Setup Menus in Admin Panel

  • LOGIN
  • No products in the basket.

Course Curriculum

Linux Basics
Basic Overview of Kali Linux 00:15:00
The Terminal & Linux Commands 00:15:00
Network Penetration Testing
Networks Basics 00:15:00
Connecting a Wireless Adapter to Kali 00:15:00
What is MAC Address & How to Change It 00:15:00
Wireless Modes (Managed & Monitor) 00:15:00
Enabling Monitor Mode Manually (2nd method) 00:15:00
Enabling Monitor Mode Using airmon-ng (3rd method) 00:15:00
Network Penetration Testing - Pre Connection Attacks
Packet Sniffing Basics Using Airodumping 00:15:00
Targeted Packet Sniffing Using Airodumping 00:15:00
Deauthentication Attack (Disconnecting Any Device from The Network) 00:15:00
Creating a Fake Access Point (Honeypot) – Theory 00:15:00
Creating a Fake Access Point (Honeypot) – Practical 00:15:00
Network Penetration Testing - Gaining Access (WEP/WPA/WPA2 Cracking)
Gaining Access Introduction 00:15:00
WEP Cracking – Theory Behind Cracking WEP Encryption 00:15:00
WEP Cracking – Basic Case 00:15:00
WEP Cracking – Fake Authentication 00:15:00
WEP Cracking – ARP Request Replay Attack 00:15:00
WPA/WPA2 Cracking – Introduction 00:15:00
WPA/WPA2 Cracking – Exploiting WPS Feature 00:15:00
WPA/WPA2 Cracking – Theory Behind WPA/WPA2 Cracking 00:15:00
WPA/WPA2 Cracking – How to Capture the Handshake 00:15:00
WPA/WPA2 Cracking – Creating a Wordlist 00:15:00
WPA/WPA2 Cracking – Using a Wordlist Attack 00:15:00
Securing Your Network from The Above Attacks 00:15:00
How to Configure Wireless Security Settings to Secure Your Network 00:15:00
Network Penetration Testing - Post Connection Attacks
Installing Windows as a Virtual Machine 00:15:00
Introduction to Connection Attacks 00:15:00
Information Gathering – Discovering Connected Clients using netdiscover 00:15:00
Gathering More Information Using Autoscan 00:15:00
Gathering Even More Information Using Zenmap 00:15:00
MITM – ARP Poisoning Theory 00:15:00
MITM – ARP Spoofing using arpspoof 00:15:00
MITM – ARP Spoofing Using MITMf 00:15:00
MITM – Bypassing HTTPS 00:15:00
MITM – Session Hijacking 00:15:00
MITM – DNS Spoofing 00:15:00
MITM – Capturing Screen of Target & Injecting a Keylogger 00:15:00
MITM – Injecting JavaScript/HTML Code 00:15:00
MITM – Using MITMf Against Real Networks 00:15:00
Wireshark – Basic Overview & How to Use It with MITM Attacks 00:15:00
Wireshark – Sniffing Data & Analysing HTTP Traffic 00:15:00
Wireshark – Capturing Passwords & Cookies Entered by Any Device in The Network 00:15:00
Network Penetration Testing - Detection & Security
Detecting ARP Poisoning Attacks 00:15:00
Detecting suspicious Activities Using Wireshark 00:15:00
Gaining Access to Computer Devices
Gaining Access - Server Side Attacks
Installing Metasploitable as a Virtual Machine 00:15:00
Gaining Access Introduction 00:15:00
Basic Information Gathering & Exploitation 00:15:00
Using a Basic Metasploit Exploit 00:15:00
Exploiting a Code Execution Vulnerability 00:15:00
MSFC – Installing MSFC (Metasploit Community) 00:15:00
MSFC – Scanning Target(s) For Vulnerabilities 00:15:00
MSFC – Analysing Scan results & Exploiting Target System 00:15:00
Nexpose – Installing Nexpose 00:15:00
Nexpose – How to Configure & Launch a Scan 00:15:00
Nexpose – Analysing Scan Results & Generating Reports 00:15:00
Gaining Access - Client Side Attacks
Client Side Attacks Introduction 00:15:00
Installing Veil 3.1 00:15:00
Veil Overview & Payloads Basics 00:15:00
Generating an Undetectable Backdoor Using Veil 3 00:15:00
Listening for Incoming Connections 00:15:00
Using A Basic Delivery Method to Test the Backdoor & Hack Windows 10 00:15:00
Backdoor Delivery Method 1 – Using a Fake Update 00:15:00
Backdoor Delivery Method 2 – Backdooring Downloads on The Fly 00:15:00
How to Protect Yourself from The Discussed Delivery Methods 00:15:00
Gaining Access - Client Side Attacks - Social Engineering
Social Attack Introduction 00:15:00
Maltego Basics 00:15:00
Discovering Websites, Links & Social Networking Accounts Associated with Target 00:15:00
Discovering Twitter Friends & Associated Accounts 00:15:00
Discovering Emails of The Target’s Friends 00:15:00
Analysing The Gathered Info & Building an Attack Strategy 00:15:00
Backdooring Any File Type (images, pdf’s …etc.) 00:15:00
Compiling & Changing Trojan’s Icon 00:15:00
Spoofing .exe Extension to Any Extension (jpg, pdf …etc.) 00:15:00
Spoofing Emails – Setting Up am SMTP Server 00:15:00
Email Spoofing – Sending Emails as Any Email Account 00:15:00
BeEF Overview & Basic Hook Method 00:15:00
BeEF – hooking targets using MITMf 00:15:00
BeEF – Running Basic Commands On Target 00:15:00
BeEF – Stealing Credentials/Passwords Using a Fake Login Prompt 00:15:00
BeEF – Gaining Full Control Over Windows Target 00:15:00
Detecting Trojans Manually 00:15:00
Detecting Trojans Using a Sandbox 00:15:00
Gaining Access - Using The Above Attacks Outside the Local Network
Overview of the Setup of Above Attacks 00:15:00
Ex1 – Generating a Backdoor That Works Outside the Network 00:15:00
Configuring The Router to Forward Connections to Kali 00:15:00
Ex2 – Using BeEF Outside the Network 00:15:00
Post Exploitation
Post Exploitation Introduction 00:15:00
Meterpreter Basics 00:15:00
File System Commands 00:15:00
Maintaining Access – Basic Methods 00:15:00
Maintaining Access – Using a Reliable & Undetectable Method 00:15:00
Spying – Capturing Key Strikes & Taking Screen Shots 00:15:00
Pivoting – Theory (What is Pivoting?) 00:15:00
Pivoting – Exploiting Devices on The Same Network as The Target Computer 00:15:00
Website Penetration Testing
Introduction – What Is a Website? 00:15:00
How to Hack a Website? 00:15:00
Website Pentesting - Information Gathering
Gathering Basic Information Using WhoIS Lookup 00:15:00
Discovering Technologies Used On the Website 00:15:00
Gathering Comprehensive DNS Information 00:15:00
Discovering Websites On the Same Server 00:15:00
Discovering Subdomains 00:15:00
Discovering Sensitive Files 00:15:00
Analysing Discovered Files 00:15:00
Website Pentesting - File Upload, Code Execution & File Inclusion Vulns
Discovering & Exploiting File Upload Vulnerabilities 00:15:00
Discovering & Exploiting Code Execution Vulnerabilities 00:15:00
Discovering & Exploiting Local File Inclusion Vulnerabilities 00:15:00
Remote File Inclusion Vulnerabilities – Configuring PHP Settings 00:15:00
Remote File Inclusion Vulnerabilities – Discovery & Exploitation 00:15:00
Preventing The Above Vulnerabilities 00:15:00
Website Pentesting - SQL Injection Vulnerabilities
What is SQL Injection 00:15:00
Dangers of SQL Injection Vulnerabilities 00:15:00
Discovering SQL injections in POST 00:15:00
Bypassing Logins Using SQL injection Vulnerability 00:15:00
Discovering SQL injections in GET 00:15:00
Reading Database Information 00:15:00
Finding Database Tables 00:15:00
Extracting Sensitive Data Such as Passwords 00:15:00
Reading & Writing Files On the Server Using SQL Injection Vulnerability 00:15:00
Discovering SQL Injections & Extracting Data Using SQLmap 00:15:00
The Right Way to Prevent SQL Injection 00:15:00
Website Pentesting - Cross Site Scripting Vulnerabilities
Introduction – What is XSS or Cross Site Scripting? 00:15:00
Discovering Reflected XSS 00:15:00
Discovering Stored XSS 00:15:00
Exploiting XSS – Hooking Vulnerable Page Visitors to BeEF 00:15:00
Preventing XSS Vulnerabilities 00:15:00
Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP
Scanning Target Website for Vulnerabilities 00:15:00
Analysing Scan Results 00:15:00
Bonus Section
What’s Next? 00:15:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
15 STUDENTS ENROLLED

    TOP RATED COURSES

    Reviews

    Template Design © eTraining.Online All rights reserved.
    X