• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

The Complete Ethical Hacking Bootcamp: Beginner To Advanced

The Complete Ethical Hacking Bootcamp: Beginner To Advanced

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 27 hours 12 minutes

  • All levels

Description

This video course takes you through the basic and advanced concepts of penetration testing. From setting up your own virtual lab to developing brute force attacking tools using Python, you'll learn it all with the help of engaging activities.

Are you looking to pursue a career in cybersecurity and want to master the art of penetration testing? You've come to the right place. With this carefully tailored and structured video course, you'll grasp the basic and advanced topics of penetration testing with ease. The course starts by taking you through the process of setting up a penetration testing lab. Next, you'll become familiar with the Linux OS and Linux commands and explore the basic concepts of TCP/IP and the OSI model. Moving along, you'll learn how to gather information about computer systems and networks passively and actively and use the Metasploit tool to perform privilege escalation. Next, you'll perform web application pen testing and learn modern techniques to exploit common web application vulnerabilities such as SQL injection, XSS, CSRF, and command injection. You'll also learn how to perform wireless network pen testing to crack Wi-Fi passwords using Aircrack-ng, capturing packets, traffic sniffing, and Hashcat. Towards the end, you'll grasp the fundamentals of Python programming and develop offensive Python tools for pen testing and automation. By the end of this course, you'll have developed all the essentials skills needed for ethical hacking and penetration testing.

What You Will Learn

Set up your own virtual hacking lab with a VirtualBox
Use Nmap to perform network scanning and mapping
Become familiar with footprinting and port scanning
Exploit web applications with BurpSuite
Perform SQL injection on vulnerable web apps
Develop a brute force attacker tool in Python

Audience

If you are looking to get started in the field of cybersecurity and penetration testing, this course is for you. System administrators who want to secure their systems and networks will also find this course useful. A basic understanding of Linux and TCP/IP is needed to get started with this course.

Approach

With the help of interesting activities, this video course will help you become an expert in ethical hacking and penetration testing.

Key Features

Become familiar with the concepts of networking, ethical hacking, and penetration testing * Gain a good understanding of the Linux OS and Linux commands * Learn how to write flawless penetration testing scripts in Python

About the Author
HackerSploit Academy

HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, data breaches, malware, and ransomware. They believe in achieving this by providing essential training in the protection of systems, and by providing industry-standard defense solutions protecting web applications to enterprise networks. They also offer individual and corporate training packages in Infosec, penetration testing and Red Team Operations, web application security, and cybersecurity awareness. So far, they have trained over 500,000 students in ethical hacking, penetration testing, and Linux system administration.

Course Outline

1. Introduction

1. Introduction to the Course

This video gives you an introduction to the course.

2. Setting Up a Pentesting Lab

1. Installing VirtualBox

This video shows you how to install VirtualBox.

2. Installing Kali Linux

In this video, you'll learn to install Kali Linux.

3. Installing VirtualBox Guest Additions

This video shows you how to install VirtualBox guest additions.

4. Creating a Bootable Kali USB Flash Drive

In this video, you'll learn how to create a bootable Kali USB flash drive.

5. Important Things to do After Installing Kali Linux

In this video, you'll see a few steps that you need to keep in mind after installing Kali Linux.

3. Linux Essentials for Hackers

1. Basic Commands 1

This video is part of a 3-part series that teaches you the basic commands in Kali Linux.

2. Basic Commands 2

This is the 2nd video in the series.

3. Basic Commands 3

This is the 3rd video that teaches you the basic commands in Kali Linux.

4. Networking Tools and Essential Terminology

1. Networking Terminology

In this video, you'll learn the basic terminology used in networking.

2. Changing Our IP and Setting Up Your Wireless Adapter

In this video, you'll learn to change your IP address and set up your wireless adapter.

3. Hacking Terminology

This video teaches you the terminology used in hacking.

5. Passive Information Gathering and Footprinting

1. Google Hacking

This video shows you how to perform simple hacking with Google.

2. Whois Information Gathering

In this video, you'll learn about a footprinting tool called 'whois'.

3. Email Harvesting

In this video, you'll learn to gather information using the email harvesting tool called 'harvester'.

4. Information Gathering with Shodan

This video shows you how to gather information using a tool called Shodan.

5. DNS Zone Transfers with Dig

In this video, you'll learn to perform DNS zone transfers and how to use 'dig'.

6. Active Information Gathering and Port Scanning

1. installing Metasploitable

In this video, you'll learn what Metasploitable is and how to install it.

2. Nmap - 1

This video is part of a 3-part video series where you'll learn about network mapping.

3. Nmap - 2

In this video, you'll continue to learn about Nmap.

4. Nmap - 3

This is the last video on Nmap.

5. Scanning with Zenmap

In this video, you'll learn how to perform scanning using zenmap.

6. TCP Scans

In this video, you'll learn the importance of TCP scans and how to do it.

7. Bypassing Firewalls with Nmap

In this video, you'll learn another use of Nmap - to bypass firewalls.

8. Using Nmap Scripts - 1

In this video, you'll learn to use Nmap scripts for information gathering.

9. Using Nmap Scripts - 2

In this video, you'll continue to learn about Nmap scripts.

7. Web Application Penetration Testing

1. Installing Open Web Application Security Project (OWASP)

In this video, you'll get an intro to OWASP and how to install it.

2. HTTP Requests

This video shows you how to perform pen testing using http requests.

3. HTTP Responses

This video shows you how to perform pen testing using http responses.

4. Configuring BurpSuite

In this video, you'll get an introduction to BurpSuite and how to configure it.

5. Modifying Packets in BurpSuite

In this video, you'll learn to modify packets in BurpSuite.

6. Whatweb and Dirb

In this video, you'll learn the uses of Whatweb and Dirb tools in ethical hacking.

7. Password Recovery Attacks

This video shows you the attacks you can perform when recovering passwords.

8. Brute Force Attacks with BurpSuite

In this video, you'll learn to perform brute force attacks with the BurpSuite tool.

9. Brute Force Attacks with Hydra

In this video, you'll learn to perform brute force attacks with the Hydra tool.

10. Session Fixation

This video shows you what session fixation is with an example.

11. Injection Attacks

This video shows you how to perform injection attacks.

12. Command Injection

In this video, you'll learn about command injection in ethical hacking.

13. Exploiting Command Injection

In this video, you'll learn to exploit command injection, which you learnt in the previous video.

14. Finding Blind Command Injection

In this video, you'll learn about blind command injection and how to find it.

15. SQL Basics

In this video, you'll learn the basics of SQL needed for SQL injection.

16. Manual SQL Injection - 1

This video shows you how to perform SQL injection manually.

17. Manual SQL Injection - 2

In this video, you'll continue to learn about SQL injection.

18. SQLmap Basics

In this video, you'll learn the basics of SQLmap.

19. XML Injection

In this video, you'll learn about XML injection to manipulate or compromise the logic of an XML application or service.

20. Installing Extreme Cloud Administration Toolkit (xCAT) and Preventing Injection Attacks

In this video, you'll learn how to install xCAT and how to prevent injection attacks.

21. Reflected Cross-Site Scripting (XSS)

In this video, you'll learn what reflected XSS is and how to use it.

22. Stored XSS

In this video, you'll learn how to use stored XSS (persistent XSS) for your web applications.

23. Modifying HTML Code with XSS

In this video, you'll learn to modify your HTML code with XSS.

24. XSSer and XSSsniper

In this video, you'll learn how to use 2 more pen testing tools: XSSer and XSSsniper.

8. Wireless Penetration Testing

1. Wireless Attacks Fundamentals

In this video, you'll learn the fundamentals of wireless attacks and how they're done.

2. Enabling Monitor Mode

This video shows you how to use monitor mode in Kali Linux.

3. Capturing Handshakes with Airodump-ng

In this video, you'll get an introduction to Airodump-ng and its uses.

4. Rockou.txt Wordlist

In this video, you'll get an introduction to the Rockou.txt Wordlist and how to use it.

5. Cracking Passwords with Aircrack-ng

In this video, you'll learn about the tools in the Aircrack-ng and how to crack passwords using it.

6. Cracking Passwords with Hashcat

In this video, you'll learn how to crack passwords using Hashcat.

7. Making Password Lists with Crunch

In this video, you'll learn about Crunch and how to create password lists using Crunch.

8. Making Password Lists with Cupp

In this video, you'll learn about Cupp and how to make password lists using this tool.

9. Rainbow Tables - 1

In this video, you'll learn to use rainbow tables to derive passwords.

10. Rainbow Tables - 2

In this video, you'll continue to use rainbow tables to derive passwords.

11. Installing Fluxion

This video introduces you to a new pen testing tool called fluxion and how to install it.

12. Finding and Cracking Hidden Networks

This video shows you how to find and crack hidden networks using fluxion.

13. Preventing Wireless Attacks

In this video, you'll learn how to prevent the most common wireless attacks.

9. System Hacking and Exploitation

1. The Metasploit Console

This video introduces you to the Metasploit console.

2. Metasploit Modules Explained

In this video, you'll get an introduction to the Metasploit modules.

3. Brute Forcing SSH with Metasploit

This video shows you how to use Metasploit to perform brute force SSH.

4. Exploiting Apache Tomcat with Metasploit

In this video, you'll learn how to use Apache Tomcat with Metasploit.

5. Getting a Meterpreter Session with Command Injection

In this video, you'll learn what a Meterpreter session is and how to use it with command injection.

6. PHP Code Injection

This video shows you how to use PHP code to perform system hacking.

7. Exploiting Metasploitable2

In this video, you'll learn to use Metasploitable2.

8. Wine Installation

In this video, you'll get an introduction to wine and you'll learn how to install it.

9. Crafting Windows Payloads with Msfvenom

This video teaches you about Msfvenom and how to craft Windows payloads using it.

10. Encoders and Hexeditor

In this video, you'll learn about two new tools called Encoders and Hexeditor.

11. Windows 10 Meterpreter Session

In this video, you'll learn to run Meterpreter in Windows 10.

12. Meterpreter Environment

This video teaches you to work with the Meterpreter environment.

13. Windows 10 Privilege Escalation

In this video, you'll learn about privilege escalation with Windows 10.

14. Preventing Privilege Escalation

In this video, you'll learn how to prevent privilege escalation.

15. Post Exploitation Modules

This video introduces you to exploitation modules.

16. Getting a Meterpreter Session Over the Internet with Port Forwarding

In this video, you'll learn to use port forwarding to get a Meterpreter session.

17. EternalBlue Exploit

This video introduces you to a cyberattack exploit, EternalBlue.

18. Persistence Module

In this video, you'll learn about the persistence module and how to use it.

19. Hacking Over the Internet with Ngrok

This video teaches you to perform hacking over the Internet with Ngrok.

20. Creating Android Payloads with Msfvenom

In this video, you'll learn to create Android payloads with Msfyenom.

21. The Real Hacking Begins Now!

Using everything you've learned, this video begins with the hacking process.

10. MITM Attacks (Man in the Middle)

1. ARP Protocol Basics

This video shows you the basics of the ARP protocol.

2. MITM Attacks Explained

This video shows you all the attacks that can be performed using MITM.

3. Installing MITMf

This video gives you an overview of MITMf and how to install it.

4. Manual Arp Spoofing

In this video, you'll learn the art of manual spoofing.

5. Problems while Installing MITMf

This video highlights the problems while installing MITMf.

6. HTTP Traffic Sniffing

This video teaches you the process of HTTP traffic sniffing.

7. DNS Spoofing and HTTPS Password Sniffing

In this video, you'll learn about DNS spoofing and HTTPS password sniffing.

8. Hooking Browsers with BEEF

In this video, you'll learn to how to hook browsers.

9. Taking a Screenshot of the Target's Browser

This video teaches you to take a screenshot of the target system's browser.

10. Cloning Any Webpage

In this video, you'll learn to clone any webpage.

11. Man In The Middle Attack - Ettercap Basics

In this video, you'll learn the basics of the man in the middle attack.

11. Python Basics

1. Variables

This video gives you an introduction to variables in Python.

2. Raw Input

In this video you'll learn how to work with raw input in Python.

3. If Else Statement

This video teaches you about the if-else statement in Python.

4. For Loop

This video teaches you about the for loop in Python.

5. While Loop

In this video, you'll learn about the while loop in Python.

6. Python Lists

This video teaches you about lists in Python.

7. Functions

In this video, you'll learn about functions in Python.

8. Classes

This video teaches you about classes in Python.

9. Importing Libraries

In this video, you'll learn how to import libraries in Python.

10. Files in Python

This video shows you the file types in Python.

11. Try and Except Rule

In this video, you'll learn about the try and except rule in Python.

12. Developing an Advanced Backdoor

1. The Theory Behind Reverse Shell

This video discusses the theory behind the reverse shell session.

2. Simple Server Code

In this video, you'll learn the simple server code in reverse shell.

3. Connection with Reverse Shell

In this video, you'll learn how to connect with reverse shell.

4. Sending and Receiving Messages

In this video, you'll learn how to send and receive messages in reverse shell.

5. Sending Messages Using the While Loop

In this video, you'll learn to send messages using the while loop.

6. Executing Commands on the Target System

In this video, you'll learn to execute commands on the target system.

7. Fixing Backdoor Bugs and Adding Functions

In this video, you'll learn to fix backdoor bugs and add functions.

8. Installing Pyinstaller

This video gives you an introduction to Pyinstaller and how to install it.

9. First Performance Test of Your Backdoor

In this video, you'll do a first test of your backdoor.

10. Trying to Connect Every 20 Seconds

This video shows you what to do to establish a connection to your backdoor.

11. Creating Persistence Part 1

This video introduces you to persistence and how to create it.

12. Creating Persistence Part 2

In this video, you'll continue to learn about persistence.

13. Changing Directory

In this video, you'll learn to change directories.

14. Uploading and Downloading Files

In this video, you'll learn to upload and download files.

15. Downloading Files from the Internet

This video teaches you how to securely download files from the Internet.

16. Starting Programs from Our Backdoor

In this video, you'll learn to start programs from our backdoor.

17. Capturing Screenshot on Target PC

In this video, you'll learn how to capture screenshots on the target PC.

18. Embedding Backdoor in Image Part 1

In this video, you'll learn how to embed backdoor techniques in an image.

19. Embedding Backdoor in Image Part 2

In this video, you'll continue to embed backdoor in your image.

20. Checking for Administrator Privileges

In this video, you'll learn how to check for administrator privileges in the target application.

21. Adding Help Option

This video teaches you to add a help option.

13. Developing a Keylogger

1. Importing Pynput

In this video, you'll learn to import the Pynput library.

2. Simple Keylogger

This video teaches you to work with a simple keylogger.

3. Adding Report Function

In this video, you'll add a report function.

4. Writing Keystrokes to a File

This video teaches you to write keystrokes to a file.

5. Adding Keylogger to Your Reverse Shell Part 1

This video teaches you another use of the keylogger by adding it to your reverse shell.

6. Adding Keylogger to Your Reverse Shell Part 2

In this video, you'll continue to add keylogger to your reverse shell.

7. Final Project Test

In this video, you'll test your final project.

14. Developing a Brute Force Attacker

1. Printing Banner

In this video, you'll learn what a banner is and how to print it.

2. Adding Available Options

In this video, you'll learn to add available options to your attack.

3. Starting Threads for Brute Force

This video teaches you to start threads for your brute force attack.

4. Making Function to Run the Attack

In this video, you'll learn to make functions to run your brute force attack.

5. Brute Forcing Router Login

In this video, you'll learn to add a router login to your attack.

6. Bypassing Antivirus with All Your Future Programs

In this video, you'll learn how to bypass the antivirus with all your future programs.

7. Sending Malware with Spoofed Email

This video teaches you to send malware with spoofed emails.

Course Content

  1. The Complete Ethical Hacking Bootcamp: Beginner To Advanced

About The Provider

Packt
Packt
Birmingham
Founded in 2004 in Birmingham, UK, Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and i...
Read more about Packt

Tags

Reviews