Guides and Review Jan 03, 2023

A course on hacking

Course Description: Part 1. Course Introduction. Prerequisites and warnings….

Course Description:

Part 1.

  • Course Introduction.
  • Prerequisites and warnings.
  • Key terms for the course (Tor, proxy chains, phishing, RAT, etc.)
  • Installing Kali Linux on different operating systems. (Demonstrating in detail how to use different systems, solving connection problems, installing a virtual machine, a short introduction to the terminal, repositories)

Part 2

  • Installing guest add-ons, for full-screen VirtualBox.
  • Terminal (Interface, setup, features).
  • Command line (Basic commands, what they are used for, introduction to the logic of the Linux terminal).
  • Tor (what it is for, how it works, installation, connectivity, introduction to hidden network, demonstration).
  • ProxyChain (proxy chains, what it’s for, how it works, setup, using it together with Tor to anonymize traffic completely, checking anonymity with third-party services).
  • Also, discussion and demonstration of solutions to various problems that you can encounter in practice in the second part.

Part 3

  • VPN what it is, how to use it and for what purposes. Installation. How to avoid dns licks.
  • MacChanger what it is, what it’s for, installation, use.
  • Introduction to footprinting.
  • Nmap what it is. Scanning. Detecting the physical location of the ipi. Everything about it.
  • External resources for finding vulnerabilities of different devices and ready-made scripts for hacking.
  • Introduction to wireless network attack, overview of tools for breaking different types of encryption (WEP, WPA/WPA2)
  • AirCrack and Reaver installation.

Part 4

  • Installing AirCrack on Windows.
  • Introduction to Crunch.
  • Theoretical background of bruteforce hacking.
  • Installing a wireless adapter for VirtualBox. Problem solving.
  • Using AirCrack and Crunch.
  • Wi-Fi network scanning.
  • Dos attack on wireless networks.
  • Four-way Handshake.
  • WPA/WPA2 encryption cracking.
  • Bruteforce in practice.
  • An alternate method of dotup point hacking – WPS.
  • Using Reaver for hotspot hacking. Demonstration in practice.

Part 5

  • Dos attack on wireless network.
  • How to disconnect all/specific clients from the network.
  • SSL Strip and ARP Spoofing.
  • Removing encryption from sites.
  • Getting user credentials on various sites.
  • Having a bit of fun.
  • Pranks. Changing the victim’s site display.
  • Scripting and software.
  • Evil Twin.
  • Creating a feq access point for data theft.

Part 6

  • Concluding the Evil Twin theme.
  • Brief overview of network traffic monitoring with WireShark.
  • Hacking routers. Exploiting device vulnerabilities.
  • Identity sniffing without authentication.
  • Working with dns.
  • Redirecting traffic through your own web server for data theft.
  • Cloning sites.
  • SQL injection and what they are used for.
  • A little bit about databases.
  • Setting up your own laboratory for testing sites.

Part 7

  • Continuation of the theme of SQL injection.
  • Using sessions, how and what they are used for.
  • Extraction of site databases and information from them.
  • Hash hacking. Few tools.
  • Cracking Linux system passwords.
  • How to get Root rights on someone else’s computer.
  • John the Ripper.
  • Cracking Windows system passwords.
  • Using Hydra for bruteforcing sites with login and password forms.

Part 8

  • Finishing work with Hydra.
  • Dos and ddos attacks (full and partial).
  • Web server attack demo.
  • Scanning the server for vulnerabilities to a dos attack.
  • Using dos attack script.
  • Introduction to Metasploit.
  • Reverse shells.
  • Creating a reverse shell and using it.
  • Gaining full control over the victim’s computer.
  • Creating a stable shell so that it can be launched automatically.

Part 9

  • Continuation of the topic of reverse shells.
  • NetCat.
  • Inverse shell or secure chat.
  • Loading the reverse shell on the web server.
  • Beginning of a new topic on creating the keylogger. Introduction.
  • Installation and configuration of necessary software.
  • Eclipse, Java Development Kit, MinGW.
  • Overview of the Environment.
  • Basics of C++ functions and operators.

Part 10

  • Fundamentals of programming.
  • Types of variables.
  • Math operations.
  • Types of functions.
  • Pointers.
  • Files.
  • Examples.
  • Writing a keylogger.
  • Writing into a file.
  • Filtering individual keys.
  • Case detection.
  • Special characters (Esc, !@#$%^, etc).
  • Hiding keylogger.


Dear Guests and Freinds !

Remember that Tape Project is NOT responsible for other forums and markets!

Tape is NOT responsible for sites which buy advertising from us!

We are NOT responsilbe for vendor's and admin's actions from other sites!