About this course
Introduction:
This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, break down the different penetration testing fields and install the needed software (on Windows, Linux, and Mac OS X), then we'll dive and start hacking straight away. You'll learn everything by example, by analyzing and exploiting different systems such as networks, servers, clients, websites. We'll never have any boring dry theoretical lectures
Objectives:
§ Start from 0 up to a high-intermediate level.
§ Learn about ethical hacking, its fields & the different types of hackers.
§ Install a hacking lab & needed software (on Windows, OS X, and Linux).
§ Hack & secure both WiFi & wired networks.
§ Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
§ Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc
§ Discover vulnerabilities & exploit them to hack into servers.
§ Hack secure systems using client-side & social engineering.
§ Secure systems from all the attacks shown.
§ Install & use Kali Linux - a penetration testing operating system.
§ Learn linux basics.
§ Learn linux commands & how to interact with the terminal.
§ Learn Network Hacking / Penetration Testing
§ Network basics & how devices interact inside a network.
§ Run attacks on networks without knowing its key.
§ Control Wi-Fi connections without knowing the password.
§ Create a fake Wi-Fi network with internet connection & spy on clients.
§ Gather detailed information about networks & connected clients like their OS, ports.
§ Crack WEP/WPA/WPA2 encryptions using a number of methods.
§ ARP Spoofing / ARP Poisoning.
§ Launch various Man In The Middle attacks.
§ Access any account accessed by any client on the network.
§ Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
§ Intercept network traffic & modify it on the fly.
§ Discover devices connected to the same network.
Course Outlines:
§ What is hacking
§ Ethical hacking
§ Exploiting a Webcam's Internet Connectivity
§ Gaining Access Via Trojans
§ Hacking Lab
§ BEST Operating System (OS) for Hacking
§ VMware
§ Installing Kali Linux as a VM on Windows
§ Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon)
§ Kali linux basic
§ Basic Linux Commands
§ Intermediate Commands
§ network penetration testing
§ how networks work and how devices communicate with each other.
§ Computer network types
§ Network topology
§ Connect a Wireless Adapter to Kali Linux Virtual Machine (VirtualBox
§ What is MAC Address & How To Change It
§ Wireless modes – managed and monitor
§ how to correctly enable monitor mode on your wireless card.
§ Packet Sniffing Basics
§ How does packet sniffing work?
§ WiFi frequency bands
§ Difference b/w 2.4 GHz WiFi and 5 GHz WiFi
§ Targeted Packet Sniffing
§ deauthentication attack
§ Gaining Access WEP
§ how to break WEP/WPA/WPA2 encryption and determine the network key
§ weaknesses in WEP encryption
§ basics of cracking WEP encryption
§ WiFi Password Hacker (WEP Cracking) Tools
§ How to Secure wireless networks
§ Fake authentication attack
§ ARP request replay attack
§ WAP encryption
§ Handshake theory
§ Capturing the handshake
§ Creating a Wordlist
§ Wordlist cracking
§ Securing network from attacks
§ Major Security Concerns With Consumer Routers
§ Configuring Wireless Settings for Maximum Security
§ Post-Connection Attacks
§ Netdiscover
§ Zenmap
§ Installing Windows 10 in a Virtual Machine
§ VirtualBox Installation
§ Man-in-the-Middle Attacks
§ ARP spoofing using arpspoof
§ ARP spoofing using MITMf
§ How to install bettercap 2 in Kali Linux
§ Download and install the latest version of bettercap
§ How to use bettercap
§ How to run spoofing and sniffing in bettercap
§ capturing passwords with wireshark
§ Bypassing HTTPS
§ DNS Spoofing
§ Injecting JavaScript Code to Manipulate Websites Automatically
§ Wireshar
§ Capturing data packets on Wireshark
§ Wireshark filters
§ Sniffing the network using Wireshark
§ fake Access point
§ Creating a fake Access Poin
§ detecting ARP poisoning
§ preventing ARP poisoning
§ Detecting suspicious Activities In The Network
§ Prevention of Man in the Middle attack (MITM)
§ How Does a VPN Prevent Man-in-the-Middle Attacks?
§ Gaining access to computers
§ Server-side attacks
§ Server-side attack basics
§ Metasploit basics
§ Exploiting a Code Execution Vulnerability
§ Installing MSFC
§ MSFC scan
§ MSFC analysis
§ Installing Nexpose
§ Nexpose Scan
§ Nexpose analysis
§ Client-side attacks
§ Installing Veil
§ Overview of Payloads
§ Generating a Veil backdoor
§ Listening for connections
§ Testing the backdoor
§ Fake bdm1 Update
§ Protecting against delivery methods
§ Introduction to Social Engineering
§ Types of Social Engineering Attacks
§ How to Solve anySocial Engineering Attack
§ Maltego
§ How to Research and Locate Your Audience Using Social Media
§ Embedding backdoor into PDF files
§ How I created a Trojan Malware
§ Spoofing ‘.exe’ extension to any extension
§ Spoofing Emails
§ BeEF
§ Building Your Own Hooks
§ Using a Custom Hook
§ Detect and Remove Trojan Virus
§ Post exploitation Introduction
§ Basic of Meterpreter
§ Filesystem commands
§ Methods to Maintain access
Who should attend?
§ Anybody interested in learning ethical hacking / penetration testing
§ Anybody interested in learning how hackers hack computer systems
§ Anybody interested in learning how to secure systems from hackers
Learning Outcomes:
§ Start from 0 up to a high-intermediate level.
§ Learn about ethical hacking, its fields & the different types of hackers.
§ Install a hacking lab & needed software (on Windows, OS X, and Linux).
§ Hack & secure both WiFi & wired networks.
§ Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
§ Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap.....etc
§ Discover vulnerabilities & exploit them to hack into servers.
§ Hack secure systems using client-side & social engineering.
§ Secure systems from all the attacks shown.
§ Install & use Kali Linux - a penetration testing operating system.
§ Learn linux basics.
§ Learn linux commands & how to interact with the terminal.
§ Learn Network Hacking / Penetration Testing
§ Network basics & how devices interact inside a network.
§ Run attacks on networks without knowing its key.
§ Control Wi-Fi connections without knowing the password.
§ Create a fake Wi-Fi network with internet connection & spy on clients.
§ Gather detailed information about networks & connected clients like their OS, ports.
§ Crack WEP/WPA/WPA2 encryptions using a number of methods.
§ ARP Spoofing / ARP Poisoning.
§ Launch various Man In The Middle attacks.
§ Access any account accessed by any client on the network.
§ Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
§ Intercept network traffic & modify it on the fly.
§ Discover devices connected to the same network.