Ethical Hacking with Kali Linux
30 Days | 60 Hours | Rs. 20000
PART 1 | Ethical Hacking with Kali
01 | Kali Linux Basics
02 | Advanced Networking for Hackers
03 | Server Management on Kali
04 | Identity Changing
05 | Social Media Account Hacking and Security
06 | Password Hacking
07 | Metasploit : The Ultimate Hacking Framework
08 | Advanced Payload Execution in Target System
09 | WIFI Hacking and Security
10 | Tracking Person
PART 2 | Ethical Hacking with Kali
01 | Penetration Testing Introduction
02 | Information Gathering
03 | Hacking Metasploitable with Metasploit and Nmap
04 | Website Hacking and Security
05 | Clearing Tracks
Project : | Plan to Hack a PERSON | COMPANY :) and Protect Same Attack
PART 01 | ETHICAL HACKING WITH KALI LINUX
01 | Kali Linux Basics
Kali : Introduction
Kali : History
Kali : Download and Importing in Virtual Box
Kali : Basic Commands
Kali : General User and Root User
Kali : Setup Root User Password
Kali : User Management
Kali : File Sharing with Windows
Kali : Set Network Bridge or NAT
Kali : File And Folder Deletion
Kali : File Permissions
Kali : Software Installation from GITHUB
Kali : Software Installation from REPOSITORY
02 | Advanced Networking for Hackers
Network
OSI Model
TCP/IP Protocols
Working of HTTP and HTTPS
Working of FTP
Working of DNS
Working of DHCP
Working of SMTP
Working of POP3 and IMAP
Working of TELNET
Working of SSH
Working of NTP
03 | Server Management on Kali
Setup SSH Server on Kali
Setup Web Server on Kali
Setup Remote Desktop on Kali
04 | Identity Changing
Change IP Address on Kali
Change MAC Address on Kali
Change OS and Browser on Kali
05 | Social Media Account Hacking and Security
Hacking Social Media Accounts using Keystrokes Capture : Revealer | Flash
Hacking Social Media Accounts using Phishing
06 | Password Hacking
Hacking KALI Password
Changing Root Password
Setting Root Password without Old Password
07 | Metasploit : The Ultimate Hacking Framework
History | Use
Commands for Android/Windows
Port Forwarding for WAN Attacks
Hack 01 | Windows Payload using MSFVENOM on LAN and WAN
Hack 02 | Android Payload using MSFVENOM on LAN and WAN
Hack 03 | Hacking Windows 7 witn NSA Exploit
08 | Advanced Payload Execution in Target System
Method 01 | Download and Execute Payload Automatically
Method 02 | Download and execute file using AUTOIT
09 | WIFI Hacking and Security
Jam Wifi using MDK3
Jam Wifi using Aircrack-ng
Making of Wifi Jammer Device using NodeMCU 8266 Chip
Creating WORD LIST | CUPP
Find Saved WIFI Passwords from Linux Systems
Hacking WPA and WPA2 without WORDLIST
Cracking WPA and WPA2 Using a Wordlist
10 | Tracking Person
Information Gathering :
Track IP Address of the Person
Track Picture of the Person
Instagram Information Gathering
Sherlock : Find Same Usernames
PART 02 | PENETRATION TESTING
01 | Penetration Testing Introduction
Introduction
Types of Penetration Testing : BlackBox | WhiteBox | GrayBox
Setup Lab for Penetration Testing
Setup Networking in Lab
Setup Folder Sharing in Lab
02 | Information Gathering
Find IP Address of System
Find Network Range of Network
Find Routers IP Address
Find CCTV DVRs IP Address
Scanning with Net Discover
Find Network Devices
Find Servers
Find Open Ports on Target System
Find Operating System on Target System
Find Software Versions on Target System
Find Service Version on Specific Port Number
03| Hacking Metasploitable with Metasploit and Nmap
Setup Metasploitable
Understanding Vulnerability
Finding Exploit
Running Exploit
Hacking FILE SERVER : Metasploit
Hacking APACHE WEB SERVER : Metasploit
Hacking WEB SERVER using DOS Attack : Metasploit
Hacking IRC SERVER : Metasploit
04 | Website Hacking and Security
Scraping Complete Website
Find Files and Folders on the Target Website with DIRBUSTER
Finding Vulnerability : Scanning Website with Online Service
Finding Vulnerability : Scanning Website with Kali Linux Tool - Nikto
Advanced DOS Attack using Kali
Advanced DDOS Attack using Kali
05 | Clearing Tracks
Removing Evidence from Kali Linux Terminal Command History
Removing Evidence from Windows Logs [ Windows OS ]
Removing Evidence from Pen Drive [ Overwrite with Low Level Format ]
* | Plan to Hack a PERSON | COMPANY :)