وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking and Penetration Testing with Kali Linux

سرفصل های دوره

Master the art of ethical hacking and safeguard networks with our comprehensive Kali Linux course


1. Ethical Hacking and Penetration Testing Kali Linux - Beginners
  • 1. Introduction Part 1
  • 2. Introduction Part 2
  • 3. Kali Linux
  • 4. Operating Systems Part 1
  • 5. Operating Systems Part 2
  • 6. Installing Operating Systems
  • 7. Installing vmware tools
  • 8. Configuring Kali Linux
  • 9. Installing Kali Linux on MacBook
  • 10. What is Footprinting
  • 11. Footprinting Objectives
  • 12. Footprinting Tools
  • 13. Google Hacking part 1
  • 14. Google Hacking continued
  • 15. Google Hacking further continued
  • 16. WhOIS lookup
  • 17. DNS footprinting Part 1
  • 18. DNS footprinting Part 2
  • 19. Determining Operation System
  • 20. Phishing Attacks Part 1
  • 21. Phishing Attacks Part 2
  • 22. Connecting information database
  • 23. Nmap and ZenMap
  • 24. Nmap and ZenMap continued

  • 2. Ethical Hacking & Penetration Testing Kali Linux-Social Engineering and Trojans
  • 1. The Harvester Part 1
  • 2. The Harvester Part 2
  • 3. WHOIS and dnsenum Part 1
  • 4. WHOIS and dnsenum Part 2
  • 5. Urlcrazy and dnsdict6 Part 1
  • 6. Urlcrazy and dnsdict6 Part2
  • 7. Dnsrecon
  • 8. Dnsmapping
  • 9. Introduction
  • 10. Types of Social Engineering
  • 11. Social Engineering attacks
  • 12. Spear-phishing Attack
  • 13. Phishing Attack Part 1
  • 14. Phishing Attack Part 2
  • 15. Mass mailer Attack
  • 16. Types of Computer Malwares Part 1
  • 17. Types of Computer Malwares Part 2
  • 18. Dangerous viruses of all time Part 1
  • 19. Dangerous viruses of all time Part 2
  • 20. Installing Rootkit Hunter
  • 21. command prompt backdoor Part 1
  • 22. Command prompt backdoor Part 2
  • 23. Backdoor & Gaining Access
  • 24. Backdoor & Maitaining Access Part 1
  • 25. Backdoor & Maitaining Access Part 2

  • 3. Ethical Hacking and Penetration Testing Kali Linux - Meterpreter, DNS and ICMP
  • 1. Command prompt backdoor
  • 2. Command prompt backdoor continued
  • 3. Meterpreter Backdoor
  • 4. I am Root
  • 5. Forensic escaping
  • 6. Hacking win7 SAM database
  • 7. Jack the ripper
  • 8. Meterpreter commands
  • 9. PDF embedded Trojan Horse
  • 10. Java Applet Attack Method Part 1
  • 11. Java Applet Attack Method Part 2
  • 12. MITM Attack
  • 13. ARP Poisoning
  • 14. DNS spoofing vs DNS poisoning
  • 15. DNS spoofing
  • 16. DNS spoofing continued
  • 17. DHCP Spoofing
  • 18. Port Stealing
  • 19. ICMP redirection Part 1
  • 20. ICMP redirection Part 2
  • 21. ICMP redirection Part 3
  • 22. Killing a Network
  • 23. Ddosing unauthorised Network
  • 24. Driftnet
  • 25. EvilGrade
  • 26. EvilGrade continued
  • 27. Introduction to DoS
  • 28. DoS vs DDoS
  • 29. Levels of Ddos Attacks
  • 30. Preventing DDoS Attacks
  • 31. DDoSing Windows 7 method 1
  • 32. DDoSing Windows 7 method 2

  • 4. Ethical Hacking and Penetration Testing Kali Linux - Hacking
  • 1. Hacking through Android Part 1
  • 2. Hacking through Android Part 2
  • 3. Hacking Android via Kali Linux
  • 4. Introduction to Password Cracking
  • 5. Password cracking Strategy
  • 6. Password cracking Strategy Continued
  • 7. Windows Password cracking Part 1
  • 8. Windows Password cracking Part 2
  • 9. Linux Hash Cracking
  • 10. Linux Hash Cracking continued
  • 11. Generating wordlist
  • 12. Generating wordlist continued
  • 13. CeWL cracking
  • 14. WEP and WPA
  • 15. WPA2
  • 16. 1X standard
  • 17. Wireless cracking via Kali
  • 18. Wireless cracking via Kali continued
  • 19. Activating payloads
  • 20. Activating payloads continued

  • 5. Ethical Hacking and Penetration Testing Kali Linux
  • 1. Msfconsole Explained
  • 2. Msfconsole Commands
  • 3. Exploits
  • 4. Payloads
  • 5. Generating Payloads
  • 6. Generating Payloads Continued
  • 7. Intro to Sql Injection
  • 8. Sql Injection to Google Dorks
  • 9. Sql Mapping Via Kali Linux
  • 10. Gathering Password And Cracking The Hash
  • 11. Introduction Part 1
  • 12. Introduction Part 2
  • 13. Hash Func and Oracle Method
  • 14. Birthday Theorem And Digital Signature
  • 15. Pros And Cons of Cryptography
  • 16. Importing Databases
  • 17. Exporting Databases Part 1
  • 18. Exporting Databases Part 2

  • 6. Advanced Penetration Testing
  • 1. Introduction to Pentesting
  • 2. Creating a Virtual Pentesting Lab
  • 3. Nmap Scanning
  • 4. Advanced Scanning
  • 5. Nmap Zombie Scan
  • 6. Nmap Timing Options
  • 7. Nmap Pre-Existing Scripts
  • 8. Simple Nmap Scripts
  • 9. Simple Nmap Scripts Continues
  • 10. Python Port Scanner
  • 11. More on Post Scanner
  • 12. SMTP Mail Server
  • 13. Samba Exploit
  • 14. NFS Exploit
  • 15. Grey Box and White Box
  • 16. The Malware
  • 17. Social Engineering
  • 18. Android Exploitation
  • 19. Android Exploitation Continues
  • 20. Hashdump and Password Phishing
  • 21. Hashdump and Password Phishing Continues
  • 22. Automated Handler with Resource
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 41609
    حجم: 8262 مگابایت
    مدت زمان: 1269 دقیقه
    تاریخ انتشار: 18 آذر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید