This plan includes
- Limitedfree coursesaccess
- Play & PauseCourse Videos
- VideoRecorded Lectures
- Learn onMobile/PC/Tablet
- Quizzes andReal Projects
- Lifetime CourseCertificate
- Email & ChatSupport
What you'll learn?
- Advance Bug Bounty Practical Training.
- Advance Ethical Hacking Practical Training.
- Advance Penetration Testing Training.
- Pwning Linux Machine.
- Pwning Windows Machine.
- Setup your first Amazon EC2 Instance (Elastic Compute Cloud).
- Post Exploitation Attacks.
- Finding and Submitting Bug Reports.
- Automating Bug Hunting Tasks.
- Setup and Install Kali Linux VM on VMWare Workstation.
- Basic Linux Networking, Files & Folders and Extra Commands.
- Learn to Setup and Use Burpsuite.
- Automation using burpsuite to find Sensitive/Critical Files.
- Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands.
- Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.
Course Overview
Advanced Ethical Hacking, Bug Bounty Hunting & Penetration Testing Course 2021
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Learn Advance skills for finding bugs in websites, penetration testing on Windows and Linux machines. Setting up free Labs on Amazon EC2 (Elastic Compute Cloud) Instance. At the end of this course, you will get links to download tools that we have used while making this course. You will learn the below skills from this course.
-
Setup and Install Kali Linux VM on VMWare Workstation.
-
Setup your first Amazon EC2 Instance (Elastic Compute Cloud).
-
Basic Linux Networking, Files & Folders, and Extra Commands.
-
Learn to Setup and Use Burpsuite.
-
Hunt Host Header Attack Bugs.
-
Create Custom Wordlists, Bruteforce Username and Password, Bypass Anti CSRF Protection.
-
Automation using burp suite to find Sensitive/Critical Files.
-
Use Google Dork to find Sensitive Files.
-
Find your first XSS Bug (Cross-Site Scripting) both manual and automation methods.
-
Exploiting XSS (Cross-Site Scripting) using Beef Framework and Injecting Malicious Commands.
-
Basic and Advance SQL Injection Attacks.
-
Command Injection Attacks.
-
Finding File Upload Vulnerabilities.
-
Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.
-
Detailed Guide to Find Bug Bounty Programs and How to Submit your first Bug.
-
Recent Proof of Concept (POC) videos of live Websites.
-
Introduction to HacktheBox and Steps to Register your account on HacktheBox.
-
Penetration Testing: Capturing User & Root flag on HacktheBox for both Windows and Linux Machines.
-
Download link for Free Tools which are used in this Course.
Disclaimer : All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cyber security should be familiar subjects to anyone using digital information and computers.
Pre-requisites
- Basic Level Networking Knowledge
- Basic Linux Knowledge
- Basic Virtualization Knowledge
Target Audience
- Beginner in Ethical Hacking.
- Beginner in Bug Bounty Hunting.
- Beginner in Penetration Testing.
- Ethical Hackers.
- Security Researchers.
- Penetration Testers.
- Bug Bounty Hunters.
Curriculum 71 Lectures 01:57:11
Section 1 : 00 Introduction
Section 2 : 01 Setting up Lab
- Lecture 1 :
- 01.03 AWS EC2 - Launching Kali Instance
- Lecture 2 :
- 01.02 VMware workstation Setup
- Lecture 3 :
- 01.01 Intro - Setting up Lab
Section 3 : 02 Basic Linux Commands
- Lecture 1 :
- 02.01 Basic Linux Commands Introduction
- Lecture 2 :
- 02.02 Commands Related to files and folders
- Lecture 3 :
- 02.03 Neworking Commands
- Lecture 4 :
- 02.04 Extra Commands
Section 4 : 03 Burpsuite Introduction
- Lecture 1 :
- 03.01 Burpsuite Introduction
- Lecture 2 :
- 03.02 Setting up BurpSuite and Burp Proxy
Section 5 : 04 Host Header Attack
- Lecture 1 :
- 04.01 Host Header Attack Intro
- Lecture 2 :
- 04.02 Open Redirection Host Header Attack
- Lecture 3 :
- 04.03 Other Host Header Attack Types
Section 6 : 05 Brute Force Attack
- Lecture 1 :
- 05.01 Brute Force Attack Introduction
- Lecture 2 :
- 05.02 Create Custom WordList & Kali Default WordList
- Lecture 3 :
- 05.03 Bruteforce Username & Password Using Burpsuit
- Lecture 4 :
- 05.04 Bruteforce Anti CSRF Token Protected Password
- Lecture 5 :
- 05.05 Bruteforce Password Using Hydra
Section 7 : 06 Sensitive File Found Vulnerability
- Lecture 1 :
- 06.01 Introduction - Sensitive File Found Vulnerability
- Lecture 2 :
- 06.02 Finding Sensitive Files Using Google Dork
- Lecture 3 :
- 06.03 Find Sensitive Files using BurpSuite
Section 8 : 07 Basic XSS Attack
- Lecture 1 :
- 07.05 Find XSS in Host Header
- Lecture 2 :
- 07.04 XSS Automation - Burpsuite & Hackbar
- Lecture 3 :
- 07.03 DVWA Medium Security -DOM_Reflected_Stored XSS
- Lecture 4 :
- 07.02 DVWA Low Security - Dom_Reflected_Stored XSS
- Lecture 5 :
- 07.01 Cross Site Scripting Introduction
Section 9 : 08 Advance XSS Attack
- Lecture 1 :
- 08.03 Inject Commands on Hooked Browser
- Lecture 2 :
- 08.02 Hook Victim to Beef using XSS
- Lecture 3 :
- 08.01 DVWA High Level XSS
Section 10 : 09 Basic SQL Injection Attack
- Lecture 1 :
- 09.05 Blind SQLI Medium Level Security - sqlmap
- Lecture 2 :
- 09.04 Blind SQLI Low Level Security - sqlmap
- Lecture 3 :
- 09.03 SQLI Medium Security using BurpSuite
- Lecture 4 :
- 09.02 SQL Manual SQLI Attack on Low Level Security
- Lecture 5 :
- 09.01 SQL Injection Introduction
Section 11 : 10 Advance SQL Injection Attack
- Lecture 1 :
- 10.01 SQL Injection on High Level Security
- Lecture 2 :
- 10.02 Blind SQL Injection - High Level Security
- Lecture 3 :
- 10.03 SQL Injection Attack on Live Website Part 1
- Lecture 4 :
- 10.04 SQL Injection Attack on Live Website Part 2
Section 12 : 11 Command Injection
- Lecture 1 :
- 11.01 Introduction to Command Injection
- Lecture 2 :
- 11.02 Command Injection attack on Low Level Security
- Lecture 3 :
- 11.03 Command Injection Attack on Medium Level Secur
- Lecture 4 :
- 11.04 Command Injection Attack on High Security
- Lecture 5 :
- 11.05 Command Injection Exploitation - Reverse Shell
Section 13 : 12 File Upload Vulnerability
- Lecture 1 :
- 12.01 Introduction to File Upload Vulnerability
- Lecture 2 :
- 12.02 Upload Shell and Execute Commands on Low Secur
- Lecture 3 :
- 12.03 Upload Shell and Execute Commands - Medium Sec
- Lecture 4 :
- 12.04 File Upload Vulneravility on High Security
Section 14 : 13 Local File Inclusion
- Lecture 1 :
- 13.01 File Inclusion Vulnerabilities - Introduction
- Lecture 2 :
- 13.02 Local File Inclusion - Low Security
- Lecture 3 :
- 13.03 Local File Inclusion - Medium Security
- Lecture 4 :
- 13.04 Local File Inclusion - High Security
Section 15 : 14 Remote File Inclusion
- Lecture 1 :
- 14.01 Remote File Inclusion - Low Security
- Lecture 2 :
- 14.02 Remote File Inclusion - Medium Security
Section 16 : 15 Submitting Bug Reports
- Lecture 1 :
- 15.01 Submitting Bug Reports
- Lecture 2 :
- 15.02 Live Website Bug Reports
Section 17 : 16 Live Website Vulnerabilities - POC ( Proof of Concept )
- Lecture 1 :
- ClickJacking Vulnerability
- Lecture 2 :
- Cross Site Scripting Attack
- Lecture 3 :
- Host Header Attack 1
- Lecture 4 :
- Host Header Attack Vulnerability
- Lecture 5 :
- Host Header Attack
- Lecture 6 :
- Parameter Tampering
- Lecture 7 :
- The Atlantic ClickJacking
Section 18 : 17 HackTheBox Introduction
- Lecture 1 :
- 17.01 Hack The Box Introduction
- Lecture 2 :
- 17.02 Register Hack the Box Account
Section 19 : 18 Capturing Windows Machine Flags
- Lecture 1 :
- 18.01 Finding retired windows machine user flag
- Lecture 2 :
- 18.02 Capture Reel2 Root Flag
Section 20 : 19 Capturing Linux Machine Flags
- Lecture 1 :
- 19.01 Capturing Linux Machine Flag
- Lecture 2 :
- 19.02 Capturing Linux Root Flag
- Lecture 3 :
- 19.03 Capturing User Flag - HTB Delivery
- Lecture 4 :
- 19.04 Capturing Root Flag - HTB Delivery
Section 21 : 20 Some useful tools and download links
- Lecture 1 :
- 20.01 Tools Download Link
Our learners work at
Frequently Asked Questions
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.Is there any free trial?
Currently, we do not offer any free trial.Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
62271 Course Views
3 Courses