🚨 Time is Running Out: Reserve Your Spot in the Lucky Draw & Claim Rewards! START NOW
watching now
1 Students

Description

What Will You Learn?

  • What different types of hackers represent
  • How to improve the security of your own computer
  • How to help others find vulnerabilities in their systems

Requirements

  • Basics in Python
  • Basics in C
  • NFT Certificate
  • 144 Lessons
  • Beginner
  • English
  • 5.0 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 27h 33min of content, in total.

Section 2: Basic Commands!
43:36
Basic Commands Part 2
21:06
Basic Commands Part 3
12:48
Section 3: Prepare Your Lab!
53:17
Changing IP address and setting up Wireless Adapter
04:54
Creating Bootable Kali USB
05:00
Important Networking Terms
10:18
Important Hacking Terms
18:05
Few Things to Do After Installing Kali Linux
08:33
Changing Our Mac Address - Macchanger
06:27
Section 4: Footprinting!
54:33
Google Hacking
13:12
Nikto Basics
10:56
Whois Tool
06:41
Email Harvesting
06:09
Shodan
10:25
Zone Transfer With Dig
07:10
Section 5: Scanning!
1:51:28
Installing Metasploitable
07:00
Nmap Part 1
15:34
Nmap Part 2
11:44
Nmap Part 3
12:26
Zenmap
07:55
TCP scans
15:53
Nmap Bypassing Defences
17:24
Nmap Scripts 1
09:31
Nmap Scripts 2
14:01
Section 6: Web Penetration Testing!
4:39:25
Installing Owasp
08:28
HTTP request
10:01
HTTP Response
10:30
Burpsuite Configuration
12:51
Editing Packets in Burpsuite
12:21
Whatweb & Dirb
10:12
Password Recovery Attack
15:35
Burpsuite Login Bruteforce
11:06
Hydra Login Bruteforce
08:48
Session Fixation
13:55
Injection Attacks
05:35
Simple Command Injection
11:11
Exploiting Command Injection Vulnerability
07:44
Finding Blind Command Injection
13:46
Webpentest - Basics Of SQL
10:27
Manual SQL Injection Part 1
13:17
Manual SQL Injection Part 2
21:00
SQLmap basics
16:37
XML Injection
16:00
Installing XCAT and Preventing Injection Attacks
05:53
Reflected XSS
10:53
Stored XSS
12:01
Changing HTML Code with XSS
07:34
XSSer & XSSsniper
13:40
Section 7: WPA2 Cracking
2:25:27
Wireless Attacks Theory
10:52
Putting Network Card in Monitor Mode
04:41
Capturing Handshake With Airodump
14:40
RockYou.txt
14:00
Cracking with Aircrack
15:36
Cracking with Hashcat
15:00
Making Password Lists With Crunch
18:23
Making Password Lists With Cupp
07:13
Rainbowtables Part 1
16:37
Rainbowtables Part 2
05:41
Installing Fluxion
06:21
Finding and Cracking Hidden Network
08:22
Preventing Wireless Attacks
08:01
Section 8: Man In The Middle
1:59:43
ARP Protocol Basics
10:31
MITM Attack Theory
07:22
Installing MITMf
06:38
Manual Arpspoofing
12:51
Problems While Installing MITMf
06:22
HTTP Traffic Sniffing
08:32
DNS Spoofing and HTTPS Password Sniffing
24:21
Hooking Browsers With BEEF
16:04
Screenshotting Targets Browser
11:04
Cloning Any Webpage
08:57
Ettercap Basics
07:01
Section 9: System Hacking
4:14:19
MSFconsole Environment
16:10
Metasploit Modules Explained
12:14
Bruteforcing SSH with Metasploit
15:20
Attacking Tomcat With Metasploit
08:53
Getting Meterpreter With Command Injection
25:08
PHP Code Injection
05:46
2 Metasploitable Exploits
07:01
Wine installation
12:05
Crafting Windows Payloads With Msfvenom
10:05
Encoders & Hexeditor
18:45
Windows 10 Meterpreter Shell
12:02
Meterpreter Environment
11:31
Windows 10 Privilege Escalation
11:31
Preventing Privilege Escalation
06:24
Post Exploitation Modules
14:14
Getting Meterpreter Over Internet With Port Forwarding
10:43
Eternalblue Exploit
20:20
Persistence Module
13:19
Hacking Over Internet With Ngrok
10:26
Android Device Attack With Venom
09:56
Real Hacking Begins Now!
02:26
Section 10: Python Basics
1:46:57
Variables
13:45
raw_input
10:50
IF ELSE statement
10:20
FOR loop
06:33
WHILE loop
08:24
Python Lists
08:07
Functions
14:34
Classes
10:25
Importing Libraries
07:01
Files in Python
11:44
Try and Except rule
05:14
Section 11: Coding Advance Backdoor
4:17:11
Theory Behind Reverse Shell
06:50
Simple Server Code
12:44
Connection With Reverse Shell
07:11
Sending and Receiving Messages
10:49
Sending Messages With While True Loop
07:54
Executing Commands On Target System
09:38
Fixing Backdoor Bugs & Adding Functions
20:10
Installing Pyinstaller
02:26
First Performance Test of Our Backdoor
18:01
Trying to Connect Every 20 seconds
12:27
Creating Persistence Part 1
06:12
Creating Persistence Part 2
16:50
Changing Directory
11:55
Uploading & Downloading Files
22:32
Downloading Files From Internet
22:46
Starting Programs From Our Backdoor
06:47
Capturing Screenshot On Target PC
18:46
Embedding Backdoor In Image Part 1
13:29
Embedding Backdoor In Image Part 2
08:40
Checking For Administrator Privileges
12:12
Adding Help Option
08:52
Section 12: Creating Keylogger For Backdoor
1:30:11
Importing Pynput
10:24
Simple Keylogger
10:00
Adding Report Function
10:36
Writing Keystrokes To a File
14:01
Adding Keylogger To Our Reverse Shell Part 1
23:01
Adding Keylogger To Our Reverse Shell Part 2
07:43
Final Project Test
14:26
Section 13: Basic Authentication Bruteforcer
1:25:04
Printing Banner
11:21
Adding Available Options
11:16
Starting Threads For Bruteforce
08:27
Making Function To Run The Attack
11:05
Bruteforcing Router Login
09:40
Bypassing Antivirus With All Your Future Programs
13:43
Sending Malware With Spoofed Email
15:16
What's Next
04:16

About the Instructor

90.4% of students rated this instructor as excellent!

Jerry Banfield is a popular YouTuber with more than 285K followers and the founder of Uthena.com. He has more than 8 years of experience working as an entrepreneur online. His broad spectrum of sharing knowledge includes 144+ video classes, 21 books, 828+ blog posts, 1,034+ podcast episodes, and 2,630+ YouTube videos!

Jerry Banfield is popular not only on YouTube but also on Facebook (2,2M followers), Twitter (93K followers), and Instagram (16K followers).
Jerry holds a Bachelor’s degree in Science and Criminal Justice from the University of South Carolina and a Master's degree in Arts and Criminology from the University of South Florida.

During the last five years, he has worked hard on diet, exercising, weight control, relationships, health, money, business, speaking, spirituality, and attitude.

On BitDegree, you have an opportunity to be guided by this amazing instructor and advance your skills. You can choose from various Jerry Banfield courses to learn things like ethical hacking, programming, SEO, productivity and more. So take the best course for you and start learning!

See All Instructor Courses

BitDegree platform reviews