Skip to main content

HACKING - GUIDE Learn Ethical Hacking Within 12 Hours!(PDF Tutorial)


DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Ethical Hacking Guild.


Table of Contents:-


Hour 1: Introduction to Hacking and Types of Hackers
1.1 What is hacking?
1.2 Types of Hackers
1.3 What is Cybercrime?
1.4 What is ethical hacking?
1.5 Do we need ethical hackers?
1.6 Legality of ethical hacking
Hour 2: Build your Kali Linux hacking environment!
2.1 Caution for Beginners: Do not be ‘that guy.'
2.2 What is Kali Linux?
Step 1: Download the software you need
Step 2: Install VMware Station Player
Step 3: Set up Kali Linux on VMware
Step 4: Install Kali Linux
Step 5: Login to Kali Linux on VMware
Hour 3: An Introduction to the Linux Terminal and CLI
3.1 The Terminal Emulator
3.2 The Shell
3.3 The Command Prompt
3.4 Executing Commands
3.4.1 Execute commands without arguments or options
3.4.2 Execute commands with arguments
3.4.3 Execute commands with options
3.4.4 Execute commands with options and arguments
3.5 More commands
Hour 4: Using Tor and VPN to Stay Anonymous Online
4.1.1 Why is a Proxy alone is not good enough for a hacker?
4.2 Anonymity and Privacy with VPN
4.2.1 Setting up VPN on Kali Linux
4.3 Tor
4.3.1 Setting up Tor Browser on Kali Linux
4.4 Combining VPN and Tor
4.4.1 Tor through VPN
4.4.2 VPN through Tor
4.5 Final Thoughts on Anonymity
Hour 5: Hacking with Nmap
5.1 Scanning Open Ports and Detecting Host OS with Nmap
5.2 Heartbleed SSL bug Scanning using Nmap on Kali Linux
5.3 Finding Live hosts with Nmap
5.4 Nmap options summary
5.4.2 Scan techniques
5.4.3 Port specification and scan order:
5.4.4 Firewall evasion and spoofing
5.4.5 Service and Version Detection
5.4.6 OS detection
Hour 6: Cracking Passwords
6.1 Cracking Passwords with John the Ripper
Step 1: Preparation
Step 2: Unshadowing password
Step 3: Crack the password with a wordlist
Step 4: Cracking a password without a wordlist
6.2 Cracking Passwords with Hydra
6.2.1 Understanding Hydra Command
6.2.2 Using Hydra on web forms
Hour 7: Using the Harvester and DMitry to Gather Information
7.1 Information Gathering Using the Harvester
7.1.1 about the Harvester
7.1.2 Installing the Harvester
7.1.3 Using theHarvester
7.1.4 More theHarvester Options
7.2 Information Gathering Using DMitry
7.2.1 Setting Up DMitry
7.2.2 Using DMitry
7.3 Conclusion
Hour 8: Using the Nessus Vulnerability Scanner in Kali
8.1 Features of Nessus
8.2 Downloading and Setting Up Nessus on Kali Linux
8.3 Initializing Nessus
8.4 Using Nessus
8.5 Conclusion
Hour 9: Wireless Hacking: Things You Should Know
9.1 Understanding Wireless Security Levels
9.2 Open Wireless Network
9.2.1 Open unrestricted
9.2.2 Open but restricted
9.3 WEP (Wired Equivalent Privacy) Wireless Networks
9.4 WPA (Wi-Fi Protected Access) Wireless Networks
9.5 Hidden Networks
9.6 What Makes WPA Networks so Secure?
Hour 10: Hacking WPA/WPA-2 Wireless Networks
10.1 Hacking WPA/WPA-2 WPS Using Reaver
10.1.1 Information Gathering
10.1.2 Hacking the Wireless Network
10.1.3 Known Issues with Reaver
10.2 Hacking WPA/WPA-2 Using Brute Force
10.2.1 What is the Hashcat Tool?
10.3 Conclusion
Hour 11: Web SQL Injection
11.1 Finding a Target Web Page
11.2 Testing a Web Page for Vulnerability
11.3 Carrying Out an SQL Attack
11.4 Exploiting the SQL Database
11.5 Conclusion
Hour 12: Executing a Remote Buffer Exploit with Python
12.1 Python for Hackers: A Shortcut into Programming
12.2 What is a Remote Buffer Overflow Exploit?
12.3 Preparation and Setup
12.4 Writing the Python Script
12.5 Executing the Remote Buffer Overflow Exploit Script
12.6 Conclusion


Comments

Popular posts from this blog

The Web Application Hackers Handbook(Full Pdf)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Advanced Penetration Testing.  This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications. If you want to learn how to run port scans, attack firewalls, or break into servers in other ways, we suggest you look elsewhere. But if you want to know how to hack into a web application, steal sensitive data, and perform unauthorized actions, this is the book for you. There is enough that is interesting and fun to say on that subject without straying into any other territory. Contents:- Chapter 1 Web Application (In)secu

Computer Security Fundamentals(3rd Edition)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about   Computer Security and this book is best for learning about Computer Security and Fundamentals of hackings. content 1 Introduction to Computer Security 2 Networks and the Internet 3 Cyber Stalking, Fraud, and Abuse 4 Denial of Service Attacks  5 Malware  6 Techniques Used by Hackers 7 Industrial Espionage in Cyberspace 8 Encryption  9 Computer Security Software  10 Security Policies  11 Network Scanning and Vulnerability Scanning  12 Cyber Terrorism and Information Warfare 13 Cyber Detective 14 Introduction to Forensics  This book is not a cookbook for hackers. You will see exactly how hackers target a system and get information about it. You will also see step-by-step instructions on how to use some password cracking utilities and some network-scanning utilities. You will also be given a reasonably in-depth exp