
Lecture 85 Advance attacking FUV
Section 16: Structured query language-SQLi
Lecture 86 SQL injection
Lecture 87 SQL Basics 1
Lecture 88 SQL Basics 2
Lecture 89 SQL Basics 3
Lecture 90 SQL Basics 4
Lecture 91 SQL Basics 5
Lecture 92 SQL Basics 6
Lecture 93 SQL mannual
Lecture 94 Union Based SQLi
Lecture 95 Attacking
What you'll learn
95+ ethical hacking &security video lectures.
Start from 0 to become pro hacker.
Learn ethical hacking & the different types of hackers.
Learn to install a hacking lab & needed softwares.
Learn kali linux commands and basics of using terminal.
Basic to adnvance Ethical hacking.
Hack and secure server and client operating system.
Create undetecable backdoors.
Learn to secure and protect any network from hackers and loss of data.
step by step instructions for instalation of virtual boc and creating your virtual environment.
Learn basics of website and its technology.
what is websitre and its components.
Gathering information about website like black hat hackers do.
learn to crack wifi password of any security level WEP,WPA,WPA2.
World class tools for gatting best results.
All the attacks are performed live.
Requirements
Internet Connection & Computer (minimum 4gb RAM or more).
Basic computer skill.
Wireless networking card.
Description
Welcome to Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:ZThis Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals.Ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.The course is divided into four main sections so let's see what we are going to learn:Network Penetration TestingNetwork penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.Gaining accessGaining access attack is the second part of the network penetration testing. In this section, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn't use encryption, we can just connect to it and sniff out unencrypted data. If a network is wired, we can use a cable and connect to it, perhaps through changing our MAC address. The only problem is when the target use encryption like WEP, WPA, WPA2. If we do encounter encrypted data, we need to know the key to decrypt it, that's the main purpose of this section.Post-Connection AttacksAll the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section.Website / Web Application Hacking In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the dangerous vulnerabilities to hack into websites.Who this course is for:Anyone interested in learning ethical hackingAnyone interested in how hackers hack computer systemsAnyone interested in how to secure systems from hackersNotes:This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.
Overview
Section 1: Introduction
Lecture 1 Ethical Hacking
Lecture 2 Hacking Field
Lecture 3 Hackers World
Section 2: Hacking Lab Setup
Lecture 4 Virtual Box- Virtual environment
Lecture 5 Hacker's OS- Kali Linux
Lecture 6 Vulnerable Machine- Metasploitable 2
Lecture 7 Broken WEB: OWASP BWA
Lecture 8 Getting Kali linux
Lecture 9 Getting Metasploitable 2
Lecture 10 Getting OWASP BWA
Section 3: Kali Linux Basics
Lecture 11 Introduction
Lecture 12 Overview
Lecture 13 Linux Terminal
Lecture 14 Linux Basics 1
Lecture 15 Linux Basics 2
Lecture 16 Linux Basics 3
Lecture 17 Linux Basics 4
Section 4: Network Penetration Testing
Lecture 18 Introduction
Lecture 19 Network Basics
Lecture 20 Wireless Communication
Lecture 21 Wireless standards
Lecture 22 Frequency spectrum
Lecture 23 Adapter modes
Lecture 24 Mapping adpater
Section 5: Pre-connection attack
Lecture 25 Overview
Lecture 26 Monitor Mode
Lecture 27 Airodump-ng
Lecture 28 Sniffing Network
Lecture 29 Deauthentication attack
Section 6: Gaining access
Lecture 30 Overview
Lecture 31 WEP- Wired Equivalent Privacy
Lecture 32 WEP Cracking
Lecture 33 Fake authentication attack
Lecture 34 ARP request replay attack
Lecture 35 Wifi Protected Access-WPA
Lecture 36 Handshake
Lecture 37 Capturing Handshake
Lecture 38 Creating wordlist
Lecture 39 Cracking key
Section 7: Post-connection attack
Lecture 40 Post-connection attack
Lecture 41 Netdiscovery
Lecture 42 Zenmap
Section 8: Computer Hacking
Lecture 43 Computer hacking
Section 9: Server-side attack
Lecture 44 Server-side attack basics
Lecture 45 Server side vulnerability
Lecture 46 Attacking Metasploitable 2
Lecture 47 Advance server hacking
Section 10: System Hacking- Client-side attack
Lecture 48 Introduction
Lecture 49 Veil Evasion
Lecture 50 Installation
Lecture 51 Overview
Lecture 52 Generating backdoor
Lecture 53 Listening to connection
Lecture 54 Sending Backdoor
Section 11: Web Application technologies
Lecture 55 HTTP Protocol
Lecture 56 HTTP request
Lecture 57 HTTP response
Lecture 58 HTTP methods
Lecture 59 URL
Lecture 60 HTTP header
Lecture 61 General header
Lecture 62 Request header
Lecture 63 Response header
Lecture 64 Cookies
Lecture 65 Status code
Section 12: Web Application Information Gathering
Lecture 66 Information gathering
Lecture 67 Whois
Lecture 68 NSLookup
Lecture 69 Netcraft
Lecture 70 Dmitry
Lecture 71 Reverse DNS Lookup
Lecture 72 ROBtex
Lecture 73 Subdomain
Section 13: BruteForce attack
Lecture 74 Brute forcing
Lecture 75 Attacking
Section 14: Cross-site scripting
Lecture 76 XSS
Lecture 77 Reflected XSS
Lecture 78 Basic attack
Lecture 79 Advance attack
Lecture 80 Stored based xss
Lecture 81 Basic attack
Lecture 82 advance attack
Section 15: File Upload Vulnerability
Lecture 83 FUV- Introduction
Lecture 84 Attacking FUV
Lecture 85 Advance attacking FUV
Section 16: Structured query language-SQLi
Lecture 86 SQL injection
Lecture 87 SQL Basics 1
Lecture 88 SQL Basics 2
Lecture 89 SQL Basics 3
Lecture 90 SQL Basics 4
Lecture 91 SQL Basics 5
Lecture 92 SQL Basics 6
Lecture 93 SQL mannual
Lecture 94 Union Based SQLi
Lecture 95 Attacking