Black friday

Economize muito!

Todos os cursos por menos de US $ 5 - por tempo limitado!
assistindo agora
87 Alunos
103 Lições
Iniciante

O que você vai aprender?

  • Exploit the Web for Your Own Personal Needs
  • The Usage of Terminal
  • Creating an Inflicted USB
  • How to Utilize Social Engineering
  • How to Hack Hardware

Grade Curricular do Curso

13h 15m
Seção 1: Basic Theory ( Optional )
19:29
Process of Hacking
07:12
Types of Penetration Testing
04:28
Seção 2: Setting up the Operating System
09:00
Setup Kali Linux
04:35
VirtualBox Guest Additions
04:25
Seção 3: Learn to use the Terminal
58:21
Navigation Commands
13:25
File Operations Part 1
11:27
File Operations Part 2
14:15
Permission and Ownership
19:14
Seção 4: Web Hacking Lab
32:59
Setup DVWA on Localhost
05:51
Configure Database and User
13:32
Fixing Issues Part 1
09:26
Fixing Issues Part 2
04:10
Seção 5: Pre-Requisite Tool - BurpSuite
17:42
Burp Installation
03:18
Scanner, Intruder and Repeater
05:02
Target, Proxy and Spider
05:25
Wrapping up BurpSuite
03:57
Seção 6: Web Hacking on Low Security
1:39:08
CSRF on Low Security
09:15
XSS Reflected on Low Security
04:39
XSS Stored on Low Security
12:09
XSS DOM on Low Security
02:34
Cookie Stealing with XSS
18:10
File Upload on Low
04:28
Creating a Backdoor
11:46
File Inclusion on Low Security
05:09
Command Injection on Low Security
05:41
Brute Forcing on Low Security
08:10
SQL Injection on Low and Medium
17:07
Seção 7: Web Hacking on Medium Security
28:11
CSRF on Medium Security
08:06
XSS Reflected on Medium Security
01:56
XSS Stored on Medium Security
05:28
XSS DOM on Medium Security
02:20
File Upload on Medium Security
05:00
Command Injection on Medium Secirity
05:21
Seção 8: Get Deep in Web Hacking
44:29
File Upload on High Security
07:59
Introduction to Weevely
08:07
XSS Reflected on High Security
05:05
XSS Stored on High Security
04:55
SQL Injection Manual Method
14:15
SQL Injection Hash Decoding
04:08
Seção 9: Anonymity and Deception
1:43:07
Change your Mac Address
12:43
Introduction to AirVPN
07:13
Watch for DNS Leaks
04:30
FAKE ID (LIVE DEMO)
02:55
Using a Virtual Private Network
05:55
VPN to TOR Circuit
02:34
TOR to VPN Circuit
06:51
Using TOR ( The Onion Browsing )
10:17
Temporary Email Can Help!
02:39
Random Identity
04:08
Changing IP using Proxy
05:19
Port Forwarding over VPN
08:33
How to Spoof your Phone Call
09:34
How to create a FAKE ID
14:46
Making Temporary Debit Cards
05:10
Seção 10: Human is the Weakest link
41:37
Open Source Intelligence Data Gethering on People
17:04
SE Techniques 1
02:57
SE Techniques 2
04:39
SE Techniques 3
04:17
SE Techniques 4
05:59
SE Techniques 5
06:41
Seção 11: HID Bad Usb Attack
1:16:27
Getting Arudino
16:15
Arduino Basic Setup
08:05
Writing Ducky Scripts
16:23
Meterpreter Shell Through HID
17:53
Meterpreter Shell Demo
06:23
DigiSpark - A Compact Alternative
07:52
DigiSpark Continued
03:36
Seção 12: GoPhish Framework - The Most Advance Phishing Tool
1:32:24
Getting GoPhish
03:04
Starting GoPhish
02:43
GoPhish on a Server
13:33
Domain Name on GoPhish Server
09:28
SSL on GoPhish Server
09:14
SSL on GoPhish Server Continued
15:18
GoPhish Sending Profile
11:05
Launching out the Campaign
08:12
Sending E-Mails
08:05
Opening the Spoofed E-Mail
09:03
Analysing the Submitted Data
02:39
Seção 13: Information Gathering
1:00:52
Downloading the Source Code of the Website
05:27
Using Components with Known Vulnerabilities
05:38
Enemurating Subdomains
10:24
Looking for Some Archived Page for Information Gathering
05:16
Google Dorks live demo
05:33
Enemurating Directories
04:26
Information Gathering Using WhatWeb
03:31
Information Gathering Using TheHarvester
06:04
Different Type of Nmap Scan Theory
05:50
Different Type of Nmap Scan Demo
04:38
Banner Grabbing Using Nmap
04:05
Seção 14: Attack Like a Pro using MetaSploit
46:14
Setting Up the Database
04:29
Overview to Meterpreter
12:02
MetaSploit - MultiHandler
09:49
MetaSploit - MSFVenom
06:55
Metasploit - Encoders
12:59
Seção 15: The Venom
40:00
Introduction to venom
10:34
Setup Venom on your System
14:35
Venom Android Payload
07:02
Venom Windows Payload
07:49
Seção 16: Reporting to Clients
25:03
Reporting Part 1
09:31
Reporting Part 2
01:52
Reporting Part 3
08:39
Reporting Part 4
05:01

Descrição

Requisitos

  • The very Fundamental Basics of Terminal
  • Hardware Knowledge is Advised

Sobre o Instrutor

Comentários 92
Alunos 15,513
Audiência massiva
Cursos 4

Avaliações da plataforma BitDegree

Nossos alunos dizem Excelente
9.5 de 10
trustpilot logo 1 trustpilot logo