Advanced Ethical Hacking: Network & Web Application Penetration Testing - part I
Become a High-level PenTester in CyberSecurity. Network & Web application Penetration Testing (Hands-on Labs practice)
What you'll learn
- Labs Preparation (VirtualBox & Kali Linux installation & configuration)
- BurpSuite Professional (ranking between the 3 first best tools for PenTesting)
- Metasploit, Armitage
- Fix Armitage Error, and Enjoy the Metasploit User Interface
- Enumeration, Remote and Exploitation
- Structured Query Language (SQL Injection)
- Cross-site Scripting (XSS attack)
- Vulnerability Scanning
- Network Scanning, Nmap Scanning, Nikto, Dirb
- Reverse shells
- Buffer overflows
- Privilege escalation
- Network Hacking
- Wireless Hacking
- Take Control Of Any Wi-Fi Network ESSID whether it is well-passworded or not
- WEP/WPA/WPA2 Hole/pitfall
- Interrupt the Connection of a Client's ip-address whether using WEP/WPA/WPA2 Protocols
- Get the Handshake of WPA/WPA2 Protocols of a Wi-Fi ESSID
- Crack Wireless WEP/WPA/WPA2 ESSID
- Eavesdrop the Communication & The Reason Behind The Scene
- Stealth Idle Scan
- Bypass Antivirus in Windows Machine
- Bypass Any Windows Login Password & Get Access To The System Administrator
- Bypass Ubuntu Login Password & Get Access To The System Administrator
- Bypass MacOs Login Password & Get Access To The System Administrator
- Strengthen The Login Account Security Of Your Computer thrice Before Getting Access To The Admin's Screen.
- Essentials of CEH v10 in real-life (CEH - Certified Ethical Hacker)
- Information Security
- ElGamal, RSA, Diffie-Hellman (Encryption and Decription steps)
- Router Hacking
- Mobile Phones Hacking
Course Curriculum
Available in
days
days
after you enroll
- Introduction (0:14)
- Virtualbox (Installation & Configuration) (9:46)
- Kali Linux (Installation & Configuration) (11:29)
- The concept of Enumeration (5:00)
- NetBios Enumeration (22:16)
- Simple Mail Transfer Protocol - SMTP Enumeration (20:06)
- Simple Network Management Protocol - SNMP Enumeration (18:13)
- Lightweight Directory Access Protocol - LDAP Enumeration (21:39)
Available in
days
days
after you enroll
- Some Vulnerable Labs (VM) to Download for this Course (2:20)
- BrainPan VM Enumeration and Exploitation (56:01)
- Turnkey VM Enumeration and Exploitation (24:21)
- DerpnStink VM Enumeration and Exploitation (32:33)
- ApacheStruts Enumeration and Exploitation (15:32)
- SkyTower VM Enumeration and Exploitation (19:15)
- Sick_OS Enumeration and Exploitation (26:34)
- PwnLab VM Enumeration and Exploitation (63:28)
- GoldenEye VM Enumeration and Exploitation (35:52)
- Lampiao Enumeration and Exploitation (17:33)
- Stapler Enumeration and Exploitation (27:12)
- Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A User's PC (36:43)
- ShellShock Enumeration and Exploitation (Common Vulnerabilities & Exposures-CVE) (24:16)
- WordPress Enumeration and Exploitation (7:51)
- IMF (Impossible Mission Force) VM Enumeration and Exploitation (48:22)
- Remote File Inclusion Attack (14:46)
- Last_but_not_least (1:18)