->
Advanced Ethical Hacking: Network-Web Pentesting-Part Iii_B
Advanced Ethical Hacking: Network-Web Pentesting-Part Iii_B
Published 12/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.73 GB | Duration: 3h 45m

Become an Advanced in CyberSecurity, Network & Web application Penetration Tests (Hands-on Labs) & Assembly Language

 


What you'll learn

Way to get our service and products (Tools & Gift related to the course: FREE software & hardware) to excel in this course.

Working with BURPSUITE PROFESSIONAL instead of the COMMUNITY version (ranking between the 3 first best tools for PenTesting)

Labs Preparation (VirtualBox & Kali Linux installation & configuration), step-by-step guide & options to avoid provided ONLY by us & on Facebook/JRDacademy page

METASPLOIT, ARMITAGE (High-level Penetration Testing Software, find security issues, verify vulnerability mitigations & much more)

Fix Armitage Error, and Enjoy the Metasploit User Interface

Enumeration, Remote and Exploitation

Structured Query Language (SQL Injection)

Cross-site Scripting (XSS attack)

Vulnerability Scanning

Network Scanning, Nmap Scanning, Nikto, Dirb, Ettercap

Reverse Shells

Buffer Overflows, DoS Attack

Man-In-The-Middle (MITM) Attack

Privilege Escalation

Network Hacking

Wireless Hacking

Take Control Of Any Wi-Fi Network ESSID whether it is well-passworded or not

WEP/WPA/WPA2 Hole/pitfall

Interrupt the Connection of a Client's ip-address whether using WEP/WPA/WPA2 Protocols

Get the Handshake of WPA/WPA2 Protocols of a Wi-Fi ESSID

Crack Wireless WEP/WPA/WPA2 ESSID

Eavesdrop the Communication & The Reason Behind The Scene

Stealth Idle Scan

Bypass Antivirus in Windows Machine

Bypass Any Windows Login Password & Get Access To The System Administrator

Bypass Ubuntu Login Password & Get Access To The System Administrator

Bypass MacOs Login Password & Get Access To The System Administrator

Strengthen The Login Account Security Of Your Computer thrice Before Getting Access To The Admin's Screen

Essentials of CEH v10 in real-life (CEH - Certified Ethical Hacker)

Information Security

ElGamal, RSA, Diffie-Hellman (Encryption and Decription steps)

Router Hacking

Mobile Phones Hacking

Requirements

Windows or Ubuntu or MacOS host (although other OS's should work)

VirtualBox 8 GB RAM for setting up the Labs (more is better, less may cause performance issues)

Kali Linux - 2018.1-amd64 version (or 2019 versions)

Wireless Router (recommended: TP-Link 150Mbps, TL-WN727N), but any wireless router can be used to strengthen the wifi and to have another interface, which is highly needed.

BurpSuite-Pro (for live scanning & more options)

Advanced Ethical Hacking: Network-Web Pentesting-Part Iii_B


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.




rss