DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Ethical Hacking Guild.
Table of Contents:-
Hour 1: Introduction to Hacking and Types of Hackers
1.1 What is hacking?
1.2 Types of Hackers
1.3 What is Cybercrime?
1.4 What is ethical hacking?
1.5 Do we need ethical hackers?
1.6 Legality of ethical hacking
Hour 2: Build your Kali Linux hacking environment!
2.1 Caution for Beginners: Do not be ‘that guy.'
2.2 What is Kali Linux?
Step 1: Download the software you need
Step 2: Install VMware Station Player
Step 3: Set up Kali Linux on VMware
Step 4: Install Kali Linux
Step 5: Login to Kali Linux on VMware
Hour 3: An Introduction to the Linux Terminal and CLI
3.1 The Terminal Emulator
3.2 The Shell
3.3 The Command Prompt
3.4 Executing Commands
3.4.1 Execute commands without arguments or options
3.4.2 Execute commands with arguments
3.4.3 Execute commands with options
3.4.4 Execute commands with options and arguments
3.5 More commands
Hour 4: Using Tor and VPN to Stay Anonymous Online
4.1.1 Why is a Proxy alone is not good enough for a hacker?
4.2 Anonymity and Privacy with VPN
4.2.1 Setting up VPN on Kali Linux
4.3 Tor
4.3.1 Setting up Tor Browser on Kali Linux
4.4 Combining VPN and Tor
4.4.1 Tor through VPN
4.4.2 VPN through Tor
4.5 Final Thoughts on Anonymity
Hour 5: Hacking with Nmap
5.1 Scanning Open Ports and Detecting Host OS with Nmap
5.2 Heartbleed SSL bug Scanning using Nmap on Kali Linux
5.3 Finding Live hosts with Nmap
5.4 Nmap options summary
5.4.2 Scan techniques
5.4.3 Port specification and scan order:
5.4.4 Firewall evasion and spoofing
5.4.5 Service and Version Detection
5.4.6 OS detection
Hour 6: Cracking Passwords
6.1 Cracking Passwords with John the Ripper
Step 1: Preparation
Step 2: Unshadowing password
Step 3: Crack the password with a wordlist
Step 4: Cracking a password without a wordlist
6.2 Cracking Passwords with Hydra
6.2.1 Understanding Hydra Command
6.2.2 Using Hydra on web forms
Hour 7: Using the Harvester and DMitry to Gather Information
7.1 Information Gathering Using the Harvester
7.1.1 about the Harvester
7.1.2 Installing the Harvester
7.1.3 Using theHarvester
7.1.4 More theHarvester Options
7.2 Information Gathering Using DMitry
7.2.1 Setting Up DMitry
7.2.2 Using DMitry
7.3 Conclusion
Hour 8: Using the Nessus Vulnerability Scanner in Kali
8.1 Features of Nessus
8.2 Downloading and Setting Up Nessus on Kali Linux
8.3 Initializing Nessus
8.4 Using Nessus
8.5 Conclusion
Hour 9: Wireless Hacking: Things You Should Know
9.1 Understanding Wireless Security Levels
9.2 Open Wireless Network
9.2.1 Open unrestricted
9.2.2 Open but restricted
9.3 WEP (Wired Equivalent Privacy) Wireless Networks
9.4 WPA (Wi-Fi Protected Access) Wireless Networks
9.5 Hidden Networks
9.6 What Makes WPA Networks so Secure?
Hour 10: Hacking WPA/WPA-2 Wireless Networks
10.1 Hacking WPA/WPA-2 WPS Using Reaver
10.1.1 Information Gathering
10.1.2 Hacking the Wireless Network
10.1.3 Known Issues with Reaver
10.2 Hacking WPA/WPA-2 Using Brute Force
10.2.1 What is the Hashcat Tool?
10.3 Conclusion
Hour 11: Web SQL Injection
11.1 Finding a Target Web Page
11.2 Testing a Web Page for Vulnerability
11.3 Carrying Out an SQL Attack
11.4 Exploiting the SQL Database
11.5 Conclusion
Hour 12: Executing a Remote Buffer Exploit with Python
12.1 Python for Hackers: A Shortcut into Programming
12.2 What is a Remote Buffer Overflow Exploit?
12.3 Preparation and Setup
12.4 Writing the Python Script
12.5 Executing the Remote Buffer Overflow Exploit Script
12.6 Conclusion
Comments
Post a Comment