Companies Home Search Profile

Advanced Ethical Hacking: Network-Web PenTest-3 HandsOn_Labs

Focused View

JRDcademy Institution

4:34:52

7 View
  • 1. Entrance.mp4
    01:21
  • 2. Introduction.mp4
    03:38
  • 3. Virtualbox (Installation & Configuration).mp4
    09:46
  • 4. GoldenEye VM Enumeration and Exploitation.mp4
    35:52
  • 5. ShellShock Enumeration and Exploitation (Common Vulnerabilities & Exposures-CVE).mp4
    24:15
  • 6. Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A Users PC.mp4
    36:43
  • 7. Wordpress Enumeration and Exploitation.mp4
    07:51
  • 8. Stapler VM Enumeration and Exploitation.mp4
    27:12
  • 9. Exploitation of Apache Struts (CVE 2017).mp4
    15:32
  • 10. IMF (Impossible Mission Force) VM Enumeration and Exploitation.mp4
    48:22
  • 11. SickOS VM Enumeration and Exploitation.mp4
    26:34
  • 12. Lampiao VM Enumeration and Exploitation.mp4
    17:33
  • 13. Remote File Inclusion Attack (RFI).mp4
    14:46
  • 14. Last_but_not_least.mp4
    03:39
  • 15. Bonus very short Lecture.mp4
    01:48
  • Description


    By JRDcademy: Become an Advanced in CyberSecurity, Network & Web application Penetration Tests (Hands-on Labs)

    What You'll Learn?


    • Working with BURPSUITE PROFESSIONAL instead of the COMMUNITY version (ranking between the 3 first best tools for PenTesting)
    • Labs Preparation (VirtualBox & Kali Linux installation & configuration), step-by-step guide & options to avoid provided
    • METASPLOIT, ARMITAGE (High-level Penetration Testing Software, find security issues, verify vulnerability mitigations & much more)
    • Fix Armitage Error, and Enjoy the Metasploit User Interface
    • Enumeration, Remote and Exploitation
    • Structured Query Language (SQL Injection)
    • Cross-site Scripting (XSS attack)
    • Vulnerability Scanning
    • Network Scanning, Nmap Scanning, Nikto, Dirb, Ettercap
    • Reverse Shells
    • Buffer Overflows, DoS Attack
    • Man-In-The-Middle (MITM) Attack
    • Privilege Escalation
    • Network Hacking
    • Wireless Hacking
    • Take Control Of Any Wi-Fi Network ESSID whether it is well-passworded or not
    • WEP/WPA/WPA2 Hole/pitfall
    • Interrupt the Connection of a Client's ip-address whether using WEP/WPA/WPA2 Protocols
    • Get the Handshake of WPA/WPA2 Protocols of a Wi-Fi ESSID
    • Crack Wireless WEP/WPA/WPA2 ESSID
    • Eavesdrop the Communication & The Reason Behind The Scene
    • Stealth Idle Scan
    • Bypass Antivirus in Windows Machine
    • Bypass Any Windows Login Password & Get Access To The System Administrator
    • Bypass Ubuntu Login Password & Get Access To The System Administrator
    • Bypass MacOs Login Password & Get Access To The System Administrator
    • Strengthen The Login Account Security Of Your Computer thrice Before Getting Access To The Admin's Screen
    • Essentials of CEH v10 in real-life (CEH - Certified Ethical Hacker)
    • Information Security
    • ElGamal, RSA, Diffie-Hellman (Encryption and Decription steps)
    • Router Hacking
    • Mobile Phones Hacking

    Who is this for?


  • Anyone who starves into learning hacking and security.
  • Penetration Testers
  • Cyber Security Analysts
  • Cryptographers
  • Cryptologists
  • Cyber Security Students who want to become an advanced PenTester
  • Aspiring Cyber Security Analysts
  • Pentest Candidates
  • CEH/OSCP Candidates
  • What You Need to Know?


  • Windows or Ubuntu or MacOS host (although other OS's should work)
  • VirtualBox 8 GB RAM for setting up the Labs (more is better, less may cause performance issues)
  • Kali Linux - 2018.1-amd64 version (or 2019 versions)
  • Wireless Router (recommended: TP-Link 150Mbps, TL-WN727N), but any wireless router can be used to strengthen the wifi and to have another interface, which is highly needed.
  • BurpSuite-Pro (for live scanning & more options)
  • At the end, we require you to please, have DISCIPLINE. Do not try to attack what you don't own and/or what you are not allowed to. (cause you can line up in a place where you don't ever want to be --> Jail). Hack then Secure!
  • More details


    Description

    This course is all about Ethical Hacking and Security, which needs some Professional tools to proceed with, such as burpsuite_Pro for example.

    • This course covers syllabus of CEH v10 Certified Ethical Hacker version 10, mainly the Network activities, and some frequent web application vulnerabilities. Course has been designed in a way so that any novice, (from Zero level) to the advanced level of people in cyber security field can easily understand and can be well-benefited. As it is a step-by-step process, from zero to high level, we encourage you to try to understand exclusively the part one; then after, jump into the next parts to get what you need to know about cryptology, network establishment, firewall, hacking, eavesdrop, empower the security, etc...(as if you were sitting in a Master & PhD cryptology classroom).

      Therefore, after completing our courses (parts 1 - 4), you will meet with the most used encryption techniques, methods used to mitigate the probability of being hacked by Black-Hat hackers.

      -The most recent ways of hacking into a wireless network, no matter what protocols the Wifi was set with by its administrator. Furthermore, no matter how strong the Wifi password is, so that we dupe someone's network. We explain the reasons behind the scene of such attacks. Exploitation of the existed holes that the most used Operating Systems contain, such as (Linux based, Windows, Mac OS, Android)

    • We deeply explain why RSA is that so strong and why it is highly used in real-life cybersecurity, as well as AES encryption.

    • Most Well-known Encrypting Algorithms, such as ElGamal, RSA, Diffie-Hellman, and so on forth (Encryption and Decryption steps) are well described. It is crucial for cybersecurity engineers in Master and in PhD classes.

    • Note:
      In this course, we supply to you not only videos for the practice, but also we provide a light text file for each part of the tutorial which is exclusively self-explanatory (a step-by-step process) so that we make it easier to learn according to the obligations that you might face while you want to continue with your practice.

    • Example of a situation: you might need to continue with your tutorial where you are at a specific place, and don't want to disturb anybody while you forgot your earphone/headphone.

    Who this course is for:

    • Anyone who starves into learning hacking and security.
    • Penetration Testers
    • Cyber Security Analysts
    • Cryptographers
    • Cryptologists
    • Cyber Security Students who want to become an advanced PenTester
    • Aspiring Cyber Security Analysts
    • Pentest Candidates
    • CEH/OSCP Candidates

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    JRDcademy Institution
    JRDcademy Institution
    Instructor's Courses
    (Always make sure to check our Facebook page or our website if you need to know more about us and tools we provide. No login, nor registration is needed to view the posts). IT Trainor, PenTester & Consultant:Strongly motivated when it comes to Ethical Hacking, network, web applications and security. Field: Cybersecurity (Cryptology)Skills:- Advanced knowledge in Kali Linux- Network troubleshooting problems. Packets sniffing, scanning network, scanning web application using BurpSuite and Nmap/Zenmap tools, and so many others.- Good understanding of Linux (Ubuntu, Kali), Windows, Mac operating system. - Firewall establishment, Firewall hole, Bypass Firewall- Advanced level of Penetration testing for detecting possible vulnerabilities.- Good knowledge of Trojan, DOS, DDOS, Attacking Network/website, Securing Network/website, Cyber roam,  Foot printing tools, Enumerations, System Hacking, Ways for eavesdropping network communication, Password Cracking- In cryptography area, a very well-understanding of how AES, RSA, Diffie-Hellman, DSA, ECDSA, ElGamal work and the importance of Prime numbers.- Java programming language is our first language we mostly used at work.Personal note:Eager, always ready to learn new techniques to detect vulnerabilities.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 15
    • duration 4:34:52
    • Release Date 2024/02/09