وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learn Ethical Hacking From Scratch 2024

سرفصل های دوره

Become an ethical hacker that can hack like black hat hackers and secure systems like cybersecurity experts


00. Training Overview
  • 01-Description-of-Training.html
  • 02-Video-Overview-(3-16-)

  • 01. Introduction
  • 01-Teaser---Hacking-a-Windows-10-Computer-&-Accessing-Their-Webcam-(7-20-)
  • 02-Course-Introduction-&-Overview-(2-53-)
  • 03-What-Is-Hacking-&-Why-Learn-It-(3-09-)

  • 02. Setting up a Hacking Lab
  • 01-Lab-Overview-(5-54-)
  • 01-Lab-Overview-(5-54-).pdf
  • 02-Initial-Preparation-(9-28-)
  • 02-Initial-Preparation-(9-28-).txt
  • 03-Installing-Kali-Linux-as-a-VM-on-Windows-(8-55-)
  • 04-Installing-Kali-Linux-as-a-VM-on-Apple-Computers-(Intel-&-Apple-Silicon)-(11-10-)
  • 05-Installing-Kali-Linux-as-a-VM-on-Linux-(10-46-)

  • 03. Linux Basics
  • 01-Basic-Overview-of-Kali-Linux-(5-10-)
  • 01-Basic-Overview-of-Kali-Linux-(5-10-).txt
  • 02-The-Terminal-&-Linux-Commands-(13-06-)
  • 02-The-Terminal-&-Linux-Commands-(13-06-).txt

  • 04. Network Hacking
  • 01-Introduction-to-Network-Penetration-Testing---Hacking-(2-21-)
  • 02-Networks-Basics-(4-28-)
  • 02-Networks-Basics-(4-28-).pdf
  • 03-Connecting-a-Wireless-Adapter-To-Kali-(6-51-)
  • 03-Connecting-a-Wireless-Adapter-To-Kali-(6-51-).txt
  • 04-What-is-MAC-Address-&-How-To-Change-It-(8-20-)
  • 04-What-is-MAC-Address-&-How-To-Change-It-(8-20-).txt
  • 05-Wireless-Modes-(Managed-&-Monitor)-(6-57-)
  • 05-Wireless-Modes-(Managed-&-Monitor)-(6-57-).txt

  • 05. Network Hacking - Pre Connection Attacks
  • 01-Packet-Sniffing-Basics-(6-40-)
  • 01-Packet-Sniffing-Basics-(6-40-).pdf
  • 02-WiFi-Bands---2.4Ghz-&-5Ghz-Frequencies-(7-54-)
  • 03-Targeted-Packet-Sniffing-(10-30-)
  • 04-Deauthentication-Attack-(Disconnecting-Any-Device-From-The-Network)-(8-09-)

  • 06. Network Hacking - Gaining Access - WEP Cracking
  • 01-Gaining-Access-Introduction-(1-09-)
  • 01-Gaining-Access-Introduction-(1-09-).pdf
  • 02-Theory-Behind-Cracking-WEP-Encryption-(5-47-)
  • 03-WEP-Cracking-Basics-(6-17-)
  • 04-Fake-Authentication-Attack-(6-45-)
  • 05-ARP-Request-Replay-Attack-(6-09-)

  • 07. Network Hacking - Gaining Access - WPA WPA2 Cracking
  • 01-Introduction-to-WPA-and-WPA2-Cracking-(3-42-)
  • 02-Hacking-WPA-&-WPA2-Without-a-Wordlist-(8-16-)
  • 03-Capturing-The-Handshake-(6-49-)
  • 04-Creating-a-Wordlist-(7-33-)
  • 05-Cracking-WPA-&-WPA2-Using-a-Wordlist-Attack-(6-26-)
      02-Hacking-WPA-&-WPA2-Without-a-Wordlist-(8-16-)
    • reaver.zip
      04-Creating-a-Wordlist-(7-33-)
    • Some-Links-To-Wordlists.txt

  • 08. Network Hacking - Gaining Access - Security
  • 01-Securing-Your-Network-From-Hackers.html
  • 02-Configuring-Wireless-Settings-for-Maximum-Security-(8-05-)

  • 09. Network Hacking - Post Connection Attacks
  • 01-Introduction-to-Post-Connection-Attacks-(2-10-)
  • Post Connection Attacks.pdf

  • 10. Network Hacking - Post-Connection Attacks - Information Gathering
  • 01-Installing-Windows-As-a-Virtual-Machine-(5-44-)
  • 02-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-(4-53-)
  • 03-Discovering-Devices-Connected-to-the-Same-Network-(8-04-)
  • 04-Gathering-Sensitive-Info-About-Connected-Devices-(Device-Name,-Ports....etc)-(6-45-)
  • 05-Gathering-More-Sensitive-Info-(Running-Services,-Operating-System....etc)-(8-08-)

  • 11. Network Hacking - Post Connection Attacks - MITM Attacks
  • 01-What-is-ARP-Poisoning-(9-04-)
  • 02-Intercepting-Network-Traffic-(6-30-)
  • 03-Bettercap-Basics-(7-43-)
  • 04-ARP-Spoofing-Using-Bettercap-(8-17-)
  • 05-Spying-on-Network-Devices-(Capturing-Passwords,-Visited-Websites...etc)-(5-11-)
  • 06-Creating-Custom-Spoofing-Script-(9-42-)
  • 07-Bypassing-HTTPS-(11-12-)
  • 08-Bypassing-HSTS-(10-08-)
  • 09-Bypassing-HSTS-Recap---Firefox-(9-46-)
  • 10-Bypassing-HSTS-Recap---Chrome-(6-50-)
  • 11-DNS-Spoofing---Controlling-DNS-Requests-on-The-Network-(10-51-)
  • 12-Injecting-Javascript-Code-(10-26-)
  • 13-Doing-All-of-The-Above-Using-a-Graphical-Interface-(10-29-)
  • 14-Wireshark---Basic-Overview-&-How-To-Use-It-With-MITM-Attacks-(8-24-)
  • 15-Wireshark---Sniffing-&-Analysing-Data-(5-30-)
  • 16-Wireshark---Using-Filters,-Tracing-&-Dissecting-Packets-(6-28-)
  • 17-Wireshark---Capturing-Passwords-&-Anything-Sent-By-Any-Device-In-The-Network-(7-48-)
  • 18-Creating-a-Fake-Access-Point-(Honeypot)---Theory-(7-29-)
  • 19-Creating-a-Fake-Access-Point-(Honeypot)---Practical-(9-33-)
      07-Bypassing-HTTPS-(11-12-)
    • hstshijack-v2.0.zip
      08-Bypassing-HSTS-(10-08-)
    • How To Fix the dial tcp error.txt
    • bettercap.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43299
    حجم: 1785 مگابایت
    مدت زمان: 408 دقیقه
    تاریخ انتشار: ۶ بهمن ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید