If you want to learn ethical hacking the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack and learn hacking. These websites typically have different levels from easy to advanced. By hacking each level and gradually levelling up, you will learn hacking. Traditionally, ethical hacking is taught by installing virtual machines on your PC and hacking the virtual machines inside your PC. This way of learning hacking can be pretty boring as there are no challenges or rewards. Also it can be quite laggy unless you have a high end machine. In addition, some people find learning Linux and installing virtual machines too troublesome.
In this course, I will show you an alternative way, which is more fun and where you will enjoy the thrills of hacking real websites legally and solving each level and going from easy and gradually to more advanced levels – just like paying online games. The website we will be hacking is HackThisSite!! which is a popular hacker’s playground where hackers play hacking games reminiscent of CTF (Capture the Flag) and learn at the same time. However, without some help and guidance you will find it quite challenging. Hence this course. I will walk through each level from Basic to Realistic
You do not need to go through the hassle of installing virtual machines or Linux on your computer. All you need is a PC. In this course I am only using a Windows PC to do hacking.
Great way to learn Web Development & Information Technology (IT):
If you had always wanted to learn HTML, Javascript, PHP, MySQL, etc, what better way than to learn how to hack. So, I invite you to learn to hack and in the process, you will also learn web development and IT. This is much more fun & exciting than learning it the traditional way – the boring way through formal IT courses and books. You will be killing 2 birds with one stone, i.e. learning how to hack and also learn IT. So let’s get started in your journey of hacking to learn.
Bug Bounty:
Last, but not least, the site creators of HackThisSite encourage you to literally hack their site to explore the security of their site and they will reward those who responsibly disclose their exploit with an entry into the HackThisSite hall of fame.
This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start hacking the fun and easy way!
Basic Missions
-
1Introduction
Introduction to the course on practical real website hacking.
-
2Signing up for a free hacking account with HackThisSite.org
How to sign up for a free account with hackthissite.org and validate your email.
-
3How to solve account registration problems
How to solve account registration problems.
Realistic Missions
-
4Basic 1 (Code exposure vulnerability)
How to examine code to look for clues to hack login password.
-
5Basic 2 (PHP read failure vulnerability)
Learn how to exploit a php read vulnerability to bypass the password login.
-
6Basic 3 (Hidden input type exploit)
How to exploit hidden input types to get password.
-
7Basic 4 (HTML code tampering using Google developer tools)
How to use google developer tools to tamper the html code to send password to yourself.
-
8Basic 5 (Exploiting HTML code to email password to us)
Learn how to modify html code to email login password to us.
-
9Basic 6 (Cracking encrypted password by analyzing output)
How to crack an encrypted password by analyzing output.
-
10Basic 7 (Remote linux command injection attack)
Learn how to inject commands that will be executed remotely.
-
11Basic 8 (Remote SSI command injection attack)
How to inject SSI commands to reveal password file.
-
12Basic 9 (Remote directory traversal vulnerability)
How to list remote directories outside the current directory.
-
13Basic 10 (Cookie tampering exploit)
How to exploit a cookie to gain access to a page.
-
14Basic 11 (Apache directory listing vulnerability)
How to exploit apache directory listing vulnerability.
Realistic Mission 6 (Cryptanalysis)
-
15Realistic 1 (HTML Select options exploit)
Learn how to exploit the select options html tags to send a modified value to the web server.
-
16Realistic 2 (SQL Injection Attack to bypass login forms)
How to use SQL injection attack to bypass login forms
-
17Realistic 3 (PHP Write Vulnerability)
How to exploit a php write vulnerability.
-
18Realistic 4 (SQL Injection Attack to hack email lists)
How to execute SQL Injection Attacks to hack email lists
-
19Realistic 5 (Directory Traversal Exploit to hack admin password)
How to exploit Directory Traversal Vulnerability to hack admin password
Realistic Mission 7 (Apache htpasswd vulnerability)
-
20Introduction to Realistic Mission 6
Analyzing the encryption and reverse engineering it using nodejs to write a decryptor to decrypt the ciphertext.
-
21Installing node.js and Visual Studio Code
How to install node.js and Visual Studio Code
-
22Getting started with node.js
Some basic javascript code examples using node.js
-
23Reverse engineering the encryption
Analyzing the encryption and reverse engineering it.
-
24Coding a decryptor
Using nodejs to write a decryptor to decrypt the ciphertext.
Realistic Mission 8 (Hacking Bank Account and Transferring Money)
Realistic Mission 9 (XSS attacks)
Realistic Mission 10 (Changing school grades by exploiting form action)
Application Missions (Cracking Software)
Bonus Lecture
-
29#1 - Using wordpad to crack software
How to use wordpad to crack software serial key.
-
30Using Decompiler and Debugger to Crack Software
The process of cracking software. How to analyze software, decompile and then patch it.
-
31Cracking Software Serial Keys
How to crack software serial key.
-
32How to fish serial keys using x64dbg
How to use x64dbg debugger to fish for password. This technique is also known as serial fishing.