English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 38 lectures (8h 58m) | 3.80 GB
Step-by-step ethical hacking training using CTF challenges to develop real-world cybersecurity skills for all levels
Are you ready to dive into the exciting world of ethical hacking?
This course takes you through step-by-step ethical hacking training using CTF challenges, helping you develop real-world cybersecurity skills applicable across all levels. Whether you’re a beginner or an experienced professional, you’ll gain the practical knowledge needed to tackle security challenges effectively.
Master Ethical Hacking with Hands-On CTF Challenges
In this course, you will:
- Learn ethical hacking fundamentals through practical CTF challenges.
- Master essential Linux skills for penetration testing.
- Explore reconnaissance techniques using tools like Nmap, SMB, and DNS enumeration.
- Develop skills to create and exploit bind/reverse shells.
- Understand privilege escalation on Windows and Linux systems.
- Perform web security assessments using Burp Suite.
- Discover how to identify vulnerabilities in APIs and exploit them effectively.
- Work with industry-standard tools such as Kali Linux, Metasploit, and OpenSSL
Why Learn Ethical Hacking Through CTF Challenges?
CTF (Capture the Flag) challenges provide a fun, engaging, and hands-on approach to cybersecurity. Instead of theoretical concepts, you’ll gain practical experience, learning how to break into systems legally and ethically, preparing you for real-world cybersecurity roles. Whether you aim to become a penetration tester, cybersecurity analyst, or security engineer, this course equips you with essential skills.
What you’ll learn
- Learn the basics of ethical hacking and penetration testing using CTFs
- Learn how to work with Kali Linux
- Master Linux Basics for Hackers
- Discover the world of CTF challenges
- Learn port scanning and enumeration for services like DNS, SMB, NFS or SNMP
- Learn password hacking and how cryptography works with certificates
- Create bind and reverse shells and build backdoors
- Search with CVEs for vulnerabilities and exploits
- Discover the techniques for Privilege Escalation on Windows and Linux
- Learn web hacking basics with the Burp Suite
- Find vulnerabilities in APIs
Table of Contents
Chapter 1 Basics
1 Lets jump in
2 Phases of a hacking attack
3 Build your own hacking lab
4 Capture the flag How to start
5 The attacking platform
6 Linux for Hackers Privileges and owners
7 Linux for Hackers Special Permissions
8 Linux for Hackers Searching Files and Content
9 Linux for Hackers Software Services and Processes
Chapter 2 Reconnaissance
10 Portscanning with nmap
11 Connecting to services
12 SSH for hackers
13 SMB Enumeration
14 NFS Enumeration
15 SNMP Enumeration
16 DNS Enumeration
17 Web Reconnaissance for CTFs
Chapter 3 System Hacking
18 Password Hacking with John the Ripper
19 Coding and Encoding
20 Certificates with OpenSSL
21 Bind and reverse shells with netcat
22 CVE and Exploits
23 Metasploit Basics
24 Metasploit Advanced
25 Linux Privilege Escalation
26 Windows CLI and Powershell for Hackers
27 Windows Remoteshell via WinRM
28 Windows Privilege Escalation with System Services
29 Windows Privilege Escalation with Scripts
30 Windows Privilege Escalation with Metasploit
Chapter 4 Web Hacking
31 Web Hacking Basics
32 Burp Suite Basics
33 SQL Injection Basics
34 Automated SQL Injection Auditing with SQLmap
35 Command and Code Injection
36 API Hacking Basics
37 APIHacking with the Burp Suite
38 XSS CrossSite Scripting Basics
Resolve the captcha to access the links!