Learn Ethical Hacking Bootcamp 2021 Zero to Mastery Free Video Course

Learn Ethical Hacking Bootcamp 2021 Zero to Mastery Free Video Course

Tech Aadi

What you will learn:

  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Learn Python from scratch so you are able to write your own tools for ethical hacking
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • Create additional virtual *vulnerable* machines that we can practice our attacks on
  • Create trojans, viruses, keyloggers for ethical hacking
  • Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
  • Learn how to crack Wireless Access Point passwords
  • Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
  • Learn how to gain access to any type of machine: Windows/Linux/MacOS
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Advance Metasploit Framework usage
  • Learn Basics of Linux and Linux Terminal
  • Master Information Gathering and Footprinting
  • Learn how to perform Vulnerability Analysis
  • Perform advanced scanning of an entire network
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Website Application Penetration Testing from scratch
  • Learn Advance Nmap Usage
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Create Persistence on target machines
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn how to gain access to a router in various ways
  • Learn Networking & different Networking Protocols
  • Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations

Requirements of Ethical Hacking Bootcamp:

  • No programming or hacking knowledge required. We teach you from scratch!
  • Mac / Windows / Linux – all operating systems work with this course!

Description of Ethical Hacking Bootcamp:

Ethical Hacking course is centered around learning by doing. We will instruct you how hacking functions by really rehearsing the strategies and techniques utilized by programmers today. We will get going by making our hacking lab to ensure we protect your PCs all through the course, just as doing things legitimately, and once we have our PCs set up for moral hacking, at that point we plunge into subjects like:

  1. HACKING LAB – In this segment we are building our own lab where we can play out our assaults (You will actually want to utilize your Mac, Windows, Linux working frameworks don’t stress!). What this lab basically is, is a virtual machine that we will use for hacking (Kali Linux) and all through the course we likewise make extra virtual vulnerable machines that we can rehearse our assaults on. The explanation we utilize virtual machines is on the grounds that we are not permitted to test our assaults on genuine sites and organizations so we establish our own current circumstance to do that.
  • Downloading Virtual Box and Kali Linux
  • Making Our First Virtual Machine
  • Introducing Kali Linux Operating System
  • 5 Stages Of A Penetration Test
  • Exploring Through Kali Linux System
  • Making Files and Managing Directories
  • Organization Commands and Sudo Privileges In Kali
  1. Discretionary: PYTHON 101 – Learn python 3 programming without any preparation. This segment isn’t required and is discretionary for those that need to figure out how to programming so you can assemble your own moral hacking apparatuses!
  • Learn Python Basics
  • Learn Python Intermediate
  • Learn Python: Error Handling
  • Learn Python: File I/O
  1. Surveillance – Here we realize what we call Footprinting, or as such, Information Gathering. When we pick our objective, our first undertaking is to acquire however much data about the objective as could be expected.
  • What is Information Gathering ?
  • Acquiring IP Address, Physical Address Using Whois Tool
  • Whatweb Stealthy Scan
  • Forceful Website Technology Discovering on IP Range
  • Social event Emails Using theHarvester and Hunterio
  • Step by step instructions to Download Tools Online
  • Discovering Usernames With Sherlock
  • Reward – Email Scraper Tool In Python 3
  • More About Information Gathering
  1. Filtering – This is the place where things get genuine. In this part, we additionally assemble data yet we attempt to accumulate just specialized data (for example in the event that they have open ports, in the event that they have a firewall, what virtual products they are running on those open ports, what working framework do they have, is it an obsolete working framework, and so forth)
  • Hypothesis Behind Scanning
  • TCP and UDP
  • Introducing Vulnerable Virtual Machine
  • Netdiscover
  • Performing First Nmap Scan
  • Distinctive Nmap Scan Types
  • Finding Target Operating System
  • Distinguishing Version Of Service Running On An Open Port
  • Separating Port Range and Output Of Scan Results
  • What is a Firewall/IDS ?
  • Utilizing Decoys and Packet Fragmentation
  • Security Evasion Nmap Options
  • Note: Time To Switch Things Up!
  • Python Coding Project – Port Scanner
  1. Weakness ANALYSIS – In this segment we utilize the data that we assembled from checking, (for example, programming projects that the objective has running on open ports) and with this data, we attempt to decide if there is any known weaknesses.
  • Discovering First Vulnerability With Nmap Scripts
  • Manual Vulnerability Analysis and Searchsploit
  • Nessus Installation
  • Finding Vulnerabilities With Nessus
  • Examining Windows 7 Machine With Nessus
  1. Misuse and GAINING ACCESS – This is the energizing piece of the course. This is the place where we assault and access the objective machines. All through this segment, we will cover a wide range of weaknesses and various targets. We play out these assaults on our virtual machines and cover another truly significant device for a moral programmer: Metasploit Framework. The objective of abuse is to get on that target machine. This implies we should drop a payload on that target machine so we can utilize it to explore through their frameworks, glance through their records, execute anything we need, and erase anything we need without the objective knowing the slightest bit about it. We will likewise figure out how to make our own Viruses and Trojans that we can convey to the objective whether through an email or through a USB.
  • What is Exploitation ?
  • What is a Vulnerability ?
  • Switch Shells, Bind Shells ..
  • Metasploit Framework Structure
  • Msfconsole Basic Commands
  • Our First Exploit – vsftp 2.3.4 Exploitation
  • Misconfigurations Happen – Bindshell Exploitation
  • Data Disclosure – Telnet Exploit
  • Programming Vulnerability – Samba Exploitation
  • Assaulting SSH – Bruteforce Attack
  • Abuse Challenge – 5 Different Exploits
  • Clarifying Windows 7 Setup
  • Unceasing Blue Attack – Windows 7 Exploitation
  • DoublePulsar Attack – Windows Exploit
  • BlueKeep Vulnerability – Windows Exploit
  • Routersploit
  • Switch Default Credentials
  • Setting Up Vulnerable Windows 10
  • Smashing Windows 10 Machine Remotely
  • Misusing Windows 10 Machine Remotely
  • Creating Basic Payload With Msfvenom
  • Advance Msfvenom Usage
  • Creating Powershell Payload Using Veil
  • TheFatRat Payload Creation
  • Hexeditor and Antiviruses
  • Making Our Payload Open An Image
  1. POST EXPLOITATION – This is the thing that comes after Exploitation. Post abuse is our specialty on the objective machine after we have misused it. Since we are on that machine we can do numerous things relying upon what we need to get out from it. Toward the end, after we do everything we needed, we need to ensure we cover our tracks by erasing any occasion logs or erasing any proof that we were ever on that machine.
  • Post Exploitation Theory
  • Meterpreter Basic Commands
  • Lifting Privileges With Different Modules
  • Making Persistence On The Target System
  • Post Exploitation Modules
  • Python Coding Project – Backdoor
  1. Site PENETRATION TESTING – This is another large theme for a moral programmer. In this part, we are mostly focusing on sites and their bugs/weaknesses. These weaknesses can be anything from misconfigurations, SQL Injections (us collaborating with the data set), Information Disclosures (approaching some data accidentally which shouldn’t be out there), Command Injection (straightforwardly associating with the framework through the site page), XSS (Cross Site Scripting Attack and Injecting Javascript code on the page).
  • Site Penetration Testing Theory
  • HTTP Request and Response
  • Data Gathering and Dirb Tool
  • Burpsuite Configuration
  • ShellShock Exploitation
  • Order Injection Exploitation
  • Getting Meterpreter Shell With Command Execution
  • Reflected XSS and Cookie Stealing
  • Put away XSS
  • HTML Injection
  • SQL Injection
  • CSRF Vulnerability
  • Hydra Bruteforce Attack
  • Burpsuite Intruder
  • Python Coding Project – Login Brute-power + Directory Discovery
  1. MAN IN THE MIDDLE – This is an assault that is utilized inside an organization. This permits us to sniff any decoded information and see it in plain content. This could likewise remember seeing passwords for plain content for certain sites. There are numerous apparatuses out there that can play out this assault for us and we cover a portion of the principle ones in the part.
  • Hypothesis – Man In The Middle Attack
  • Bettercap ARP Spoofing
  • Ettercap Password Sniffing
  • Physically Poisoning Targets ARP Cache With Scapy
  1. WIFI CRACKING – This is the part where we need to access an organization by breaking its remote secret phrase.
  • Remote Cracking Theory
  • Placing Wireless Card In Monitor Mode
  • Deauthenticating Devices and Grabbing Password

Aircrack Password Cracking

Hashcat Password Cracking


Who this course is for:

  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal “beginner” tutorial that doesn’t give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers

Course content of Ethical Hacking Bootcamp:

Introduction Of Ethical Hacking Bootcamp:

  • Course Outline
  • Join Our Online Classroom!
  • Exercise: Meet The Community
  • What Is Ethical Hacking ?
  • Course Resources + Guide

Setting Up Our Hacking Lab:

  • What is A Virtual Machine ?
  • Why Linux ?
  • Downloading Virtual Box & Kali Linux
  • Note: Kali Linux Updates All The Time!
  • Creating Our First Virtual Machine
  • Installing Kali Linux Operating System
  • Update 1 – New & Old Versions of Kali Linux
  • Networking Basics
  • Full Screen Mode & Network Settings
  • Note: Getting Familiar With Kali Linux!
  • 5 Stages Of A Penetration Test

Linux Operating System:

  • Navigating Through Linux System
  • Creating Files & Managing Directories
  • Network Commands & Sudo Privileges In Kali
  • Note: Linux File System & Additional Commands

Reconnaissance & Information Gathering:

  • What is Information Gathering ?
  • Obtaining IP Address, Physical Address Using Whois Tool
  • Whatweb Stealthy Scan
  • Aggressive Website Technology Discovering on IP Range
  • Note: Same Tools Different Results!
  • Gathering Emails Using theHarvester & Hunter.io
  • How To Download Tools Online
  • Finding Usernames With Sherlock
  • Bonus – Email Scraper Tool In Python 3
  • Note: More About Information Gathering

Scanning:

  • Theory Behind Scanning
  • TCP & UDP
  • Installing Vulnerable Virtual Machine
  • Netdiscover
  • Performing First Nmap Scan
  • Different Nmap Scan Types
  • ZTM Nmap Cheat Sheet
  • Discovering Target Operating System
  • Detecting Version Of Service Running On An Open Port
  • Filtering Port Range & Output Of Scan Results
  • What is a Firewall/IDS ?
  • Using Decoys and Packet Fragmentation
  • Security Evasion Nmap Options
  • Note: Time To Switch Things Up!

Python Coding Project #1 – Portscanner:

  • The 2 Paths
  • Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
  • Coding a Portscanner in Python 3

Vulnerability Analysis:

  • Finding First Vulnerability With Nmap Scripts
  • Manual Vulnerability Analysis & Searchsploit
  • Nessus Installation
  • Discovering Vulnerabilities With Nessus
  • Scanning Windows 7 Machine With Nessus
  • Lets cool down for a bit!

Exploitation & Gaining Access:

  • What is Exploitation ?
  • What is a Vulnerability ?
  • Reverse Shells, Bind Shells ..
  • Metasploit Framework Structure
  • Msfconsole Basic Commands
  • Our First Exploit – vsftp 2.3.4 Exploitation
  • Misconfigurations Happen – Bindshell Exploitation
  • Information Disclosure – Telnet Exploit
  • Software Vulnerability – Samba Exploitation
  • Attacking SSH – Bruteforce Attack11:56
  • Exploitation Challenge – 5 Different Exploits
  • Explaining Windows 7 Setup
  • Eternal Blue Attack – Windows 7 Exploitation
  • DoublePulsar Attack – Windows Exploit15:04
  • BlueKeep Vulnerability – Windows Exploit
  • Note: We Can Also Target Routers!
  • Update 2 – Routersploit
  • Update 3 – Router Default Credentials

SMBGhost CVE 2020-0796 – Windows 10 Manual Exploitation:

  • Note: Not Everything Will Work Smooth!
  • Setting Up Vulnerable Windows 10
  • Crashing Windows 10 Machine Remotely
  • Exploiting Windows 10 Machine Remotely

Gaining Access (Viruses, Trojans, Payloads:

  • Generating Basic Payload With Msfvenom
  • Advance Msfvenom Usage Part 1
  • Advance Msfvenom Usage Part 2
  • Generating Powershell Payload Using Veil
  • TheFatRat Payload Creation
  • Note: My Payloads Are Getting Detected By An Antivirus!
  • Hexeditor & Antiviruses
  • Making Our Payload Open An Image

Download Links:-

Part1:-

https://drive.google.com/file/d/1eVYkdgJNjpH6lb3B1eeZE3rFPq9Jmb6U/view?usp=sharing

Part 2:-

https://drive.google.com/file/d/1SH7pXiHSbd6jU_JVb03dACtkhfHRW_ao/view?usp=sharing

Part3:-

https://drive.google.com/file/d/1iB4-Hrb2Drxiqau9QwEOL4ycBWUHxXzs/view?usp=sharing

Part 4:-

https://drive.google.com/file/d/1iB4-Hrb2Drxiqau9QwEOL4ycBWUHxXzs/view?usp=sharing

Part 5:-

https://drive.google.com/file/d/1oDx8pp2olTYQFQ9srwLGQ34yUmfCZEy5/view?usp=sharing

Part 6:-

https://drive.google.com/file/d/1HCo-sLjl_bRzKblw14egXmMNvj5fsNtn/view

Part 7:-

https://drive.google.com/file/d/12QgqsQ9EIC_aQCM51JW0ieu5gJbWQvyj/view

Credit:-How To Free

#UDEMY


Report Page