->
Udemy - Network Ethical Hacking for Beginners (Kali 2020, Hands-on)
Udemy - Network Ethical Hacking for Beginners (Kali 2020, Hands-on)

Welcome to the Network Ethical Hacking course!


Description

This course considers you have No prior knowledge in hacking or in Linux operating system, & by the end of it you'll be able to hack systems like great hackers and keep yourself secured like security experts!

This course is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Windows 10) as virtual machines then we will start the hacking adventure.

The course is divided into 5 sections, (Introduction, Pre-Attack Phase, Attack Phase, Post-Attack Phase, and How to Keep Yourself Protected).

In Summary, in this course YOU Will LEARNTHE FOLLOWING:

- How to prepare the penetration testing lab.

- How to get comfortable with Kali Linux by getting the important required commands.

- How to use Linux commands & how to interact with the command terminal.

- How to change your system MACaddress (Spoof) to stay anonymous.

- How to attack any close wireless network and get all details about it (including target network MAC address, SSID, Encryption Type, ...etc).

- How to get the MAC addresses for all clients connected to the target network without even knowing the password of the target router.

- How to Perform (word list) Attacks to get passwords.

- How to perform fake-authentication attack to target router without even knowing the password of the target network.

- How to perform De-Authentication attacks without even knowing the password of the target network.

- How to perform ARPattack without even knowing the password of the target network.

- How to hack wireless networks to step by step.

- How to get Wi-Fi passwords for WEP , WPA and WPA2.

- How to Sniff Data from the network you hacked.

- How to perform ARP spoofing attack to be the man in the middle MITM to intercept user names and passwords.

- How to know who is connected to the network you hacked.

- How to scan network for more details about connected devices.

- How to intercept network traffic.

- How to use many tools, tricks and techniques to hack networks.

-How to generate your own viruses.

- How to hide your virus in any other file extension (jpg, pdf, docx, xlsx..)

- How to gain access to remote computers.

- How to hack Mic, Camera, and Keyboard keys (Key Logger)..

- Many other cool stuff about network hacking.

- How to keep yourself protected from the above mentioned attacks.

*** You will get 3.5 hours of hacking and hacking techniques ***

*** You will start from 0 to reach a good level of understanding and practical use of Linux and hacking tools ***

Notes:

  • This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.

  • This course is totally a product of Mohammad Hamza Sheikh and no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.

Kind Regards

Hamza

Who this course is for:
  • Beginner Hackers
  • Anyone loves hacking
  • Ethical hackers
  • Security guys
  • Security engineers

Course content

  • Introduction
    • Introduction to Network Ethical Hacking for Beginners
  • Network Pre-Attack Phase
    • Kali Linux History
    • Kali Linux File Structure
    • Downloading and Installing VirtualBox
    • Downloading and Configuring Kali Linux to VirtualBox
    • Solving Importing Kali Linux to VirtualBox error
    • Getting Comfortable with Kali Linux Part 1
    • Getting Comfortable with Kali Linux Part 2
    • How Do Wi-Fi Networks Work?
  • Network Attack Phase
    • Discover Close Wi-Fi Networks and Solve Wi-Fi Adapter Issue
    • Another Way to Solve Adapter Monitor Mode Issue
    • Additional Way to Solve Airodump-ng Issue
    • Explaining the Outputof Airodump_ng Command
    • Get Hidden Names of Wi-Fi Networks (SSID)
    • How to Change Your MAC Address
    • Solve MAC Address Reset Issue
    • Disconnect Connected Clients from Any Close Wi-Fi Network
    • Disconnect a Specific Client from Any Close Wi-Fi Network
    • Hacking WEP Networks with wifite Tool
    • Hacking WEP Network without Tools
    • Hacking WPA/WPA2 through WPS Feature
    • Hacking WPA_WPA2 Password using a Wordlist
    • Hack Wi-Fi (WPA/WPA2) Password Easily
    • Scan Connected Clients to Your Network and Solve WiFi Issue
    • Scan Opened Ports in Your Network
    • Downloading and Installing Windows 10 as a Virtual Machine
    • Man in the Middle Attack
    • Sniffing HTTP Traffic
    • Sniffing HTTPS Traffic
    • DNS Spoof Attack
  • Network Post-Attack Phase
    • VEIL Tool- a Tool for Generating Your Own Viruses
    • Generating a Backdoor (Virus)
    • Gaining Access via Meterpreter
    • Moving the Backdoor to Another Virtual Machine
    • Meterpreter Commands after Gaining the Access
    • Spoof Backdoor Extension Part 1
    • Spoof Backdoor Extension Part 2
    • Let the Backdoor to Work Outside Your Network
  • Protecting Yourself from Above mentioned Attacks
    • Protect Yourself from Above mentioned Attacks


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.




rss