The Complete Ethical Hacking Course for 2016/2017!

Gain the knowledge hackers use to compromise systems and use it to protect your own!

 

 

 

 About This Course

Course Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course

  • Introduction to ethical hacking
  • Linux installation, terminal basics, and Wireshark Setup
  • Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
  • Aircrack-ng, HashCat, and wifi hacking
  • Defending your own networks from attacks
  • Cloning websites
  • Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
  • Windows power shell scripting

This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!

DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis

English & Spanish subtitles available.

Thank you for taking the time to read this, and we hope to see you in the course!

What are the requirements?

  • A computer to follow along with exercises in the course
  • USB drive to install Linux
  • Wireless card & router access
  • Various programs used to demo attacks (FREE)
  • An eager mind!

What am I going to get from this course?

  • Get started using Fedora (Linux)
  • Understand the basics of terminal
  • Troubleshoot networks using Wireshark
  • Stay anonymous online
  • Set up a VPN server
  • Hack wireless networks
  • Crack passwords and encryption using HashCat
  • Clone websites
  • Protect & defend your own network
  • Learn how to deploy a keylogger from a USB: Works out of the box for Windows 7 8 8.1 and 10

Full details

What is the target audience?

  • This course was designed for students in the IT/Network Security field
  • No previous experience is required

Curriculum

Section 1: Introduction

 

Section 1: Introduction
Lecture 1 Introduction

Preview

16:23
What you can expect to learn in this course and hardware & software requirements.
Section 2: Setup
Lecture 2 Create a USB for Installation 10:10
Explains how to set up the environment.
Lecture 3 Installation Procedure Part 1 11:16
Guides you through the process of Linux installation.
Lecture 4 Installation Procedure Part 2 06:22
Guides you through the process of Linux installation.
Lecture 5 Improve Safety and Anonymity of your Browser 07:08
General browser configuration.
Lecture 6 Fedora KDE Desktop Orientation (optional) 14:44
Getting acquainted in Fedora KDE Desktop.
Lecture 7 Terminal Basics Part 1 16:03
Showing basic Linux commands.
Lecture 8 Terminal Basics Part 2 11:46
Showing basic Linux commands.
Lecture 9 Wireshark Setup Part 1 05:02
Setting up Wireshark and configuring it for later usage.
Lecture 10 Wireshark Setup Part 2 07:54
Setting up Wireshark and configuring it for later usage.
Section 3: Anonymity Online
Lecture 11 How to Connect to the Internet via Proxy Part 1 17:47
Explains how to connect to the Internet via Proxy for the purposes of anonymization.
Lecture 12 How to Connect to the Internet via Proxy Part 2 02:50
Explains how to connect to the Internet via Proxy for the purposes of anonymization.
Lecture 13 How to set up a Proxy Server for Traffic Monitoring Part 1 19:52
Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Lecture 14 How to set up a Proxy Server for Traffic Monitoring Part 2 09:55
Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Lecture 15 How to set up a Proxy Server for Traffic Monitoring Part 3 14:39
Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Lecture 16 How to set up a Proxy Server for Traffic Monitoring Part 4 19:04
Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Lecture 17 How to set up a Proxy Server for Traffic Monitoring Part 5 09:23
Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.
Lecture 18 How to Connect to a VPN 07:48
Learn how to anonymize your traffic by using a VPN server as an anonymizer.
Lecture 19 How to set up your own VPN Server Part 1 10:14
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Lecture 20 How to set up your own VPN Server Part 2 09:23
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Lecture 21 How to set up your own VPN Server Part 3 13:32
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Lecture 22 How to set up your own VPN Server Part 4 05:58
Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.
Lecture 23 Monitor VPN Server Traffic 09:45
Here I will show you how you can monitor the traffic of your VPN server.
Lecture 24 Tor Browser 11:21
Lets have a look at how we can access the dark side of the Internet by using the Tor network via Tor browser.
Lecture 25 How to set up a Tor Relay Part 1 18:32
Here we are going to take a look at how a Tor relay can be set up and configured.
Lecture 26 How to set up a Tor Relay Part 2 05:44
Here we are going to take a look at how a Tor relay can be set up and configured.
Section 4: Wireless
Lecture 27 Installing aircrack-ng 16:20
Lets go ahead and install one of the necessary prerequisites for this chapter, namely aircrack-ng, which will be used in combination with our CPU to bruteforce the WPA2 key.
Lecture 28 Capturing WPA2 Handshake 12:55
In order for us to begin the cracking procedure, we need to go ahead and capture a handshake between the authenticated client and the wireless access point.
Lecture 29 Crunch Password Generator Installation 09:18
Since we are going to need something to generate lists of possible passwords, I decided to use Crunch for this purpose as it is very convenient due to its numerous options.
Lecture 30 Crunch Password Generator Rule Sets 18:50
Lets learn how to create custom rule sets for the password generation process so that our passwords would fit within a certain range of predefined rules.
Lecture 31 Crunch Password Generator in Combination with aircrack-ng 13:51
In this final stage, we will feed aircrack with the passwords generated by Crunch and aircrack, in turn, will attempt to guess the passphrase by utilizing the CPU.
Lecture 32 Installing NVIDIA Drivers 15:11
Installing drivers for our dedicated GPU.
Lecture 33 Installing HashCat 08:39
Step by step guide on how to install HashCat.
Lecture 34 Preparing the Capture File for HashCat 02:09
Here we will learn how to prepare the capture file for HashCat.
Lecture 35 HashCat Part 1 13:15
Getting started with Hashcat, one of the world's fastest CPU/GPU based password recovery tools.
Lecture 36 HashCat Part 2 14:13
Advanced Hashcat tutorial for attacks & automation.
Lecture 37 Changing your mac address 13:32
Here I will show you how to utilize the tool to change the mac address of your network devices so that you may reach a higher degree of anonymity.
Lecture 38 Set up a Sandboxed Environment for our Hotspot Part 1 18:16
Install a virtual machine to isolate the incoming traffic.
Lecture 39 Set up a Sandboxed Environment for our Hotspot Part 2 11:52
Install a virtual machine to isolate the incoming traffic.
Lecture 40 Setting up an Open Wireless Hotspot Part 1 08:39
Configuring our network card to function as a wireless hotspot.
Lecture 41 Setting up an Open Wireless Hotspot Part 2 03:40
Configuring our network card to function as a wireless hotspot.
Lecture 42 Setting up the Fake DNS Resolutions Part 1 05:51
How to bring up and configure your own DNS server.
Lecture 43 Setting up the Fake DNS Resolutions Part 2 03:08
How to bring up and configure your own DNS server.
Lecture 44 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 1 07:48
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 45 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 2 08:51
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 46 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 3 05:04
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 47 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 4 13:07
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 48 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 5 10:48
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 49 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 6 19:47
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 50 Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 7 03:36
Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.
Lecture 51 Disconnect Clients from a Wireless Access Point 13:37

 

Section 5: Site Cloning
Lecture 52 How to Clone Websites 06:45
Here we will use the tool wget in order to clone websites.
Section 6: Bitsquatting
Lecture 53 Bitsquatting Part 1 14:26
Lecture 54 Bitsquatting Part 2 20:05
Lecture 55 Bitsquatting Part 3 18:11
Lecture 56 Bitsquatting Part 4 19:38
Lecture 57 Bitsquatting Part 5 10:15
Section 7: Bad USB (USB Keylogger Deployment)
Lecture 58 Overview 03:58
Lecture 59 Requirements 05:15
Section 8: Setting up Windows Virtual Machine
Lecture 60 Installing Windows VM Part 1 10:01
Lecture 61 Installing Windows VM Part 2 07:03
Lecture 62 Install CodeBlocks with a Compiler 04:17
Lecture 63 Download and Compile the Keylogger 09:00
Section 9: Server Setup
Lecture 64 Set up a Server for Keylogger 15:51
Lecture 65 Upload the Keylogger to the Server 14:02
Section 10: Arduino USB Programming
Lecture 66 Download Arduino 02:36
Lecture 67 Set up Arduino and Teensyduino 05:44
Lecture 68 Confirm that everything works 08:43
Lecture 69 Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1 09:33
Lecture 70 Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2 05:39
Lecture 71 Generate Files in System32 09:58
Lecture 72 Sets of Commands to be Executed Part 1 11:54
Lecture 73 Sets of Commands to be Executed Part 2 09:21
Lecture 74 Call Functions and Run Commands 04:29
Section 11: Windows Scripts
Lecture 75 Powershell Script Part 1 08:57
Lecture 76 Powershell Script Part 2 11:13
Lecture 77 Powershell Script Part 3 14:23
Lecture 78 Visual Basic Script 14:00
Lecture 79 Compile and Load 01:05
Section 12: Decryption for the Keylogger Files
Lecture 80 Decrypt Part 1 18:37
Learn how to decrypt the encrypted files.
Lecture 81 Decrypt Part 2 12:46
Part 2 of how to decrypt the encrypted files.
Lecture 82 Decrypt Part 3 16:20
Part 3 of how to decrypt the encrypted files.
Section 13: Live Demo
Lecture 83 Demo Part 1 04:32
Lecture 84 Demo Part 2 02:57
Section 14: Chapter Recap
Lecture 85 Recap

 

Section 5: Site Cloning
Lecture 52 How to Clone Websites 06:45
Here we will use the tool wget in order to clone websites.
Section 6: Bitsquatting
Lecture 53 Bitsquatting Part 1 14:26
Lecture 54 Bitsquatting Part 2 20:05
Lecture 55 Bitsquatting Part 3 18:11
Lecture 56 Bitsquatting Part 4 19:38
Lecture 57 Bitsquatting Part 5 10:15
Section 7: Bad USB (USB Keylogger Deployment)
Lecture 58 Overview 03:58
Lecture 59 Requirements 05:15
Section 8: Setting up Windows Virtual Machine
Lecture 60 Installing Windows VM Part 1 10:01
Lecture 61 Installing Windows VM Part 2 07:03
Lecture 62 Install CodeBlocks with a Compiler 04:17
Lecture 63 Download and Compile the Keylogger 09:00
Section 9: Server Setup
Lecture 64 Set up a Server for Keylogger 15:51
Lecture 65 Upload the Keylogger to the Server 14:02
Section 10: Arduino USB Programming
Lecture 66 Download Arduino 02:36
Lecture 67 Set up Arduino and Teensyduino 05:44
Lecture 68 Confirm that everything works 08:43
Lecture 69 Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1 09:33
Lecture 70 Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2 05:39
Lecture 71 Generate Files in System32 09:58
Lecture 72 Sets of Commands to be Executed Part 1 11:54
Lecture 73 Sets of Commands to be Executed Part 2 09:21
Lecture 74 Call Functions and Run Commands 04:29
Section 11: Windows Scripts
Lecture 75 Powershell Script Part 1 08:57
Lecture 76 Powershell Script Part 2 11:13
Lecture 77 Powershell Script Part 3 14:23
Lecture 78 Visual Basic Script 14:00
Lecture 79 Compile and Load 01:05
Section 12: Decryption for the Keylogger Files
Lecture 80 Decrypt Part 1 18:37
Learn how to decrypt the encrypted files.
Lecture 81 Decrypt Part 2 12:46
Part 2 of how to decrypt the encrypted files.
Lecture 82 Decrypt Part 3 16:20
Part 3 of how to decrypt the encrypted files.
Section 13: Live Demo
Lecture 83 Demo Part 1 04:32
Lecture 84 Demo Part 2 02:57
Section 14: Chapter Recap
Lecture 85 Recap

No Comments Yet.

Leave a comment

%d bloggers like this: