Practical Hacking Master Class

A Complete Series on Ethical Hacking – PHMC SECURITIES

With This Course, You Will Get Following Complimentary Additional Resources

A Student Support Portal by PHMC SECURITIES
A Student Live Chat (7 PM to 11 PM IST, Time is Favorable For all Countries) Mon – Fri
Free Access to Web Hacking P-LAB for One Month on Verification of Identity
A VPN Server for Static IP to Access P-LAB
The WAPT E-Book by PHMC SECURITIES

This course Currently Includes All 7 Modules in our Series but We are Adding More Additional Lectures each Month

 

Module 1: Extreme Basics:-

Understanding of Process of Hacking
Choosing an Operating System
Preparing a Portable Hacking USB Drive
Working with Visualization and Installing Kali Linux
Working with Cloud and Pen-Testing Tools
Orientation to Kali Linux
Understanding File Operations, Navigation and Permissions & Ownership in Terminal

 

Module 2: Hack the Web:-

Setting DVWA Lab for Legal Safety
Understanding and Exploiting Vulnerabilities:-
CSRF
XSS Reflected, Stored and DOM
Command Injection
File Upload and Inclusion
SQL Injection
Weak Session IDs
Brute Forcing
Creating Payload to Attack Web Applications
Scanning for Vulnerabilities through Automated Tools like VEGA

 

Module 3: Anonymity and Deception:-

Working with Proxy, VPN and TOR
Advanced TOR to VPN and VPN to TOR Circuits
Mac Address and DNS LEAKS
Fake Online Identity and Email
Spoofed Call and SMS from Any Number
and a lot much More

 

Module 4 : Human is the Weakest Link:-

Open Source Intelligence Data Gathering on Human
Main Techniques Used
Ethical Hacking through Hardware like Arduino and Digispark
Extreme Level Phishing though GoPhish on a Virtual Private Server

 

Module 5: The Art of Reconnaissance:-

Working with Google Hacking
Getting Deep with Nmap
Detecting OS, Finding Ports, Checking for Vulnerabilities
and some more things to be added soon

 

Module 6: Attack like a Pro:-

Setting up Metasploit
Learning MSFConsole, MSFVenom
Multi Handler and Meterpreter
Introduction to Venom for Antivirus Evasion
Making Fully Undetectable Payloads

 

Module 7 : Reporting:-

Learn What to Mention
Learn What Not to Mention
Steps to Recreate and PoC
Example of a Good Report

Introduction

1
Introduction

Module 1 - Basics

1
Basic Theory
2
Process of Hacking
3
Types of Pentesting

1.1 - Operating System

1
Choosing your OS
2
Writting your OS to USB Drive
3
Writing your OS to USB Drive for MAC Only
4
Setting up Persistence
5
Orientation
6
Creating a Non Root Account

1.2 - Terminal Basics

1
Navigation
2
File Operations Part -1
3
File Operations Part -2
4
Permissions and Ownership

1.3 - Virtual Lab

1
Virtualization
2
Installing Kali Linux
3
Installing Virtualbox Guest Addons
4
Install Virtual Box on Mac
5
Install Ubuntu in VM
6
Lazy Script
7
Install Windows 10 into VM
8
Installing android x86 project
9
Get Your VPS Provider Account
10
Your OS on a VPS
11
Install Kali Tools on Linux in 5 Minutes

Module 2 - Web Hacking

1
Setup DVWA
2
Configure Database and User
3
Fixing Issues Part 1
4
Fixing Issues Part 2

PreRequisite - Learning How to use Burp Suite

1
Scanner, Intruder and Repeater
2
Wrapping up Burp Suite
3
Target, Proxy and Spider

2.1 Web Hacking on Low Security

1
CSRF on Low Security
2
XSS Reflected on Low Security
3
XSS Stored on Low Security
4
XSS DOM on Low Security
5
Cookie Stealing with XSS
6
File Upload on Low
7
Creating a PHP Backdoor
8
File Inclusion on Low Security
9
Command Injection on Low Secirity
10
Brute Forcing on Low Security
11
SQL Injection on Low and Medium

2.2 Web Hacking on Medium Security

1
CSRF on Medium Security
2
XSS Reflected on Medium Security
3
XSS Stored on Medium Security
4
XSS DOM on Medium Security
5
File Upload on Medium Security
6
Command Injection on Medium Secirity

2.3 Dive Deep in Web Hacking

1
File Upload on High Security
2
Introduction to Weevely
3
XSS Reflected on High Security
4
XSS Stored on High Security
5
CSRF on High Security
6
SQL Injection on High Security
7
SQL Injection Password Hash Decoding

2.4 Web Forms

1
Project Setup
2
GET and POST forms
3
Javascript won’t protect you
4
Add Extra Fields
5
Validate Your Input
6
Crawl the site
7
About the Project

Pentest on Custom Coded Sites

1
Clickjacking
2
Testing For XSS
3
XSS DEMO
4
CSRF
5
Web Pentesting – VEGA

Module 3 - Anonymity and Deception

1
Proxy
2
VPN
3
TOR
4
Mac Address
5
DNS Leaks

3.1 Getting Deep with VPN

1
Introduction to AirVPN
2
VPN to TOR Circuit
3
TOR to VPN Circuit
4
Port Forwarding over VPN

3.2 Other Things

1
Random Identity
2
Making Temporary Debit Cards
3
Temporary Email
4
Spoofed Phone Call
5
Sending Anonymous SMS
6
Self Distruction Message
7
FAKE ID
8
FAKE ID (LIVE DEMO)

Module 4 - Human is the Weakest Link

1
Open Source Intelligence Data Gethering on People
2
SE – Technique – 1
3
SE – Technique – 2
4
SE – Technique – 3
5
SE – Technique – 4
6
SE – Technique – 5

4.1 HID Bad USB Attack

1
Arduino Basic Setup
2
Writing Ducky Scripts
3
Get Arduino
4
Meterpreter Shell through HID
5
Meterpreter Shell Live
6
DigiSpark – A Compact Alternative
7
DigiSpark Continued

4.2 GoPhish Framework - The Most Advance Phishing Tool

1
Get GoPhish
2
Starting GoPhish
3
GoPhish on a Server
4
Domain Name on GoPhish Server
5
SSL on GoPhish Server
6
SSL on GoPhish Server Continued
7
GoPhish Sending Profile
8
GoPhish Launching out Campaign
9
GoPhish Sending Email
10
GoPhish Opening the Spoofed Mail
11
GoPhish Analyzing Submited Data

Module 5 - The Art of Reconnaissance

1
Using Components with known vulnerabilities
2
Google Dorks Live Demo
3
Information Gethering using The Harvester
4
Vhost Discovery
5
Enemurating Subdomains
6
Getting The Juicy Information from the Headers
7
Getting some juicy information
8
Downloading the Source of a Website
9
Looking for some Archived Pages
10
Banner Grabbing
11
Different Type of Nmap Scans
12
Nmap Scans Live Demo

Module 6 - Attack Like a Pro

1
Metasploit – Setting up Database
2
Overview of Meterpreter
3
Multi Handler
4
MSFVenom
5
Encoders

6.1 - The Venom

1
Introduction to Venom
2
Setup Venom
3
Venom Android Payload
4
Venom Windows Payload

Module 7 - Reporting to Clients

1
Reporting Part – 1
2
Reporting Part – 2
3
Reporting Part – 3
4
Reporting Part – 4

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 134

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

Practical Hacking Master Class
Price:
$209