Advanced Ethical Hacking: Hands-On Training
- Description
- Curriculum
- FAQ
- Reviews
Master Ethical Hacking, Bug Bounty, and Reverse Engineering with Hands-On Training & Real-World Attacks
Are you ready to take your ethical hacking skills to the next level? This ethical hacking course is designed for those who want to go beyond the basics and gain hands-on experience in reverse engineering and advanced penetration testing techniques. Whether you’re an aspiring security professional, penetration tester, or bug bounty hunter, this course provides in-depth training to help you identify and exploit vulnerabilities like a pro.
What You Will Learn:
-
Advanced ethical hacking techniques used by security professionals
-
Bug bounty hunting strategies to find and report security flaws
-
Ethical hacking reverse engineering to analyze and modify software and applications
-
Exploiting and securing web applications, APIs, and network infrastructures
-
Advanced penetration testing techniques, including post-exploitation methods
-
Bypassing firewalls, IDS/IPS systems, and other security defenses
-
Real-world case studies on ethical hacking and vulnerability exploitation
-
Using tools like Kali Linux, Metasploit, Burp Suite, Wireshark, and more
Who Is This Course For?
-
Cybersecurity professionals looking to enhance their ethical hacking skills.
-
Bug bounty hunters who want to maximize their bug bounty potential
-
Developers who want to secure their applications from real-world attacks
-
Security enthusiasts eager to learn ethical hacking reverse engineering
-
Anyone interested in advanced penetration testing and cybersecurity research
Why Take This Course?
-
Hands-on training with real-world attack scenarios
-
Covers key ethical hacking and reverse engineering concepts
-
Step-by-step guidance to help you master advanced security techniques
-
Learn from industry experts with experience in penetration testing and cybersecurity
By the end of this course, you will have the expertise to conduct advanced ethical hacking, perform bug bounty research, and apply reverse engineering techniques to analyze vulnerabilities.
Take your cybersecurity skills to the next level—enroll and start mastering advanced ethical hacking today!
-
2Video - Section 2 OverviewVideo lesson
A short overview video of the expectations for building your virtual lab environment using VirtualBox.
-
3Video - Downloading ISO and OVA Files for VirtualBoxVideo lesson
In this short video, you will learn how to easily download ISO and OVA files used in the course.
-
4Video and Lab -Creating a Virtual install of Kali using VirtualBoxVideo lesson
In this lab, you will learn how to create a virtual install of Kali Linux which will be your main attack platform used in this course.
-
5Video and lab - Create a virtual install of Metasploitable2Video lesson
In this lab, you will learn how to create a virtual install of Metasploitable2 which will be used as a target.
-
6Video - Spoofing Your Browser to Get Access to Windows 10 ProVideo lesson
-
7Video and Lab - Create a Virtual Install of Windows 10 Pro - 2024Video lesson
In this short lab, you will learn how to create a Windows 10 target machine needed for this course.
-
8Video and Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VBVideo lesson
In this short lab, you will learn how to create a Windows 7 Pro target machine needed for this course.
-
9Video - Installing the VirtualBox Extension PackVideo lesson
In this lab, you will learn how to import the extension pack for VirtualBox. The extension pack extends the capabilities of VirtualBox.
-
10Video - Adding a NAT Network in VirtualBox 7.0.2Video lesson
From time to time, Virtualbox will not have a network available for some network types. In this video, we see how this can be easily fixed.
-
11Video - Fix Duplicate IP Address Issue With VirtualBoxVideo lesson
When configuring two or more devices to use the same network type, you may encounter an issue with VirtualBox issuing the same IP address to both devices This is an easy fix.
-
12Video and Lab - Installing the WebMap-Nmap DashboardVideo lesson
In this lab, you will learn how to use the WebMap Nmap Dashboard application to generate a PDF report of your Nmap scan results.
-
13Video and Lab – Automated Recon/Enumeration Using nmapAutomatorVideo lesson
In this video and lab, you will learn how to conduct an automated recon/enumeration scan using nMapAutomator.
-
14Video - Creating a Vulnerable Windows 10 TargetVideo lesson
An out-of-the-box Windows 10 virtual machine as part of a lab environment for practicing pentesting is a tough nut to crack. What makes a Windows 10 machine vulnerable are weak folder permissions, vulnerable software, weak passwords, and vulnerable services, just to name a few.
Before we can get to the fun stuff of exploiting our Windows 10 target, we need to enumerate and find as many possible avenues as possible for privilege escalation.
In this short video, you will learn how to download a ready make batch file that will make your Windows 10 target machine vulnerable to privilege escalation.
Download location for the needed lpe_windows_setup.bat batch file: https://github.com/sagishahar/lpeworkshop
-
15Video and Lab Enumerating Windows 10 Using WinPEASVideo lesson
In this lesson, you will learn how to perform an automated enumeration of a vulnerable Windows 10 target using WinPeas looking for ways to elevate privileges.
-
16Video and Lab - Create a Windows Reverse Shell Using the PowerShellVideo lesson
In this short video, you will learn how to use Powershell to quickly copy files and create a reverse shell using PowerCat.
-
17Video and Lab – Create a Reverse Shell Using Command InjectionVideo lesson
In this short video and lab, you will learn how to establish a reverse shell using command injection.
-
18Video and Lab - Create a Reverse Shell Using a File UploadVideo lesson
In this lab, you will learn how to create a reverse shell using a file upload vulnerability.
-
19Video and Lab - Launch an Automated Meterpreter SessionVideo lesson
In this lesson, you will learn how to spawn a Meterpreter session on a Windows 7 Pro machine by creating an automated resource script file to launch within Metasploit.
-
20Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH ShellVideo lesson
In this short video and lab, you will learn how to upgrade a dumb terminal to a fully functional BASH shell.
-
21Video and Lab - Windows 7 Privilege Escalation Using UAC BypassVideo lesson
In this lesson, we will learn how to perform privilege escalation on a Microsoft Windows machine using the Metasploit UAC bypass module.
-
22Video and Lab - Creating a Persistent Backdoor Using a Persistent ServiceVideo lesson
In this short lab, you will learn how to use Metasploitable2 to create a persistent connection with a Windows 7 Pro machine.
-
23Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBoxVideo lesson
In this lab, you will learn how to create a virtual full install of Server 2016 with GUI.
-
24Video and Lab - Preparing Your Server 2016 TargetVideo lesson
In this lab, you will learn how to prepare a Server 2016 install for promotion to a domain controller.
-
25Video and Lab - Promote Server 2016 to a Domain ControllerVideo lesson
In this lab, you will learn how to promote Server 2016 to a domain controller.
-
26Video and Lab - Installing PowerShell Empire StarKiller On Kali LinuxVideo lesson
In this lesson, you will be shown how to install PowerShell Empire on Kali Linux 2021.1. When it comes to PowerShell Empire, not all installation packages are created equal.
-
27Video and Lab - Enumerating Active DirectoryVideo lesson
In this lesson, we take a look inside Active Directory using PowerShell Empire. PowerShell Empire has a number of post-exploitation modules.
-
28Video and Lab - Post-Exploitation of Windows Using PowerShell EmpireVideo lesson
In this lab, you will learn how to perform post-exploitation tasks against a Windows PC.
-
29Video and Lab – Advanced Password Hacking with MetasploitVideo lesson
Continuing with post-exploitation, we look at how we can use the advanced password hacking capability of Metasploit.
-
30Video and Lab – Post-Exploitation of Microsoft WindowsVideo lesson
In this lesson, you will learn how to perform post-exploitation of a Microsoft Windows target using Metasploit.
-
31Video and Lab – Brute Force the SMB Password on a Windows ServerVideo lesson
In this lab, you will learn how to brute force the SMB password from a Windows Server configured as a domain controller.
-
32video and Lab - Enumerating Active Directory Using RPCClientVideo lesson
This is the follow-up lab for Brute Forcing the SMB Password For a Windows Server. The previous lab is a prerequisite for this lab. In this lesson, you will learn how to enumerate Active Directory using RPCClient.
-
33Video and Lab - Dumping Wi-Fi Credentials Using netshVideo lesson
In this lesson, you will learn how to capture the authentication password for a wireless network a target machine successfully authenticated to in the past.
-
34Video and Lab - File Transfer Using HTTP and PowerShell’s WebClient Object.docxVideo lesson
-
35Video and Lab - Quickly Transfer Files Using PythonVideo lesson
In this short video, you will learn how to use Python to quickly and easily transfer files from a staging server to any machine on the network.
-
36Video and Lab - HTML Smuggling AttackVideo lesson
HTML Smuggling is an evasive payload delivery method that helps an attacker smuggle payload past content filters and firewalls by hiding malicious payloads inside seemingly benign HTML files.
-
37Video and Lab - Heartbleed OpenSSL Exploit VulnerabilityVideo lesson
In this lab, you will learn about the Heartbleed vulnerability. Heartbleed is a vulnerability that came to light in April of 2014; it allowed attackers unprecedented access to sensitive information and was present on thousands of web servers, including those running major sites like Yahoo.
-
38Video and Lab - Performing an RDP Brute Force AttackVideo lesson
In this lesson, you will learn how to exploit RDP running on a remote target using a brute force attack.
-
39Video and Lab – Exploiting Active Directory using LLMNR/NBT-NS PoisoningVideo lesson
In this lesson, you will see how we can easily capture the username and the hashed credentials for the member of a Microsoft Windows domain using Responder.
-
40Video and Lab - Accessing Kali Across the WAN with NGROKVideo lesson
In this lab, you will learn how to access Kali Linux across the WAN using NGROK.
-
41Video and Lab - Pentesting with NetcatVideo lesson
In this lesson, you will learn how to perform some basic pentesting tasks and establish a reverse shell using Netcat.
-
42Video and Lab - Enumerate DNS Records Using DNSReconVideo lesson
In this lab, you will learn how to perform active information gathering of DNS records using DNSRecon.
-
43Video and Lab - Gathering Information Using Recon-ngVideo lesson
This lab focuses on gathering information using Recon-ng. Students learn about the fundamentals of using Recon-ng for reconnaissance and information gathering in a cybersecurity context. This lab provides hands-on experience with a key cybersecurity tool, enhancing students' practical skills in digital reconnaissance and data analysis.
-
44Video and Lab – How to Appear Tech Savvy…Even if You're NotVideo lesson
Those of us born with a face made for radio have learned how to fake it until we make it, and that is what this lab is all about.
-
45Video and Lab - Installing a Wireless Adapter in KaliVideo lesson
In this video and lab, you will learn how to install a wireless adapter using Kali Linux.
-
46Video and Lab - Hacking a Wireless Network Using Kali LinuxVideo lesson
In this lab, you will learn how to audit a wireless network for weak authentication.
-
47Video and Lab - Wireless Deauthentication AttackVideo lesson
In this short video and lab, you will learn how to quickly deauthenticate a wireless user or device connected to a specific wireless access point or router.
-
48Video and Lab - PMKID Client-less Wireless Attack Using BettercapVideo lesson
In this short video and lab, you will learn how to use the wireless attack framework, Bettercap to capture the passphrase of an access point by decrypting the PMKID passphrase.
-
49Solved! Missing the hcxdumptool & hcxpcaptool in KaliVideo lesson
This video is to accompany the PMKID Clientless Wireless Audit Using Bettercap video and lab. Since this lab was first published, the latest version of Kali no longer has the hcxdumptool & hcxpcaptool. There may also be issues with missing dependencies. Use the following commands to fix both issues.
apt-get update
apt-get install libcurl4-openssl-dev libssl-dev zlib1g-dev libpcap-dev
and after....... Clone hcxtools from github and compile the binaries:
git clone https://github.com/ZerBea/hcxtools.git cd hcxtools
sudo make && sudo make install
Clone hcxdumptool and compile the binaries:
git clone https://github.com/ZerBea/hcxdumptool.git cd hcxdumptool/
sudo make && sudo make install
-
50Video - Overview of Wireshark 3.2Video lesson
In this lesson, you will be presented with an overview of Wireshark 3.2.
-
51Video - Wireshark Capture OptionsVideo lesson
In this lesson, you will learn about the capture option available in Wireshark.
-
52Video - Wireshark Toolbar IconsVideo lesson
In this short video presentation, you will be introduced to the toolbar icons in Wireshark.
-
53Video - Capturing Wireless Traffic Using WiresharkVideo lesson
In this short video presentation, you will learn how to configure Wireshark for capturing wireless traffic.
-
54Video and Lab - Capturing a 3-way TCP Handshake Using WiresharkVideo lesson
In this short video and lab, you will learn how to capture and examine a TCP 3-way handshake.
-
55Video and Lab - Creating a virtual install of OWASPVideo lesson
In this short video and lab presentation, you will learn how to create a virtual install of OWASP.
-
56Video and lab - Setting Up Burp SuiteVideo lesson
In this short video and lab, you will learn how to configure Burp Suite as a proxy in Kali Linux.
-
57Video and Lab - Attack Web Apps with Burp Suite Using SQL InjectionVideo lesson
In this lesson, you will learn how to use Burb Suite to attack web apps using SQL injection.
-
58Video and Lab - OS Command Injection Using Commix 3.2xVideo lesson
In this lesson, you will be learning how to perform OS Command injection with Commix.
-
59Video - Web Application Firewall Detection Using WAFW00FVideo lesson
In this short video, you will learn how to detect the presence of a web application firewall.
-
60Video and Lab – Exploit Vulnerable Web Applications Using Command InjectionVideo lesson
In this lab, you will learn how to exploit a vulnerable web application using command injection. Command injection; also known as OS Command injection, is an attack technique used to execute commands on a host operating system via a vulnerable web application.
-
61Video and Lab - Using Banner Grabbing to Aid in ReconnaissanceVideo lesson
In this lab, you will learn about banner grabbing. Banner grabbing is a technique used to gather information about running services on a computer system.
External Links May Contain Affiliate Links read more