Course Description:
Part 1.
- Course Introduction.
- Prerequisites and warnings.
- Key terms for the course (Tor, proxy chains, phishing, RAT, etc.)
- Installing Kali Linux on different operating systems. (Demonstrating in detail how to use different systems, solving connection problems, installing a virtual machine, a short introduction to the terminal, repositories)
Part 2
- Installing guest add-ons, for full-screen VirtualBox.
- Terminal (Interface, setup, features).
- Command line (Basic commands, what they are used for, introduction to the logic of the Linux terminal).
- Tor (what it is for, how it works, installation, connectivity, introduction to hidden network, demonstration).
- ProxyChain (proxy chains, what it’s for, how it works, setup, using it together with Tor to anonymize traffic completely, checking anonymity with third-party services).
- Also, discussion and demonstration of solutions to various problems that you can encounter in practice in the second part.
Part 3
- VPN what it is, how to use it and for what purposes. Installation. How to avoid dns licks.
- MacChanger what it is, what it’s for, installation, use.
- Introduction to footprinting.
- Nmap what it is. Scanning. Detecting the physical location of the ipi. Everything about it.
- External resources for finding vulnerabilities of different devices and ready-made scripts for hacking.
- Introduction to wireless network attack, overview of tools for breaking different types of encryption (WEP, WPA/WPA2)
- AirCrack and Reaver installation.
Part 4
- Installing AirCrack on Windows.
- Introduction to Crunch.
- Theoretical background of bruteforce hacking.
- Installing a wireless adapter for VirtualBox. Problem solving.
- Using AirCrack and Crunch.
- Wi-Fi network scanning.
- Dos attack on wireless networks.
- Four-way Handshake.
- WPA/WPA2 encryption cracking.
- Bruteforce in practice.
- An alternate method of dotup point hacking – WPS.
- Using Reaver for hotspot hacking. Demonstration in practice.
Part 5
- Dos attack on wireless network.
- How to disconnect all/specific clients from the network.
- SSL Strip and ARP Spoofing.
- Removing encryption from sites.
- Getting user credentials on various sites.
- Having a bit of fun.
- Pranks. Changing the victim’s site display.
- Scripting and software.
- Evil Twin.
- Creating a feq access point for data theft.
Part 6
- Concluding the Evil Twin theme.
- Brief overview of network traffic monitoring with WireShark.
- Hacking routers. Exploiting device vulnerabilities.
- Identity sniffing without authentication.
- Working with dns.
- Redirecting traffic through your own web server for data theft.
- Cloning sites.
- SQL injection and what they are used for.
- A little bit about databases.
- Setting up your own laboratory for testing sites.
Part 7
- Continuation of the theme of SQL injection.
- Using sessions, how and what they are used for.
- Extraction of site databases and information from them.
- Hash hacking. Few tools.
- Cracking Linux system passwords.
- How to get Root rights on someone else’s computer.
- John the Ripper.
- Cracking Windows system passwords.
- Using Hydra for bruteforcing sites with login and password forms.
Part 8
- Finishing work with Hydra.
- Dos and ddos attacks (full and partial).
- Web server attack demo.
- Scanning the server for vulnerabilities to a dos attack.
- Using dos attack script.
- Introduction to Metasploit.
- Reverse shells.
- Creating a reverse shell and using it.
- Gaining full control over the victim’s computer.
- Creating a stable shell so that it can be launched automatically.
Part 9
- Continuation of the topic of reverse shells.
- NetCat.
- Inverse shell or secure chat.
- Loading the reverse shell on the web server.
- Beginning of a new topic on creating the keylogger. Introduction.
- Installation and configuration of necessary software.
- Eclipse, Java Development Kit, MinGW.
- Overview of the Environment.
- Basics of C++ functions and operators.
Part 10
- Fundamentals of programming.
- Types of variables.
- Math operations.
- Types of functions.
- Pointers.
- Files.
- Examples.
- Writing a keylogger.
- Writing into a file.
- Filtering individual keys.
- Case detection.
- Special characters (Esc, !@#$%^, etc).
- Hiding keylogger.