Advanced Ethical Hacking Course 11 Hours 2024 Ethical Hacker Training Course Beginner Edition

HomeOther ContentAdvanced Ethical Hacking Course 11 Hours 2024 Ethical Hacker Training Course Beginner Edition
Advanced Ethical Hacking Course 11 Hours 2024 Ethical Hacker Training Course Beginner Edition
Advanced Ethical Hacking Course 11 hours 2024 Ethical Hacker Training Course Beginner Edition
Free Advanced Ethical Hacking Course by Cyber Security Consultancy Whitesec Pvt Ltd.
try watching it in 1.5x

the subjects
0:00 intro to watch
0:21 cybersecurity (common cyber threats)
5:19 configuring an attacking machine
11:21 a.m.: configuration of the victim's machine
4:19 p.m. Kali Linux Terminal
31:23 File permissions in Kali Linux
51:34 Users and groups in Linux
57:38 password and shadow file in Linux
1:06:45 Man tool on Linux
1:09:51 installing packages and scripts in Linux
1:19:29 Networking for Hackers – One to Watch
1:22:28 What is IP
1:26:58 what is a static IP address
1:32:50 what is dynamic IP address and DHCP
1:36:21 what is a public IP address
1:40:46 what is a private IP address
1:44:49 Difference between public and private IP
1:51:27 The hackers' point of view
2:02:56 ipv4 and its features
2:11:41 ipv6 and its features
2:16:17 TCP and UDP (protocols)
2:22:03 About well-known, registered and dynamic ports
2:28:05 what is the Mac address
2:38:27 difference between mac address and IP address
2:41:52 Programming languages for hackers
2:45:40 analyze the network using Wireshark
2:54:53 setting up a lab for web hacking
2:59:20 How to perform a Google hack
3:38:06 OWASP Web Top 10
3:41:06 putting on the burpsuit
3:48:08 HTTP response status codes
3:52:25 Creating a word list by deleting the website
4:01:37 Creating a word list based on the target user
4:09:14 Hacking phases
4:20:49 what is HTML injection
4:25:48 impact of HTML injection
4:27:43 HTML injection (reflected and stored)
4:44:43 what is command injection
4:50:09 impact and consequences of command injection vulnerability
4:53:08 command injection (practical)
4:57:38 what is XSS and how does it work
5:02:07 what is the impact of XSS
5:03:54 xss attack (practical
5:10:38 what is csrf and how does it work
5:14:22 csrf – get and post queries
5:17:38 what is the impact of csrf
5:18:38 csrf attack (practical)
5:25:20 what is broken authentication and session management and examples
5:31:53 impact of broken authentication and session management
5:37:12 what is SQL injection
5:39:17 impact of SQL injection
5:41:38 SQL injection (Practical)
5:48:46 Vulnerability analysis – lab setup
5:51:30 Scanning using nmap
6:01:58 scanning using Zenmap
6:06:42 scanning with Nikto
6:10:06 FTP exploitation
6:14:30 Exploiting ssh
6:19:39 Exploitation of telnet, smtp, PostgreSQL, javarmi, proftpd
6:21:25 Penetration testing
6:21:55 Configuration Lab
6:22:55 Scan
6:36:20 User enumeration
6:44:10 Brute force attack
6:51:02 Shell access
6:55:45 Privilege escalation from web to user
7:03:17 Privilege escalation to root
7:09:34 Introduction to wifi hacking
7:10:36 Learn more about the wep network
7:14:43 Learn more about wpa wpa2 network
7:21:38 Downloading VMware and installing Kali Linux
7:26:38 Choosing a wifi adapter for hacking
7:31:04 What is monitor mode and managed mode (theory)
7:38:47 How to change your wifi adapter to monitoring mode
7:47:22 WPS attacks
7:53:45 Wps vulnerabilities and types of WPS attacks
7:58:19 wps brute force attacks
8:01:14 Wps – Pixie Dust Attacks
8:02:31 Conditions to hack wpa2 network
8:08:38 Wi-Fi hacking tool
8:23:39 Analysis of wps wep wpa networks
8:32:35 Wep wps wpa wpa2 network hack
8:38:02 How to perform a dictionary attack
8:45:13 WPS Bruteforce attack using Reaver
8:52:10 Hacking Wps network using Wpa wps network
8:54:13 What is a deauthentication attack
8:58:24 How to perform a deauthentication attack and capture the handshake file
9:10:32 Handshake file cracked
9:14:02 Jamming Wifi networks using mdk3
9:18:17 Wifi hacking for Red teamers and pentesters
9:22:26 Red Team Analyst Training
9:29:46 what is a buffer overflow
9:33:26 Buffer overflow basics (EAX EDX EBP ESP EIP stack)
9:41:53 risk of buffer overflow
9:43:39 what is blurry and shifted
9:45:46 what are the bad characters
9:50:35 set up a laboratory for practice
9:52:23 Scanner
9:59:59 configuring debugger immunity and Mona.py
10:03:47 software crash
10:15:35 immunity debugger (EIP)
10:27:06 Exploit Development and Fuzzing
Offset 10:32:15 – single characters
Shift 10:39:38 – EIP control
10:47:25 find bad characters
10:54:14 return address
11:00:44 pointing to EIP
11:06:35 Generating a shell
11:12:26 Access windows
11:19:20 Access Linux

Udemy – https://www.udemy.com/user/whitesec-23/
telegram channel – https://t.me/whiteseconlinecybersecurityorg

Disclaimer –
This video is made available for educational and informational purposes only.
All of our videos were made using our own systems, servers, routers and websites. It does not contain any illegal activities. Our only goal is to raise awareness about cybersecurity and help our viewers learn how to defend themselves against any hacking activity. whitesec cybersecurity is not responsible for any misuse of the information provided.

join our Red Team training – contact us WhatsApp
https://wa.me/918019263448
our website – https://trainings.whitesec.org

advanced training on Android –
https://wa.me/918019263448
website – https://trainings.whitesec.org/adv

#cybersecurity #hacker

Please take the opportunity to connect and share this video with your friends and family if you find it useful.

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *