Master in Cyber Security
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Get course
INR3,000
INR999
Course sections
Section 1
Introduction-Installation
1
Virtual Box Installation
2
Kali Linux installation
3
Going Full Screen
Section 2
Basic Commands
1
Basic Commands – Part – 1
2
Basic Commands – Part – 2
3
Basic Commands – Part – 3
Section 3
Prepare Your Lab
1
Changing Your IP Address
2
Creating A Bootable Kali Linux USB
3
Important Networking Terms
4
Important Hacking Terms
5
Post Installation Steps
6
Changing Your Mac Address
Section 4
Foot Printing
1
Google Hacking
2
Nikto Basics
3
Whois Tool
4
Email Harvesting
5
Shohan
6
Zone Transfer
Section 5
Scanning
1
Installing Metasploitable
2
Nmap-Part-I
3
Namp-Part-II
4
Namp-Part-III
5
Zenmap
6
TCP Scans
7
Nmap Bypassing Defenses
8
Nmap Scripts - Part 1
9
Nmap Scripts - Part 2
Section 6
Penetration Testing
1
Installing OWASP
2
HTTP Requests
3
HTTP Responses
4
Burpsuite Configuration
5
Editing Packets
6
Whatweb and Dirb
7
Password Recovery Attacks
8
Bruteforce Logins
9
Hydra Logins
10
Session Fixation
11
Injection Attacks
12
Simple Command Injection
13
Exploiting Command-Injection Vulnerabilities
14
Blind Command Injection
15
Basics of SQL
16
Manual SQL Injection - Part 1
17
Manual SQL Injection - Part 2
18
SQLmap Basics
19
XML Injection
20
Installing XCAT
21
Reflected XSS
22
Stored XSS
23
Modifying HTML
24
XSSer and XSSsniper
Section 7
WPA2 Cracking
1
Wireless Attack Theory
2
Monitor Mode
3
Capturing Handshakes
4
RockYou
5
Aircrack
6
Hashcat
7
Crunch
8
Cupp
9
Rainbow Tables - Part 1
10
Rainbow Tables - Part 2
11
Fluxion
12
Cracking Hidden Networks
13
Preventing Attacks
Section 8
Man in the Middle (MITM)
1
ARB Basics
2
MITM Attack Theory
3
Installing MITMf
4
Manual Arpsoofing
5
Installation Issues with MITMf
6
Traffic Sniffing
7
Spoofing and Password Sniffing
8
Hooking with BEEF
9
Screenshotting Targets
10
Cloning Webpages
11
Ettercap
Section 9
System Hacking
1
MSFconsole
2
Metasplot Modules
3
Bruteforcing SSH
4
Attacking Tomcat
5
Meterpreter with Command Injection
6
PHP Code Injection
7
Two Exploits
8
Wine Installation
9
Msfvenom
10
Encoders and Hexeditor
11
Windows 10 Meterpreter Shell
12
Meterpreter Environment
13
Windows 10 Privilege Escalation
14
Preventing Privilege Escalation
15
Post Exploitation Modules
16
Meterpreter with Port Forwarding
17
Eternalblue Exploit
18
Persistence Module
19
Ngrok
20
Venom
21
What's Next
Section 10
Coding an Advanced Backdoor
1
Reverse Shell Theory
2
Server Code
3
Reverse Shell Connection
4
Sending and Receiving Messages
5
Sending Messages with While-True Loops
6
Executing Commands on the Target System
7
Fixing Backdoor Bugs and Adding Functions
8
Installing Pyinstaller
9
Performance-Testing the Backdoor
10
Twenty-Second Connections
11
Creating Persistence - Part 1
12
Creating Persistence - Part 2
13
Changing Directories
14
Uploading and Downloading Files
15
Downloading from the Internet
16
Executing Programs Through the Backdoor
17
Capturing Screenshots on the Target
18
Embedding Your Backdoor - Part 1
19
Embedding Your Backdoor - Part 2
20
Checking for Admin Privileges
21
Adding Help Options
Section 11
Creating a Keylogger for the Backdoor
1
Importing Pynput
2
Simple Keylogger
3
Adding Report Functions
4
Writing Keystrokes to a File
5
Adding the Logger - Part 1
6
Adding the Logger - Part 2
7
Final Project Test
Section 12
Authentication Bruteforcer
1
Printing the Banner
2
Adding Available Options
3
Starting Threads for Bruteforce
4
Functions to Run Attacks
5
Bruteforcing a Router Login
6
Bypassing Antivirus
7
Malware with Spoofed Emails
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
Man in the Middle (MITM)
MITM Attack Theory
Lesson is locked. Please Buy course to proceed.
Man in the Middle (MITM)
ARB Basics
Complete
Man in the Middle (MITM)
Installing MITMf
Questions
My Question