Video description
Are you looking to pursue a career in cybersecurity and want to master the art of penetration testing? You’ve come to the right place. With this carefully tailored and structured video course, you’ll grasp the basic and advanced topics of penetration testing with ease.
The course starts by taking you through the process of setting up a penetration testing lab. Next, you’ll become familiar with the Linux OS and Linux commands and explore the basic concepts of TCP/IP and the OSI model. Moving along, you’ll learn how to gather information about computer systems and networks passively and actively and use the Metasploit tool to perform privilege escalation. Next, you’ll perform web application pen testing and learn modern techniques to exploit common web application vulnerabilities such as SQL injection, XSS, CSRF, and command injection. You’ll also learn how to perform wireless network pen testing to crack Wi-Fi passwords using Aircrack-ng, capturing packets, traffic sniffing, and Hashcat. Towards the end, you’ll grasp the fundamentals of Python programming and develop offensive Python tools for pen testing and automation.
By the end of this course, you’ll have developed all the essentials skills needed for ethical hacking and penetration testing.
What You Will Learn
- Set up your own virtual hacking lab with a VirtualBox
- Use Nmap to perform network scanning and mapping
- Become familiar with footprinting and port scanning
- Exploit web applications with BurpSuite
- Perform SQL injection on vulnerable web apps
- Develop a brute force attacker tool in Python
Audience
If you are looking to get started in the field of cybersecurity and penetration testing, this course is for you. System administrators who want to secure their systems and networks will also find this course useful. A basic understanding of Linux and TCP/IP is needed to get started with this course.
About The Author
HackerSploit Academy: HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, data breaches, malware, and ransomware. They believe in achieving this by providing essential training in the protection of systems, and by providing industry-standard defense solutions protecting web applications to enterprise networks. They also offer individual and corporate training packages in Infosec, penetration testing and Red Team Operations, web application security, and cybersecurity awareness. So far, they have trained over 500,000 students in ethical hacking, penetration testing, and Linux system administration.
Table of contents
- Chapter 1 : Introduction
- Chapter 2 : Setting Up a Pentesting Lab
- Chapter 3 : Linux Essentials for Hackers
- Chapter 4 : Networking Tools and Essential Terminology
- Chapter 5 : Passive Information Gathering and Footprinting
- Chapter 6 : Active Information Gathering and Port Scanning
-
Chapter 7 : Web Application Penetration Testing
- Installing Open Web Application Security Project (OWASP)
- HTTP Requests
- HTTP Responses
- Configuring BurpSuite
- Modifying Packets in BurpSuite
- Whatweb and Dirb
- Password Recovery Attacks
- Brute Force Attacks with BurpSuite
- Brute Force Attacks with Hydra
- Session Fixation
- Injection Attacks
- Command Injection
- Exploiting Command Injection
- Finding Blind Command Injection
- SQL Basics
- Manual SQL Injection - 1
- Manual SQL Injection - 2
- SQLmap Basics
- XML Injection
- Installing Extreme Cloud Administration Toolkit (xCAT) and Preventing Injection Attacks
- Reflected Cross-Site Scripting (XSS)
- Stored XSS
- Modifying HTML Code with XSS
- XSSer and XSSsniper
-
Chapter 8 : Wireless Penetration Testing
- Wireless Attacks Fundamentals
- Enabling Monitor Mode
- Capturing Handshakes with Airodump-ng
- Rockou.txt Wordlist
- Cracking Passwords with Aircrack-ng
- Cracking Passwords with Hashcat
- Making Password Lists with Crunch
- Making Password Lists with Cupp
- Rainbow Tables - 1
- Rainbow Tables - 2
- Installing Fluxion
- Finding and Cracking Hidden Networks
- Preventing Wireless Attacks
-
Chapter 9 : System Hacking and Exploitation
- The Metasploit Console
- Metasploit Modules Explained
- Brute Forcing SSH with Metasploit
- Exploiting Apache Tomcat with Metasploit
- Getting a Meterpreter Session with Command Injection
- PHP Code Injection
- Exploiting Metasploitable2
- Wine Installation
- Crafting Windows Payloads with Msfvenom
- Encoders and Hexeditor
- Windows 10 Meterpreter Session
- Meterpreter Environment
- Windows 10 Privilege Escalation
- Preventing Privilege Escalation
- Post Exploitation Modules
- Getting a Meterpreter Session Over the Internet with Port Forwarding
- EternalBlue Exploit
- Persistence Module
- Hacking Over the Internet with Ngrok
- Creating Android Payloads with Msfvenom
- The Real Hacking Begins Now!
-
Chapter 10 : MITM Attacks (Man in the Middle)
- ARP Protocol Basics
- MITM Attacks Explained
- Installing MITMf
- Manual Arp Spoofing
- Problems while Installing MITMf
- HTTP Traffic Sniffing
- DNS Spoofing and HTTPS Password Sniffing
- Hooking Browsers with BEEF
- Taking a Screenshot of the Target's Browser
- Cloning Any Webpage
- Man In The Middle Attack - Ettercap Basics
- Chapter 11 : Python Basics
-
Chapter 12 : Developing an Advanced Backdoor
- The Theory Behind Reverse Shell
- Simple Server Code
- Connection with Reverse Shell
- Sending and Receiving Messages
- Sending Messages Using the While Loop
- Executing Commands on the Target System
- Fixing Backdoor Bugs and Adding Functions
- Installing Pyinstaller
- First Performance Test of Your Backdoor
- Trying to Connect Every 20 Seconds
- Creating Persistence Part 1
- Creating Persistence Part 2
- Changing Directory
- Uploading and Downloading Files
- Downloading Files from the Internet
- Starting Programs from Our Backdoor
- Capturing Screenshot on Target PC
- Embedding Backdoor in Image Part 1
- Embedding Backdoor in Image Part 2
- Checking for Administrator Privileges
- Adding Help Option
- Chapter 13 : Developing a Keylogger
- Chapter 14 : Developing a Brute Force Attacker
Product information
- Title: The Complete Ethical Hacking Bootcamp: Beginner To Advanced
- Author(s):
- Release date: March 2021
- Publisher(s): Packt Publishing
- ISBN: 9781801077989
You might also like
video
Ethical Hacking Masterclass
Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean …
video
Learn Ethical Hacking From Scratch
Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side …
video
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) …
video
Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne
HackerOne is your big opportunity. This is the platform where you can hack legally and at …