Ethical Hacking - Basics

Ethical Hacking - Basics

  • English
  • Cybersecurity
  • Ethical HackingEthical Hacking
  • (865)
  • Project length: 4h 40m

This project will cover the basics to start hacking and learning the tools and techniques of the industry. This project should teach someone how with limited or no hacking experience and teach them the basics to get started the cyber security industry.

Overview

Ethical Hacking For Beginners

Default project information for you to know how to fill your project.

Introduction

This project will cover the basics to start hacking and learning the tools and techniques of the industry. This project should teach someone how with limited or no hacking experience and teach them the basics to get started the cyber security industry.

What are the requirements?

  • A 32 or 64bit PC
  • WiFi/Bluetooth - For wireless attacks
  • An internet connection - For downloading, installing and researching
  • Free storage space - To install required programs and operating system(s)

What is the target audience?

  • Someone with limited or no hacking experience.

When are the streaming sessions (streaming schedule)?

Saturday - 3PM EST - 8PM UK Time

Project Outline

Session 1: Setting-up the Environment

  • Install Linux with various tools in a virtual machine or one physical hardware.

Session 2: Recon/Fingerprinting Computers

  • Finding useful information about a target for later use
  • Tools Used: Nmap, Masscan, Netcat, and more.

Session 3: Hiding in the shadows

  • Staying anonymous and avoiding detection
  • Tools Used: Tor, Proxychains, OpenVPN, Macchanger and more.

Session 4: Brute force and login attacks

  • In this session we will cover various methods for getting login information for the target system.
  • Tools Used: THC-Hydra, Metasploit, Python and More.

Session 5: Phishing and social engineering

  • This session will focus on the human factor and ways of tricking people into giving you access.

Session 6: Reverse shells

  • This stream/video will cover reverse shells and remotely commanding a target device.
  • Tools Used: Metasploit, Netcat, Custom Code and more.

Session 7: Explaining DOS and DDOS Attacks

  • This session will cover the difference between DOS and DDOS attacks and how they are used to take down websites, servers and more.

Session 8: MITM Attacks

  • This session will cover MITM (Man In The Middle) attacks and how they can be used for recon and exploitation.
  • Tools Used: Mitmproxy, Etthercap, Beef and more.

Session 9: Common Wireless Attacks

  • This session will cover common wireless attacks access WiFi networks and Bluetooth networks.
  • Tools Used: Aircrack-ng, BlueZ and more.

Session 10: Evading Firewalls And IDS

  • This session will cover common techniques used to bypass various firewalls and Intrusion Detection System (IDS).

Tools: A Debian based Linux Distro (Debian, Ubuntu, Kali etc) A PC with WiFi and Bluetooth

Reviews

Average rating

5(865 Reviews)