- 2- Basics of networking
- Quiz 2
- 3- Penetration Testing Introduction
- Quiz 3
- 4.1 - Information Gathering: Google Hacking
- 4.2 - Information Gathering: Whois
- 4.3 - Information Gathering: DNS Enumeration
- 4.4 - Information Gathering: Other Tools
- 4.5 - Information Gathering: Next Steps
- Quiz 4
- 5.1 - Scanning & Footprinting: Setting Up the target
- 5.2 - Scanning & Footprinting: Port Scanning basics
- 5.3 - Scanning & Footprinting: Port Scanning using NMAP
- 5.4 -Scanning & Footprinting: Enumeration using NMAP
- 6.1 - Attack & Exploitation: Exploitation Introduction and Metasploit
- 6.2 - Attack & Exploitation: Bruteforce Attack
- 6.3 - Attack & Exploitation: War File upload Exploit
- 6.4 - Attack & Exploitation: Other Attack
- 7.1 - Vunerability Assessment Introduction
- 7.2 - Vunerability Assessment: Nessus Tool
- 7.3 - Vunerability Assessment: Next Steps
- 8.1 - Web Hacking: Basics of Web Application
- 8.2 - Web Hacking: SQL injection
- 8.3 - Web Hacking: Cross Site Scripting
- 8.4 - Web Hacking: Next Steps
- 9.1 - ARP Poisoning Introduction
- 9.2 - ARP Poisoning Attack
- 10- Project: Metasploitable 1
About this Training
In this course you will learn about the best known tools and technologies which Professional Ethical Hackers use. You will learn about Kali Linux, Penetration Testing, Google Hacking, Port Scanning, attacks and exploitation, Vulnerability Assessment, Web Hacking, ARP Poisoning and much more. No prior experience of Ethical Hacking is required to learn this course!
Clear your Doubts
Project in this Training
Perform end to end Pentration test on Metasploitable 1. Use different tools for ports scans, service scans, oprating system scans. Look for vulnerable services and exploit it.
Perform Vulnerability Assessment(VA). Analyse the nessus report and cofirm the vulnerablilities manually.
Make a VA/PT report showing all the vulnerabilities with step by step screenshots and walkthrough.
hi,hacking any account without their permission is a crime and it may land you in trouble
2. Bruteforce attack is not always guaranteed for hacking.
Hack Gmail/Yahoo/Facebook Password by Brute Force attack using Hydra-Backtrack
A password.txt file with a list of expected
passwords, Either write your own or get one
Backtrack 5 (any version)
Lets Hack something for real,
Turn on your Backtrack machine
Navigate to Applications > Backtrack >
Privilege Escalation > Password Attacks >
Online Attacks > hydra-gtk and launch the
Now, under the Target tab set following
Click on Password tab, set these parameters
Now move to start tab and click on start
button at the bottom to begin the attack.
If everything goes well, then you'll get the
answered by VikasMishra, [ Jul, 2017 ]
Hi, In Kali Linux there was various tools,some of the most popular tools are:-
1. Metasploit:-Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in Kali Linux. It is an offensive tool and to attack your own or your company’s infrastructure to check for security loopholes and to fix them before an actual attacker can break in.
2. Nmap (Network Mapper):-Nmap is used to scan whole networks for open ports and for mapping networks and a lot more things. It is mainly used for scanning networks and discover the online PC’s and for security auditing. Most of the network admins use Nmap to discover online computer’s, open ports and manage services running. It uses raw IP packets in such a creative way to know what hosts are available on the network and what ports are open which services (applications name and version) are running on those systems.
3. Armitage:- Armitage is a graphical cyber attack management tool and it provides a GUI interface for all Metasploit features and makes it easier to understand and use. If you really want to understand and grow into the advanced features then Armitage is a great choice for you.
Armitage organizes Metasploit’s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and maneuver.
4. Jhon The Ripper (JTR):-Jhon The Ripper is a very popular tool for password cracking it is also known as JTR and also it has the coolest name of all the tools. Mostly it is simply referred as ‘Jhon’ it is the most commonly used tool for password cracking and to perform dictionary attacks. Jhon The Ripper takes text files, referred as a ‘wordlist’, which contains the list of commonly used passwords or real passwords cracked before, and it encrypts the password in the wordlist in the same way as the password which is being cracked. And then compare the output string with the encrypted string of the provided password.
This tool can be used to perform different types of dictionary attacks. If you are confused between Jhon The Ripper and THC Hydra then the most simple way to explain it is that THC Hydra is used to crack a password for online services and Jhon The Ripper is used for offline password cracking.
5. Wireshark:-Wireshark is an open source tool for network analysis and profiling network traffic and packets and this kind of tools are referred as Network Sniffers.
Wireshark, previously known as Ethereal, is used to monitor network traffic and analyze the packets that are sent out. Wireshark can intercept network traffic ranging from connection level information to bits of the information which make up a signal packet. All of this is done in real time and show to the user in a readable format. There are a lot of developments made in the tool (platform) over the years and it includes filters, color-coding the packets depending on their information and these features really help the penetration testers to dig deeper in the network traffic and inspect the packets in detail.
There are other various tools like THC Hydra,Burp Suite, OWASP Zed,Ettercap.
These are not the only tools that are helpful and can be used for penetration testing there are many other tools out there
answered by VikasMishra, [ Jul, 2017 ]
You can enter into this field by obtaining vendor certifications like CCNA, CCNP, CCIE (Cisco track) or JNCIA, JNCIP, JNCIE (Juniper track) etc. By following this certification track you can be able to design , install, configure and troubleshoot small to large sized network.
To start you should get at the very least a CCENT or JNCIA. This is just a simple certificate saying you know the basics such as IP addressin, subnettin, switching and basic routing.
Hope this helps.
answered by VikasMishra, [ Jul, 2017 ]
Can I download the videos & learn?
You can re-watch the videos as many times you wish but we do not allow downloading on our platform as we keep track of your progress in regards to the course you learn.
What is special about Twenty19 courses?
Twenty19 Training are fun to learn and they are structured to be easily understood by anyone.The courses are developed with College students in mind.So courses will have a lot of real world examples and Twenty19 courses are easy to take up and earn a certificate.
If I have any doubt while learning, How can I clear my doubts?
You can raise your doubt in Clear your doubts forum anytime, training experts will answer all your questions. You can also reach us at +91 9962033243 (give us a missed call), send an SMS or drop an email to email@example.com, one of our team member will call you to support.
Is it safe to use my debit/credit card for making the payment?
No doubt, Your transaction is always safe and secure with Twenty19.
Do I get a certificate of completion?
Yes!! you will receive an E-certificate from us once you complete the training. You can include this is in your Resume to get placed better.
How will I receive the certificate?
Twenty19 certificates will be emailed to your Twenty19 registered Email ID .The very next day of your training completion you will be receiving the certificate.You can download and print your certificate.