100% found this document useful (1 vote)
2K views4 pages

Ethical Hacking With Kali Linux

This document outlines an ethical hacking course using Kali Linux that lasts 30 days and 60 hours. It is divided into two parts that cover basics of Kali Linux, networking concepts, server management, identity changing, social media and password hacking, Metasploit, WiFi hacking, penetration testing, information gathering, website hacking and removing evidence. The course costs Rs. 20,000 and includes projects to plan hacking attacks on a person or company and also protecting against similar attacks.

Uploaded by

dhaval
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views4 pages

Ethical Hacking With Kali Linux

This document outlines an ethical hacking course using Kali Linux that lasts 30 days and 60 hours. It is divided into two parts that cover basics of Kali Linux, networking concepts, server management, identity changing, social media and password hacking, Metasploit, WiFi hacking, penetration testing, information gathering, website hacking and removing evidence. The course costs Rs. 20,000 and includes projects to plan hacking attacks on a person or company and also protecting against similar attacks.

Uploaded by

dhaval
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Ethical Hacking with Kali Linux

30 Days | 60 Hours | Rs. 20000

PART 1 | Ethical Hacking with Kali


01 | Kali Linux Basics
02 | Advanced Networking for Hackers
03 | Server Management on Kali
04 | Identity Changing
05 | Social Media Account Hacking and Security
06 | Password Hacking
07 | Metasploit : The Ultimate Hacking Framework
08 | Advanced Payload Execution in Target System
09 | WIFI Hacking and Security
10 | Tracking Person

PART 2 | Ethical Hacking with Kali


01 | Penetration Testing Introduction
02 | Information Gathering
03 | Hacking Metasploitable with Metasploit and Nmap
04 | Website Hacking and Security
05 | Clearing Tracks

Project : | Plan to Hack a PERSON | COMPANY :) and Protect Same Attack


PART 01 | ETHICAL HACKING WITH KALI LINUX
01 | Kali Linux Basics
Kali : Introduction
Kali : History
Kali : Download and Importing in Virtual Box
Kali : Basic Commands
Kali : General User and Root User
Kali : Setup Root User Password
Kali : User Management
Kali : File Sharing with Windows
Kali : Set Network Bridge or NAT
Kali : File And Folder Deletion
Kali : File Permissions
Kali : Software Installation from GITHUB
Kali : Software Installation from REPOSITORY

02 | Advanced Networking for Hackers


Network
OSI Model
TCP/IP Protocols
Working of HTTP and HTTPS
Working of FTP
Working of DNS
Working of DHCP
Working of SMTP
Working of POP3 and IMAP
Working of TELNET
Working of SSH
Working of NTP

03 | Server Management on Kali


Setup SSH Server on Kali
Setup Web Server on Kali
Setup Remote Desktop on Kali

04 | Identity Changing
Change IP Address on Kali
Change MAC Address on Kali
Change OS and Browser on Kali

05 | Social Media Account Hacking and Security


Hacking Social Media Accounts using Keystrokes Capture : Revealer | Flash
Hacking Social Media Accounts using Phishing

06 | Password Hacking
Hacking KALI Password
Changing Root Password
Setting Root Password without Old Password
07 | Metasploit : The Ultimate Hacking Framework
History | Use
Commands for Android/Windows
Port Forwarding for WAN Attacks
Hack 01 | Windows Payload using MSFVENOM on LAN and WAN
Hack 02 | Android Payload using MSFVENOM on LAN and WAN
Hack 03 | Hacking Windows 7 witn NSA Exploit

08 | Advanced Payload Execution in Target System


Method 01 | Download and Execute Payload Automatically
Method 02 | Download and execute file using AUTOIT

09 | WIFI Hacking and Security


Jam Wifi using MDK3
Jam Wifi using Aircrack-ng
Making of Wifi Jammer Device using NodeMCU 8266 Chip

Creating WORD LIST | CUPP


Find Saved WIFI Passwords from Linux Systems
Hacking WPA and WPA2 without WORDLIST
Cracking WPA and WPA2 Using a Wordlist

10 | Tracking Person
Information Gathering :
Track IP Address of the Person
Track Picture of the Person
Instagram Information Gathering
Sherlock : Find Same Usernames
PART 02 | PENETRATION TESTING
01 | Penetration Testing Introduction
Introduction
Types of Penetration Testing : BlackBox | WhiteBox | GrayBox
Setup Lab for Penetration Testing
Setup Networking in Lab
Setup Folder Sharing in Lab

02 | Information Gathering
Find IP Address of System
Find Network Range of Network
Find Routers IP Address
Find CCTV DVRs IP Address
Scanning with Net Discover
Find Network Devices
Find Servers
Find Open Ports on Target System
Find Operating System on Target System
Find Software Versions on Target System
Find Service Version on Specific Port Number

03| Hacking Metasploitable with Metasploit and Nmap


Setup Metasploitable
Understanding Vulnerability
Finding Exploit
Running Exploit
Hacking FILE SERVER : Metasploit
Hacking APACHE WEB SERVER : Metasploit
Hacking WEB SERVER using DOS Attack : Metasploit
Hacking IRC SERVER : Metasploit

04 | Website Hacking and Security


Scraping Complete Website
Find Files and Folders on the Target Website with DIRBUSTER
Finding Vulnerability : Scanning Website with Online Service
Finding Vulnerability : Scanning Website with Kali Linux Tool - Nikto
Advanced DOS Attack using Kali
Advanced DDOS Attack using Kali

05 | Clearing Tracks
Removing Evidence from Kali Linux Terminal Command History
Removing Evidence from Windows Logs [ Windows OS ]
Removing Evidence from Pen Drive [ Overwrite with Low Level Format ]

* | Plan to Hack a PERSON | COMPANY :)

You might also like