Certified Ethical Hacker Practical hands on Labs (CEHv12)

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size3.1 GB
  • Uploaded Bytutsnode
  • Downloads181
  • Last checkedJun. 24th '23
  • Date uploadedJun. 24th '23
  • Seeders 66
  • Leechers53

Infohash : 9372EAAF33C960A1D79B832E8B23C3062DEFBE40


Description

CEHV12 Practical Complete Training with Free Resources and Challenges

Welcome to the comprehensive and complete practical course on CEH Practical Certification Preparation. In this course, you will embark on an exciting journey to master ethical hacking techniques, specifically tailored to help you succeed in the Certified Ethical Hacker (CEH) practical labs exam. The course provides step-by-step instructions to set up your own hacking lab for practising labs for CEH. You will also be presented with hands-on challenges on free platforms like Try hack me and Hack the Box that will solidify your hacking skills.

Learning Objectives:

Gain In-Depth Knowledge of Ethical Hacking: Understand the fundamentals of ethical hacking, including various hacking methodologies, reconnaissance techniques, vulnerability assessment, and system exploitation.
Master CEH Practical Lab Concepts: Acquire a deep understanding of the CEH practical lab environment, tasks, and challenges.
Develop Practical Skills: Engage in hands-on exercises to enhance your practical skills in penetration testing, vulnerability identification, network scanning, and more.
Explore Advanced Techniques: Discover advanced hacking techniques such as privilege escalation, password cracking, reverse engineering, and social engineering.
Strengthen Cybersecurity Awareness: Learn about the latest cybersecurity threats, attack vectors, and mitigation strategies to protect systems and networks effectively.

Course Highlights:

Thorough Coverage of CEH Practical Labs: This course provides comprehensive coverage of the CEH practical lab scenarios, ensuring you are well-prepared to tackle the challenges. There are also some free resources provided to challenge yourself and solidify your concepts.
Hands-On Labs: Dive into real-world, hands-on lab exercises to practice ethical hacking techniques in a controlled environment.
Step-by-Step Guidance: Receive step-by-step guidance and explanations for each lab exercise, enabling you to understand the underlying concepts and techniques thoroughly.
Interactive Learning Experience: Engage in interactive activities, quizzes, and challenges to reinforce your understanding and knowledge retention.
Up-to-Date Content: Stay current with the latest trends, tools, and methodologies in ethical hacking, ensuring you are well-equipped to tackle contemporary cybersecurity challenges.
Practical Tips and Tricks: Discover valuable tips, tricks, and best practices from industry professionals to enhance your efficiency and effectiveness in ethical hacking.

Course Syllabus: Module 1: Introduction to CEH Course

Course Intro
Introduction to CEH practical labs environment

Module 2: Basic Lab Setup

Installing Parrot OS on VMWARE
Install Kali Linux in a virtual environment
Virtualize a vulnerable environment with metasploitable

Module 3: Footprinting and Reconnaissance

Subdomain and VHOST Enumeration
Certificates and DNS Enumeration

Module 4: Scanning and Enumeration

Identifying live hosts
Service and OS discovery
Enumerating different services

Module 5: System Hacking

Scanning a vulnerable target
Exploitation and Post Exploitation
Exploiting different services like FTP, SMB etc
Complete hacking methodology

Module 6: Steganography

Alternate data streams
Image and white space Steganography

Module 7: Hacking Web Applications

Complete DVWA Walkthrough
Brute forcing and SQL Injection
WordPress hacking

Module 8: Network traffic analysis with Wireshark

Analyse DOS and DDOS attack
Extracting credentials
Analyse IoT traffic

Module 9: Hacking Mobile Platforms

Metasploit and Meterpreter hacking phones
Phonesploit tutorial

Module 10: Wireless Network Hacking

Assessing wireless network security
Cracking WEP/WPA/WPA2 encryption

Module 11: Cloud Security

Enumeration S3 Buckets
Exploiting cloud Misconfigurations

Module 12: Cryptography

Techniques to hash data and files
Encryption and decryption tools

By the end of this course, you will possess the knowledge, skills, and confidence necessary to excel in the CEH practical labs and pursue a successful career in ethical hacking and cybersecurity.

Enrol now and embark on your journey to becoming a proficient Ethical Hacker.

Notes:

This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test. The instructor is not linked to any tool or service mentioned in the course in any capacity.

Who this course is for:

Students aiming to pass the EC-Council Certified Ethical Hacker (CEH) Practical exam.
Cybersecurity enthusiasts interested in enhancing their skills and knowledge
Beginners White Hat Hackers and Pentesters looking to learn practical hacking and pentesting
Anybody interested in learning ethical hacking / penetration testing
Ethical Hacking professional who are looking for more practical stuff

Requirements

PC or Laptop with 4GB (8GB Recommended) RAM
No Programming or Linux Skills Required. We teach you from scratch!

Last Updated 6/2023

Files:

Certified Ethical Hacker (CEHv12) Practical hands on Labs [TutsNode.net] - Certified Ethical Hacker (CEHv12) Practical hands on Labs 5. System Hacking
  • 7. Hacking Windows Challenge (Blue THM Free Room).mp4 (142.9 MB)
  • 3. Scanning Networks.mp4 (89.6 MB)
  • 9.1 THM Services FTP exploitation.pdf (415.3 KB)
  • 11. SMB Exploitation.mp4 (83.9 MB)
  • 13. Telnet Exploitation.mp4 (68.7 MB)
  • 14. Redis Database Exploitation (Optional) - HTB Redeemer.mp4 (64.7 MB)
  • 9. FTP Exploitation.mp4 (59.1 MB)
  • 8. Setting up Hack the Box and Crack Meow Machine.mp4 (56.9 MB)
  • 6. Post Exploitation.mp4 (56.5 MB)
  • 10. FTP Exploitation Challenge 1 - HTB Fawn.mp4 (56.5 MB)
  • 12. SMB Exploitation Challenge - HTB Dancing.mp4 (48.4 MB)
  • 2. Introduction to Metasploit and Windows 10 Hacking Demo.mp4 (47.0 MB)
  • 2.1 Intro to Metasploit and Windows 10 Hacking Demo.pdf (521.0 KB)
  • 4.1 Vulnerability Assessment.pdf (519.5 KB)
  • 11.1 THM Services SMB exploitation.pdf (673.1 KB)
  • 13.1 Telnet exploitation.pdf (381.7 KB)
  • 6.1 Post Exploitation - Windows 10 Hacking revisited.pdf (305.7 KB)
  • 5.1 Exploitation.pdf (371.6 KB)
  • 4. Vulnerability Assessment.mp4 (31.2 MB)
  • 5. Exploitation.mp4 (26.4 MB)
  • 1. Introduction to Module.mp4 (15.6 MB)
  • 3.1 Scanning Networks.pdf (1.4 MB)
8. Packet Analysis with Wireshark
  • 2.1 ftp.pcap (8.9 KB)
  • 3.1 mqtt_packets.pcapng (2.2 KB)
  • 1. Detect DDOS attack with Wireshark.mp4 (44.9 MB)
  • 3. Detect IoT traffic.mp4 (36.7 MB)
  • 2. Credentials extraction from Wireshark.mp4 (31.9 MB)
  • 1.1 pkt.TCP.synflood.spoofed.pcap (2.8 MB)
10. Wifi Hacking
  • 5. Cracking WIFI passwords with hashcat.mp4 (135.4 MB)
  • 5.1 Cracking handshakes with Hashcat.pdf (575.8 KB)
  • 2. Crack Wifi with Aircrack.mp4 (71.3 MB)
  • 3.1 Capturing Handshakes with Hcxdumptool.pdf (539.7 KB)
  • 6.1 GUI Based Automated Wifi cracking.pdf (693.5 KB)
  • 4.1 Preparing captured Handshakes for Cracking.pdf (693.4 KB)
  • 4. Preparing captured Handshakes for Cracking.mp4 (40.2 MB)
  • 1.1 Introduction to Wifi Hacking.pdf (514.2 KB)
  • 6. Cracking Wifi Passwords with FERN.mp4 (35.6 MB)
  • 3. Capturing Handshakes with Hcxdumptool.mp4 (31.1 MB)
  • 1. Introduction to Wifi Hacking.mp4 (25.3 MB)
  • 2.1 Hacking Wifi Networks with Aircrack suite.pdf (949.1 KB)
7. Hacking Web Applications and Web Servers
  • 7. Brute Forcing Web Applications Passwords with Burp and Hydra.mp4 (123.5 MB)
  • 8. Brute Forcing Challenge (Brute it THM Free Room).mp4 (106.5 MB)
  • 1.1 Installing DVWA on Kali Linux.pdf (541.1 KB)
  • 13. Hacking Wordpress Websites with WPscan.mp4 (65.1 MB)
  • 2.1 Installing DVWA on Windows.pdf (791.2 KB)
  • 6. File Upload Vulnerabilities.mp4 (62.9 MB)
  • 5. Command Execution Challenge (Pickle Rickle THM Free Room).mp4 (60.7 MB)
  • 11.1 SQL Injection DVWA Medium - High.pdf (955.2 KB)
  • 10. SQL Injection Vulnerabilities -1.mp4 (43.5 MB)
  • 3. Command Execution Vulnerabilities - Linux.mp4 (39.9 MB)
  • 12. SQL Injection Challenge (SQLMAP THM Free Room).mp4 (39.5 MB)
  • 9. Chaining Multiple Vulnerabilities (Command Injection + File Upload).mp4 (39.1 MB)
  • 2. Install DVWA on Windows.mp4 (36.6 MB)
  • 4.1 Command Execution on DVWA - windows.pdf (329.7 KB)
  • 1. Install DVWA on Kali.mp4 (31.0 MB)
  • 11. SQL Injection Vulnerabilities -2.mp4 (29.7 MB)
  • 4. Command Execution Vulnerabilities - Windows.mp4 (22.1 MB)
  • 10.1 SQL Injection DVWA Low- Medium.pdf (4.9 MB)
  • 6.1 File Upload on DVWA.pdf (4.2 MB)
  • 9.1 File Upload high on DVWA.pdf (3.5 MB)
  • 3.1 Command Execution on DVWA.pdf (2.2 MB)
  • 7.1 Brute forcing on DVWA.pdf (1.1 MB)
12. Cryptography
  • 5.1 Hash calculators on windows.pdf (485.8 KB)
  • 6.1 Cryptanalysis with Cryptool.pdf (356.8 KB)
  • 1.1 Disk Encryption using Veracrypt.pdf (531.6 KB)
  • 1. Disk Encryption Using Veracrypt.mp4 (43.4 MB)
  • 4.1 Encoding Text with BC Text Encoder.pdf (306.7 KB)
  • 2.1 File and Text Encryption using Cryptoforge.pdf (476.3 KB)
  • 5. Calculating Hashes on Windows with different tools.mp4 (35.7 MB)
  • 3. File encryption using Advanced encryption package.mp4 (27.6 MB)
  • 2. File and Text Message Encryption using Cryptoforge.mp4 (25.1 MB)
  • 6. Cryptanalysis using Cryptool.mp4 (15.6 MB)
  • 4. Encrypt and Decrypt data using BCtextEncoder.mp4 (14.7 MB)
3. Footprinting and Reconnaissance
  • 1. Dir Busting and Vhost Enumeration - Web.mp4 (98.1 MB)
  • 4. DNS Footprinting and Enumeration.mp4 (96.7 MB)
  • 2. Subdomain Enumeration Challenge (Takeover THM free room).mp4 (66.4 MB)
  • 1.1 Directory Busting and VHOST Enumeration.pdf (411.9 KB)
  • 3. Passive Reconnaissance with Digital Certificates.mp4 (36.4 MB)
  • 3.1 Digital certificates.pdf (377.8 KB)
  • 4.1 DNS Enumeration.pdf (2.4 MB)
2. Basic Lab Setup
  • 4.1 Setting up Metasploitable.pdf (810.3 KB)
  • 2. Install Kali Linux on VMWARE (Optional).mp4 (65.9 MB)
  • 1.1 2.5 Installing Parrot OS on Vmware.pdf (441.6 KB)
  • 3.1 Use Prebuilt Kali Linux on Vmware.pdf (429.8 KB)
  • 1. Install Parrot OS on VMWARE.mp4 (31.3 MB)
  • 2.1 Installing Kali Linux on Vmware.pdf (370.7 KB)
  • 4. Setup Metasploitable 2 on VMWARE.mp4 (30.6 MB)
  • 3. Use Prebuilt Kali Linux on VMWARE.mp4 (25.0 MB)
4. Scanning and Enumeration
  • 3.1 Netbios Enumeration.pdf (235.7 KB)
  • 4.1 Smb Enumeration.pdf (288.7 KB)
  • 1. Identifying Live Hosts.mp4 (45.4 MB)
  • 2. Service and OS Discovery.mp4 (38.0 MB)
  • 4. SMB Enumeration.mp4 (33.2 MB)
  • 3. NetBios Enumeration.mp4 (22.8 MB)
  • 2.1 Service and OS Discovery.pdf (1.2 MB)
  • 1.1 Host Discovery.pdf (1,018.0 KB)
11. Cloud Security
  • 1. Enumerating S3 Buckets.mp4 (78.4 MB)
  • 2.1 2. Exploiting S3 unauthenticated.pdf (617.7 KB)
  • Code:

    • udp://open.stealth.si:80/announce
    • udp://tracker.tiny-vps.com:6969/announce
    • udp://fasttracker.foreverpirates.co:6969/announce
    • udp://tracker.opentrackr.org:1337/announce
    • udp://explodie.org:6969/announce
    • udp://tracker.cyberia.is:6969/announce
    • udp://ipv4.tracker.harry.lu:80/announce
    • udp://tracker.uw0.xyz:6969/announce
    • udp://opentracker.i2p.rocks:6969/announce
    • udp://tracker.birkenwald.de:6969/announce
    • udp://tracker.torrent.eu.org:451/announce
    • udp://tracker.moeking.me:6969/announce
    • udp://tracker.dler.org:6969/announce
    • udp://9.rarbg.me:2970/announce