Ethical Hacking From Scratch - Exploit Exercises - Nebula

Avatar

Project Intro Video: Ethical Hacking From Scratch

with DarrenRainey|4 years experience|Others

13696views

Ethical Hacking From Scratch - Exploit Exercises - Nebula

  • English
  • Cybersecurity
  • Ethical HackingEthical Hacking
  • (2806)
  • Project length: 9h 02m

In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment. You will learn all about Ethical hacking with loads of live hacking examples to make the subject matter clear. You will learn how to search find and exploit various vulnerability's as well as how to defend against them. This playlist of videos should help teach you a good amount of offensive and defensive strategy's and techniques.

Overview

Ethical Hacking For Beginners

Introduction

In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment. You will learn all about Ethical hacking with loads of live hacking examples to make the subject matter clear. You will learn how to search find and exploit various vulnerability's as well as how to defend against them.

This playlist of videos should help teach you a good amount of offensive and defensive strategy's and techniques.

What are the requirements?

  • A PC (WiFi/Bluetooth required for some stuff)
  • Basic technical knowledge is a must ( Running programs etc)
  • This series will many be using Linux so a Linux install or device (We'll cover this in the series as well as alternatives)

What is the target audience?

  • Anyone who wants to learn how to attack and defend them self's from cyber threats

When are the streaming sessions (streaming schedule)?

Streaming should occur regular on Saturday's at 4PM (EST) with other off topic streams on Tuesday at 2:00PM (EST)

Project Outline

Session 1: Setting-up the Environment

  • Install Linux with various tools in a virtual machine or one physical hardware.

Session 2: Recon/Fingerprinting Computers

  • Finding useful information about a target for later use
  • Tools Used: Nmap, Masscan, Netcat, and more.

Session 3: Hiding in the shadows

  • Staying anonymous and avoiding detection
  • Tools Used: Tor, Proxychains, OpenVPN, Macchanger and more.

Session 4: Brute force and login attacks

  • In this session we will cover various methods for getting login information for the target system.
  • Tools Used: THC-Hydra, Metasploit, Python and More.

Session 5: Phishing and social engineering

  • This session will focus on the human factor and ways of tricking people into giving you access.

Session 6: Reverse shells

  • This stream/video will cover reverse shells and remotely commanding a target device.
  • Tools Used: Metasploit, Netcat, Custom Code and more.

Session 7: Explaining DOS and DDOS Attacks

  • This session will cover the difference between DOS and DDOS attacks and how they are used to take down websites, servers and more.

Session 8: MITM Attacks

  • This session will cover MITM (Man In The Middle) attacks and how they can be used for recon and exploitation.
  • Tools Used: Mitmproxy, Etthercap, Beef and more.

Session 9: Common Wireless Attacks

  • This session will cover common wireless attacks access WiFi networks and Bluetooth networks.
  • Tools Used: Aircrack-ng, BlueZ and more.

Session 10: Evading Firewalls And IDS

  • This session will cover common techniques used to bypass various firewalls and Intrusion Detection System (IDS).

Tools: A Debian based Linux Distro (Debian, Ubuntu, Kali etc) A PC with WiFi and Bluetooth

Reviews

Average rating

4(2806 Reviews)