thanks man
H humanperson Member Oct 30, 2023 #21 Joined Jun 10, 2023 Messages 46 Hellcoins ♆114 thanks man Oct 30, 2023 #21
A amy97 New member Oct 30, 2023 #22 Joined Oct 30, 2023 Messages 6 Hellcoins ♆10 لطيف - جيد Oct 30, 2023 #22
I iskopisix Member Nov 4, 2023 #23 Joined Nov 4, 2023 Messages 25 Hellcoins ♆72 HackingAssets said: Course Curriculum : Introduction [1.1] Introduction to Information Security [1.2] Information-Security-Threats [1.3] Introduction to Cyber Security [1.4] The CIA Triad [1.5] Who are Hackers [1.6] Types of Hackers [1.7] Introduction to Ethical Hacking [1.8] Information Warfare [1.9] Need for Ethical Hackers [1.10] Careers in Ethical Hacking [1.11] Course Overview [1.12] General Terminologies [1.13] How To become an Ethical Hacker Module 1 Study Materials Basics and Environment setup [2.1] Advantages and Limitations of Cyber Security [2.2] Cyber Defense [2.3] Skills of an Ethical Hacker [2.4] Information Security Policies [2.5] Vulnerability Research [2.6] Introduction to OS Linux and it’s Evolution [2.7] Major Linux Distributions [2.8] Advantages of linux [2.9] Linux for Penetration Testing [2.10] Types of Hackers contd [2.11] Phases of Ethical Hacking [2.12] Introduction to Penetration Testing [2.13] Phases of Penetration Testing [2.14] Cyber Security vs Ethical Hacking [2.15] Ethical Hacking Laws and Policies [2.16] IT Act 2000 [2.17] Risk Management and Methodology [2.18] Software and Hardware Requirements for a Hacking Lab [2.19] Installing and Configuring VMWare WS [2.20] Dual boot vs Virtual Machine [2.21] Choosing and Downloading Kali Distro [2.22] Configuring VM For Kali Linux [2.23] Installing Kali Linux 2019.4 on VMWare (New) [2.24] Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal [2.25] Installing and Configuring DVWA [2.26] Installing and Configuring bWAPP [2.27] Installing Metasploitable on VM [2.28] Installing OWASP Broken Web Application on VMWare Module 2 Study Materials Linux Refresher [3.1] Introduction to Command Line [3.2] Windows command line [3.3] Linux command line [3.4] Linux File System [3.5] NTFS vs FAT vs EXT [3.6] Linux User Administration [3.7] Basic DOS Commands [3.8] DOS Networking Commands [3.9] Kali 2019.4 and Linux file system overview [3.10] Linux Elementary Commands [3.11] Linux Networking Commands [3.12] history and grep command [3.13] Working with Linux User Administration [3.14] Linux Working with Files, Permissions, and Directories [3.15] Working with Linux File Permissions [3.16] Linux Working with Groups [3.17] Linux Package Manager apt [3.18] Linux Useful Files Module 3 Study Materials Networking Refresher [4.1] The OSI Model – Open Systems Interconnection [4.2] More on OSI Model – Introduction to TCP-IP Model [4.3] TCP-IP v-s OSI – The Difference [4.4] Data Link Layer and MAC Addresses [4.5] Network Layer and IP Addresses [4.6] Classful IP Addressing, Private and Special Addresses [4.7] Classless IP Addressing [4.8] Transport Layer [4.9] Ports and Port Addressing [4.10] Proxies and Proxy Servers [4.11] Introduction to TOR [4.12] Introduction to VPN [4.13] Remote Login – SSH and telnet [4.14] Introduction to NAT and Port Forwarding Module 4 Study Material Footprinting and Reconnaissance [5.1] Introduction to Footprinting and Objectives [5.2] Footprinting through search Engines [5.3] Introduction to OSINT [5.4] Email Footprinting [5.5] Website Footprinting [5.6] Competitive Intelligence [5.7] Internet Archive [5.8] wget Mirroring [5.9] Website Mirroring with httrack [5.10] whois lookup [5.11] Introduction to DNS Footprinting [5.12] DNS Resource Records [5.13] DNS Footprinting with DNS Dumpster [5.14] dns.google.com [5.15] Network Footprinting [5.16] Introduction and Working of Traceroute [5.17] Traceroute Analysis [5.18] Introduction to Maltego [5.19] Maltego Information Gathering with domain name [5.20] Maltego Information Gathering with IP Address [5.21] Maltego Using the Tool Efficiently [5.22] Maltego Tranform Hub [5.23] Maltego Integration with Shodan [5.24] OSINT Framework [5.25] theHarvester [5.26] Shodan Introduction and First Look [5.27] Shodan Advanced Search with Dorks [5.28] WhatWeb [5.29] Wappalyzer [5.30] sublist3r [5.31] Subdomain Finder Websites [5.32] netdiscover [5.33] Major IP Block [5.34] Google Dorks Explained – What is Google Hacking [5.35] Working with Google Dorks – Google Dorking Practical [5.36] Footprinting with Social Engineering [5.37] Footprinting Countermeasures Module 5 Study Material Scanning [6.1] Basics of Scanning [6.2] Scanning Methodology [6.3] Working with ping command for live hosts [6.4] Angry IP Scanner [6.5] TCP Flags [6.6] TCP 3-Way Handshake [6.7] Introduction to Port Scanning [6.8] Port Scanning Methodology [6.9] Types of Port Scanning – TCP Connect Scan [6.10] Types of Port Scanning – TCP Stealth Scan [6.11] Types of Port Scanning – TCP Inverse Flag Scanning [6.12] Types of Port Scanning – TCP Xmas Scan [6.13] Types of Port Scanning – ACK Flag Probe Scanning [6.14] Types of Port Scanning – UDP Scan [6.15] Introduction to Nmap and First Look [6.16] Nmap – Port Scanning [6.17] Nmap – Advanced Port Scanning [6.18] Nmap – Bypass Firewalls and IDS [6.19] Nmap – Types of Scans [6.20] Port Scanning with hping3 [6.21] Port Scanning with pentest-tools [6.22] Colasoft Packet Builder [6.23] Introduction to Banner Grabbing [6.24] Banner Grabbing with ID Serve [6.25] Banner Grabbing with NetCraft [6.26] Banner Grabbing with netcat [6.27] Evading IDS and Firewalls [6.28] Scanning for Vulnerabilities [6.29] Nessus Vulnerability Scanner [6.30] Nmap Scripting Engine [6.31] nikto Web Vulnerability Scanner [6.32] OpenVas Installation and Configuration [6.33] Vulnerability Scanning with OpenVas [6.34] WordPress Vulnerability Scanning with wpscan [6.35] Mapping Networks [6.36] Network Topology Mapper [6.37] Spiceworks Network Mapper [6.38] LAN State Pro [6.39] Scanning Countermeasures Module 6 Study Materials Enumeration [7.1] Introduction to Enumeration [7.2] Techniques of Enumeration [7.3] NetBIOS enumeration [7.4] SMB Enumeration [7.5] Working wiith NetBIOS and SMB Enumeration [7.6] SNMP Enumeration [7.7] LDAP Enumeration [7.8] SMTP Enumeration [7.9] Working with SMTP Enumeration [7.10] DNS Enumeration [7.11] Introduction to DNS Zones [7.12] Introduction to DNS Zone Transfer [7.13] DNS Zone Transfer using host command [7.14] nslookup tool [7.15] DNS Zone Transfer using nslookup [7.16] dig command [7.17] DNS Zone Transfer using dig command [7.18] NTP Enumeration [7.19] Enumeration Countermeasures Module 7 Study Materials BONUS Section Port Scanning: Introduction to Masscan Watch Online On Mega [Hidden content] Click to expand... Ywss Nov 4, 2023 #23
HackingAssets said: Course Curriculum : Introduction [1.1] Introduction to Information Security [1.2] Information-Security-Threats [1.3] Introduction to Cyber Security [1.4] The CIA Triad [1.5] Who are Hackers [1.6] Types of Hackers [1.7] Introduction to Ethical Hacking [1.8] Information Warfare [1.9] Need for Ethical Hackers [1.10] Careers in Ethical Hacking [1.11] Course Overview [1.12] General Terminologies [1.13] How To become an Ethical Hacker Module 1 Study Materials Basics and Environment setup [2.1] Advantages and Limitations of Cyber Security [2.2] Cyber Defense [2.3] Skills of an Ethical Hacker [2.4] Information Security Policies [2.5] Vulnerability Research [2.6] Introduction to OS Linux and it’s Evolution [2.7] Major Linux Distributions [2.8] Advantages of linux [2.9] Linux for Penetration Testing [2.10] Types of Hackers contd [2.11] Phases of Ethical Hacking [2.12] Introduction to Penetration Testing [2.13] Phases of Penetration Testing [2.14] Cyber Security vs Ethical Hacking [2.15] Ethical Hacking Laws and Policies [2.16] IT Act 2000 [2.17] Risk Management and Methodology [2.18] Software and Hardware Requirements for a Hacking Lab [2.19] Installing and Configuring VMWare WS [2.20] Dual boot vs Virtual Machine [2.21] Choosing and Downloading Kali Distro [2.22] Configuring VM For Kali Linux [2.23] Installing Kali Linux 2019.4 on VMWare (New) [2.24] Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal [2.25] Installing and Configuring DVWA [2.26] Installing and Configuring bWAPP [2.27] Installing Metasploitable on VM [2.28] Installing OWASP Broken Web Application on VMWare Module 2 Study Materials Linux Refresher [3.1] Introduction to Command Line [3.2] Windows command line [3.3] Linux command line [3.4] Linux File System [3.5] NTFS vs FAT vs EXT [3.6] Linux User Administration [3.7] Basic DOS Commands [3.8] DOS Networking Commands [3.9] Kali 2019.4 and Linux file system overview [3.10] Linux Elementary Commands [3.11] Linux Networking Commands [3.12] history and grep command [3.13] Working with Linux User Administration [3.14] Linux Working with Files, Permissions, and Directories [3.15] Working with Linux File Permissions [3.16] Linux Working with Groups [3.17] Linux Package Manager apt [3.18] Linux Useful Files Module 3 Study Materials Networking Refresher [4.1] The OSI Model – Open Systems Interconnection [4.2] More on OSI Model – Introduction to TCP-IP Model [4.3] TCP-IP v-s OSI – The Difference [4.4] Data Link Layer and MAC Addresses [4.5] Network Layer and IP Addresses [4.6] Classful IP Addressing, Private and Special Addresses [4.7] Classless IP Addressing [4.8] Transport Layer [4.9] Ports and Port Addressing [4.10] Proxies and Proxy Servers [4.11] Introduction to TOR [4.12] Introduction to VPN [4.13] Remote Login – SSH and telnet [4.14] Introduction to NAT and Port Forwarding Module 4 Study Material Footprinting and Reconnaissance [5.1] Introduction to Footprinting and Objectives [5.2] Footprinting through search Engines [5.3] Introduction to OSINT [5.4] Email Footprinting [5.5] Website Footprinting [5.6] Competitive Intelligence [5.7] Internet Archive [5.8] wget Mirroring [5.9] Website Mirroring with httrack [5.10] whois lookup [5.11] Introduction to DNS Footprinting [5.12] DNS Resource Records [5.13] DNS Footprinting with DNS Dumpster [5.14] dns.google.com [5.15] Network Footprinting [5.16] Introduction and Working of Traceroute [5.17] Traceroute Analysis [5.18] Introduction to Maltego [5.19] Maltego Information Gathering with domain name [5.20] Maltego Information Gathering with IP Address [5.21] Maltego Using the Tool Efficiently [5.22] Maltego Tranform Hub [5.23] Maltego Integration with Shodan [5.24] OSINT Framework [5.25] theHarvester [5.26] Shodan Introduction and First Look [5.27] Shodan Advanced Search with Dorks [5.28] WhatWeb [5.29] Wappalyzer [5.30] sublist3r [5.31] Subdomain Finder Websites [5.32] netdiscover [5.33] Major IP Block [5.34] Google Dorks Explained – What is Google Hacking [5.35] Working with Google Dorks – Google Dorking Practical [5.36] Footprinting with Social Engineering [5.37] Footprinting Countermeasures Module 5 Study Material Scanning [6.1] Basics of Scanning [6.2] Scanning Methodology [6.3] Working with ping command for live hosts [6.4] Angry IP Scanner [6.5] TCP Flags [6.6] TCP 3-Way Handshake [6.7] Introduction to Port Scanning [6.8] Port Scanning Methodology [6.9] Types of Port Scanning – TCP Connect Scan [6.10] Types of Port Scanning – TCP Stealth Scan [6.11] Types of Port Scanning – TCP Inverse Flag Scanning [6.12] Types of Port Scanning – TCP Xmas Scan [6.13] Types of Port Scanning – ACK Flag Probe Scanning [6.14] Types of Port Scanning – UDP Scan [6.15] Introduction to Nmap and First Look [6.16] Nmap – Port Scanning [6.17] Nmap – Advanced Port Scanning [6.18] Nmap – Bypass Firewalls and IDS [6.19] Nmap – Types of Scans [6.20] Port Scanning with hping3 [6.21] Port Scanning with pentest-tools [6.22] Colasoft Packet Builder [6.23] Introduction to Banner Grabbing [6.24] Banner Grabbing with ID Serve [6.25] Banner Grabbing with NetCraft [6.26] Banner Grabbing with netcat [6.27] Evading IDS and Firewalls [6.28] Scanning for Vulnerabilities [6.29] Nessus Vulnerability Scanner [6.30] Nmap Scripting Engine [6.31] nikto Web Vulnerability Scanner [6.32] OpenVas Installation and Configuration [6.33] Vulnerability Scanning with OpenVas [6.34] WordPress Vulnerability Scanning with wpscan [6.35] Mapping Networks [6.36] Network Topology Mapper [6.37] Spiceworks Network Mapper [6.38] LAN State Pro [6.39] Scanning Countermeasures Module 6 Study Materials Enumeration [7.1] Introduction to Enumeration [7.2] Techniques of Enumeration [7.3] NetBIOS enumeration [7.4] SMB Enumeration [7.5] Working wiith NetBIOS and SMB Enumeration [7.6] SNMP Enumeration [7.7] LDAP Enumeration [7.8] SMTP Enumeration [7.9] Working with SMTP Enumeration [7.10] DNS Enumeration [7.11] Introduction to DNS Zones [7.12] Introduction to DNS Zone Transfer [7.13] DNS Zone Transfer using host command [7.14] nslookup tool [7.15] DNS Zone Transfer using nslookup [7.16] dig command [7.17] DNS Zone Transfer using dig command [7.18] NTP Enumeration [7.19] Enumeration Countermeasures Module 7 Study Materials BONUS Section Port Scanning: Introduction to Masscan Watch Online On Mega [Hidden content] Click to expand... Ywss
A ATreeShine New member Nov 11, 2023 #24 Joined Nov 11, 2023 Messages 3 Hellcoins ♆7 Nice Nov 11, 2023 #24
D detab man Member Nov 12, 2023 #25 Joined Nov 10, 2023 Messages 143 Hellcoins ♆187 Thanks mate Nov 12, 2023 #25
P pratapcyberzone New member Nov 17, 2023 #26 Joined Nov 17, 2023 Messages 21 Hellcoins ♆32 big course Nov 17, 2023 #26
K Kalpesh New member Nov 25, 2023 #27 Joined Nov 25, 2023 Messages 9 Hellcoins ♆21 Hii Nov 25, 2023 #27
U uchihasasuke Member Dec 18, 2023 #30 Joined Nov 4, 2023 Messages 73 Hellcoins ♆111 nice Dec 18, 2023 #30
K krishh neo Member Jan 18, 2024 #31 Joined Jan 18, 2024 Messages 54 Hellcoins ♆93 Ok Jan 18, 2024 #31
N npmanager52 Member Feb 9, 2024 #33 Joined Dec 31, 2023 Messages 87 Hellcoins ♆140 Hello Feb 9, 2024 #33
S satxx New member Feb 9, 2024 #35 Joined Feb 9, 2024 Messages 11 Hellcoins ♆28 Pls show the link Feb 9, 2024 #35
J jamspread New member Apr 29, 2024 #36 Joined Apr 29, 2024 Messages 9 Hellcoins ♆12 Thanks you for sharing this! Apr 29, 2024 #36
W Wican1961 New member Jun 23, 2024 #37 Joined Apr 27, 2024 Messages 20 Hellcoins ♆32 Thank you it will help me go through cybersec world Jun 23, 2024 #37
C cyberghost23 New member Jun 24, 2024 #38 Joined Jun 21, 2024 Messages 21 Hellcoins ♆25 too much love for hellofackers team Jun 24, 2024 #38