Udemy - Advanced Ethical Hacking - Network and Web PenTesting-Part II_b
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size3.2 GB
- Uploaded Byfreecoursewb
- Downloads91
- Last checkedDec. 15th '23
- Date uploadedDec. 14th '23
- Seeders 25
- Leechers17
Infohash : 7BCEC6F55336E5A4A2E9E7F24987DC600077BDF0
Advanced Ethical Hacking: Network & Web PenTesting-Part II_b
https://DevCourseWeb.com
Published 11/2023
Created by JRDcademy Institution
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 14 Lectures ( 4h 46m ) | Size: 3.2 GB
By JRDcademy: Become an Advanced in CyberSecurity, Network & Web application Penetration Tests (Hands-on Labs)
What you'll learn
Way to get our service and products (Tools & Gift related to the course: FREE software & hardware) at our Facebook .com/JRDcademy page to excel in this course.
Working with BURPSUITE PROFESSIONAL instead of the COMMUNITY version (ranking between the 3 first best tools for PenTesting)
Labs Preparation (VirtualBox & Kali Linux installation & configuration), step-by-step guide & options to avoid provided ONLY by us & on Facebook/JRDacademy page
METASPLOIT, ARMITAGE (High-level Penetration Testing Software, find security issues, verify vulnerability mitigations & much more)
Fix Armitage Error, and Enjoy the Metasploit User Interface
Enumeration, Remote and Exploitation
Structured Query Language (SQL Injection)
Cross-site Scripting (XSS attack)
Vulnerability Scanning
Network Scanning, Nmap Scanning, Nikto, Dirb, Ettercap
Reverse Shells
Buffer Overflows, DoS Attack
Man-In-The-Middle (MITM) Attack
Privilege Escalation
Network Hacking
Wireless Hacking
Take Control Of Any Wi-Fi Network ESSID whether it is well-passworded or not
WEP/WPA/WPA2 Hole/pitfall
Interrupt the Connection of a Client's ip-address whether using WEP/WPA/WPA2 Protocols
Get the Handshake of WPA/WPA2 Protocols of a Wi-Fi ESSID
Crack Wireless WEP/WPA/WPA2 ESSID
Eavesdrop the Communication & The Reason Behind The Scene
Stealth Idle Scan
Bypass Antivirus in Windows Machine
Bypass Any Windows Login Password & Get Access To The System Administrator
Bypass Ubuntu Login Password & Get Access To The System Administrator
Bypass MacOs Login Password & Get Access To The System Administrator
Strengthen The Login Account Security Of Your Computer thrice Before Getting Access To The Admin's Screen
Essentials of CEH v10 in real-life (CEH - Certified Ethical Hacker)
Information Security
ElGamal, RSA, Diffie-Hellman (Encryption and Decription steps)
Router Hacking
Mobile Phones Hacking
Requirements
Windows or Ubuntu or MacOS host (although other OS's should work)
VirtualBox 8 GB RAM for setting up the Labs (more is better, less may cause performance issues)
Kali Linux - 2018.1-amd64 version (or 2019 versions)
Wireless Router (recommended: TP-Link 150Mbps, TL-WN727N), but any wireless router can be used to strengthen the wifi and to have another interface, which is highly needed.
BurpSuite-Pro (for live scanning & more options)
At the end, we require you to please, have DISCIPLINE. Do not try to attack what you don't own and/or what you are not allowed to. (cause you can line up in a place where you don't ever want to be --> Jail). Hack then Secure!
Files:
[ DevCourseWeb.com ] Udemy - Advanced Ethical Hacking - Network and Web PenTesting-Part II_b- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here !
- 1. Entrance.mp4 (10.2 MB)
- 10. Steganography.mp4 (205.2 MB)
- 11. Installation & Configuration of SQL_server.mp4 (234.7 MB)
- 12. SQL Injection Vulnerability.mp4 (164.4 MB)
- 13. XSS Firing Range Enumeration and Exploitation.mp4 (676.4 MB)
- 14. Bonus very short Lecture.mp4 (11.0 MB)
- 2. Introduction.mp4 (53.4 MB)
- 3. Cisco Packet Tracer Network Establishment and Security.mp4 (127.0 MB)
- 4. Cisco Packet Tracer Network Establishment included a Firewall.mp4 (570.4 MB)
- 5. DHCP in Cisco Packet Tracer - Get Hardware Address of IP Devices In A Pool.mp4 (235.5 MB)
- 6. DHCP Starvation Attack.mp4 (237.0 MB)
- 7. DHCP Snooping (The Security Part).mp4 (278.4 MB)
- 8. Firewall Detection.mp4 (231.7 MB)
- 9. GNS3 Configuration Fix on MacOS & Hands-On.mp4 (204.4 MB)
- Bonus Resources.txt (0.4 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce