->
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
Learn Ethical Hacking + Penetration Testing! Use real techniques by black hat hackers then learn to defend against them!


Description

Course content

  • Introduction
    • Course Outline
    • Join Our Online Classroom!
    • Exercise: Meet The Community
    • What Is Ethical Hacking ?
    • Course Resources + Guide
  • Setting Up Our Hacking Lab
    • What is A Virtual Machine ?
    • Why Linux ?
    • Downloading Virtual Box & Kali Linux
    • Note: Kali Linux Updates All The Time!
    • Creating Our First Virtual Machine
    • Installing Kali Linux Operating System
    • Update 1 - New & Old Versions of Kali Linux
    • Full Screen Mode & Network Settings
    • Note: Getting Familiar With Kali Linux!
    • 5 Stages Of A Penetration Test
  • Linux Operating System
    • Navigating Through Linux System
    • Creating Files & Managing Directories
    • Network Commands & Sudo Privileges In Kali
    • Note: Linux File System & Additional Commands
  • Reconnaissance & Information Gathering
    • What is Information Gathering ?
    • Obtaining IP Address, Physical Address Using Whois Tool
    • Whatweb Stealthy Scan
    • Aggressive Website Technology Discovering on IP Range
    • Note: Same Tools Different Results!
    • Gathering Emails Using theHarvester & Hunter.io
    • How To Download Tools Online
    • Finding Usernames With Sherlock
    • Bonus - Email Scraper Tool In Python 3
    • Note: More About Information Gathering
  • Scanning
    • Theory Behind Scanning
    • TCP & UDP
    • Installing Vulnerable Virtual Machine
    • Netdiscover
    • Performing First Nmap Scan
    • Different Nmap Scan Types
    • Discovering Target Operating System
    • Detecting Version Of Service Running On An Open Port
    • Filtering Port Range & Output Of Scan Results
    • What is a Firewall/IDS ?
    • Using Decoys and Packet Fragmentation
    • Security Evasion Nmap Options
    • Note: Time To Switch Things Up!
  • Python Coding Project #1 - Portscanner
    • The 2 Paths
    • Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
    • Coding a Portscanner in Python 3
  • Vulnerability Analysis
    • Finding First Vulnerability With Nmap Scripts
    • Manual Vulnerability Analysis & Searchsploit
    • Nessus Installation
    • Discovering Vulnerabilities With Nessus
    • Scanning Windows 7 Machine With Nessus
    • Lets cool down for a bit!
  • Exploitation & Gaining Access
    • What is Exploitation ?
    • What is a Vulnerability ?
    • Reverse Shells, Bind Shells ..
    • Metasploit Framework Structure
    • Msfconsole Basic Commands
    • Our First Exploit - vsftp 2.3.4 Exploitation
    • Misconfigurations Happen - Bindshell Exploitation
    • Information Disclosure - Telnet Exploit
    • Software Vulnerability - Samba Exploitation
    • Attacking SSH - Bruteforce Attack
    • Exploitation Challenge - 5 Different Exploits
    • Explaining Windows 7 Setup
    • Eternal Blue Attack - Windows 7 Exploitation
    • DoublePulsar Attack - Windows Exploit
    • BlueKeep Vulnerability - Windows Exploit
    • Note: We Can Also Target Routers!
    • Update 2 - Routersploit
    • Update 3 - Router Default Credentials
  • SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
    • Note: Not Everything Will Work Smooth!
    • Setting Up Vulnerable Windows 10
    • Crashing Windows 10 Machine Remotely
    • Exploiting Windows 10 Machine Remotely
  • Gaining Access (Viruses, Trojans, Payloads ...)
    • Generating Basic Payload With Msfvenom
    • Advance Msfvenom Usage Part 1
    • Advance Msfvenom Usage Part 2
    • Generating Powershell Payload Using Veil
    • TheFatRat Payload Creation
    • Note: My Payloads Are Getting Detected By An Antivirus!
    • Hexeditor & Antiviruses
    • Making Our Payload Open An Image
  • Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers ..
    • Post Exploitation Theory
    • Meterpreter Basic Commands Part 1
    • Meterpreter Basic Commands Part 2
    • Elevating Privileges With Different Modules
    • Creating Persistence On The Target System
    • Post Exploitation Modules
    • Exploitation Recap
  • Python Coding Project #2 - Backdoor
    • What Are We Creating ?
    • Connecting Server And Backdoor
    • Processing Instructional Commands
    • Sending and Receiving Data
    • Executing Commands And Compiling The Program
    • Changing Directory Inside Of Our Backdoor
    • Uploading & Downloading Files
    • Testing All The Commands
    • Note: You Can Continue Building Onto This Project!
  • Website Application Penetration Testing
    • Website Penetration Testing Theory
    • HTTP Request & Response
    • Information Gathering & Dirb Tool
    • Burpsuite Configuration
    • ShellShock Exploitation
    • Command Injection Exploitation
    • Getting Meterpreter Shell With Command Execution
    • Reflected XSS & Cookie Stealing
    • Stored XSS
    • HTML Injection
    • SQL Injection
    • CSRF Vulnerability
    • Hydra Bruteforce Attack Example 1
    • Hydra Bruteforce Attack Example 2
    • Burpsuite Intruder
  • Python Coding Project #3 - Login Bruteforce, Directory Discovery
    • Creating 2 Programs
    • Bruteforcer In Python
    • Hidden Directory Discovery
  • Man In The Middle - MITM
    • Theory - Man In The Middle Attack
    • Bettercap ARP Spoofing
    • Ettercap Password Sniffing
    • Manually Poisoning Targets ARP Cache With Scapy
  • Bonus - Wireless Access Point Cracking
    • Wireless Cracking Theory
    • Putting Wireless Card In Monitor Mode
    • Deauthenticating Devices & Grabbing Password
    • Aircrack Password Cracking
    • Hashcat Password Cracking
  • Where To Go From Here ?
    • Become An Alumni
    • Endorsements On LinkedIN
    • What is Next?
    • Learning Guideline
    • Practice
    • Bug Bounty
    • Coding For Hackers
    • Exploit Development
    • Python Monthly
  • Learn Python Basics
    • What Is A Programming Language
    • Python Interpreter
    • How To Run Python Code
    • Our First Python Program
    • Latest Version Of Python
    • Python 2 vs Python 3
    • Exercise: How Does Python Work?
  • Learn Python Intermediate
    • Learning Python
    • Python Data Types
    • How To Succeed
    • Numbers
    • Math Functions
    • DEVELOPER FUNDAMENTALS: I
    • Operator Precedence
    • Exercise: Operator Precedence
    • Optional: bin() and complex
    • Variables
    • Expressions vs Statements
    • Augmented Assignment Operator
    • Strings
    • String Concatenation
    • Type Conversion
    • Escape Sequences
    • Formatted Strings
    • String Indexes
    • Immutability
    • Built-In Functions + Methods
    • Booleans
    • Exercise: Type Conversion
    • DEVELOPER FUNDAMENTALS: II
    • Exercise: Password Checker
    • Lists
    • List Slicing
    • Matrix
    • List Methods
    • List Methods 2
    • List Methods 3
    • Common List Patterns
    • List Unpacking
    • None
    • Dictionaries
    • DEVELOPER FUNDAMENTALS: III
    • Dictionary Keys
    • Dictionary Methods
    • Dictionary Methods 2
    • Tuples
    • Tuples 2
    • Sets
    • Sets 2
    • Breaking The Flow
    • Conditional Logic
    • Indentation In Python
    • Truthy vs Falsey
    • Ternary Operator
    • Short Circuiting
    • Logical Operators
    • Exercise: Logical Operators
    • is vs ==
    • For Loops
    • Iterables
    • Exercise: Tricky Counter
    • range()
    • enumerate()
    • While Loops
    • While Loops 2
    • break, continue, pass
    • Our First GUI
    • DEVELOPER FUNDAMENTALS: IV
    • Exercise: Find Duplicates
    • Functions
    • Parameters and Arguments
    • Default Parameters and Keyword Arguments
    • return
    • Methods vs Functions
    • Docstrings
    • Clean Code
    • *args and **kwargs
    • Exercise: Functions
    • Scope
    • Scope Rules
    • global Keyword
    • nonlocal Keyword
    • Why Do We Need Scope?
    • Modules in Python
    • Quick Note: Upcoming Videos
    • Optional: PyCharm
    • Packages in Python
    • Different Ways To Import
  • Learn Python 3: Error Handling
    • Errors in Python
    • Error Handling
    • Error Handling 2
    • Exercises: Error Handling
    • Error Handling 3
  • Learn Python 4: File I/O
    • Working With Files In Python
    • Read, Write, Append
    • File Paths
    • File IO Errors
    • Exercise: Translator
    • Next Steps
  • BONUS SECTION
    • Bonus Lecture

Complete Ethical Hacking Bootcamp 2021: Zero to Mastery

Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part5.rar

Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part3.rar

Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part4.rar

Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part2.rar

Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part1.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.




rss