完成 2023 年道德黑客训练营,从零到精通
上次更新时间:2024-12-06
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
01 - Introduction
02 - Setting Up Our Hacking Lab
- 001 What is A Virtual Machine
- 002 Why Linux
- 004 Downloading Virtual Box & Kali Linux
- 006 Creating Our First Virtual Machine
- 007 Installing Kali Linux Operating System
- 008 Update 1 - New & Old Versions of Kali Linux
- 010 Full Screen Mode & Network Settings
- 011 Troubleshooting Network Connection in Kali Linux
- 013 5 Stages Of A Penetration Test
03 - Linux Operating System
04 - Reconnaissance & Information Gathering
- 001 What is Information Gathering
- 002 Obtaining IP Address, Physical Address Using Whois Tool
- 003 Whatweb Stealthy Scan
- 004 Aggressive Website Technology Discovering on IP Range
- 006 Gathering Emails Using theHarvester & Hunter.io
- 007 How To Download Tools Online
- 008 Finding Usernames With Sherlock
- 009 Bonus - Email Scraper Tool In Python 3
05 - Scanning
- 001 Theory Behind Scanning
- 002 TCP & UDP
- 004 Installing Vulnerable Virtual Machine
- 005 Netdiscover
- 006 Performing First Nmap Scan
- 007 Different Nmap Scan Types
- 009 Discovering Target Operating System
- 010 Detecting Version Of Service Running On An Open Port
- 011 Filtering Port Range & Output Of Scan Results
- 012 What is a FirewallIDS
- 013 Using Decoys and Packet Fragmentation
- 014 Security Evasion Nmap Options
06 - Python Coding Project #1 - Portscanner
07 - Vulnerability Analysis
08 - Exploitation & Gaining Access
- 001 What is Exploitation
- 002 What is a Vulnerability
- 003 Reverse Shells, Bind Shells
- 004 Metasploit Framework Structure
- 005 Msfconsole Basic Commands
- 006 Our First Exploit - vsftp 2.3.4 Exploitation
- 007 Misconfigurations Happen - Bindshell Exploitation
- 008 Information Disclosure - Telnet Exploit
- 009 Software Vulnerability - Samba Exploitation
- 010 Attacking SSH - Bruteforce Attack
- 011 Exploitation Challenge - 5 Different Exploits
- 012 Explaining Windows 7 Setup
- 013 Eternal Blue Attack - Windows 7 Exploitation
- 014 DoublePulsar Attack - Windows Exploit
- 015 BlueKeep Vulnerability - Windows Exploit
- 017 Update 2 - Routersploit
- 018 Update 3 - Router Default Credentials
- 019 Exercise Imposter Syndrome
09 - SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
10 - Gaining Access (Viruses, Trojans, Payloads ...)
11 - Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
12 - Python Coding Project #2 - Backdoor
13 - Website Application Penetration Testing
- 001 Website Penetration Testing Theory
- 002 HTTP Request & Response
- 003 Information Gathering & Dirb Tool
- 004 Burpsuite Configuration
- 005 ShellShock Exploitation
- 006 Command Injection Exploitation
- 007 Getting Meterpreter Shell With Command Execution
- 008 Reflected XSS & Cookie Stealing
- 009 Stored XSS
- 010 HTML Injection
- 011 SQL Injection
- 012 CSRF Vulnerability
- 013 Hydra Bruteforce Attack Example 1
- 014 Hydra Bruteforce Attack Example 2
- 015 Burpsuite Intruder
14 - Python Coding Project #3 - Login Bruteforce, Directory Discovery
15 - Man In The Middle - MITM
16 - Extra Wireless Access Point Cracking
17 - Extra Gaining Access To An Android Device
18 - Extra Introduction To Anonymity
19 - Extra Hacking Active Directory
20 - Where To Go From Here
21 - Learn Python Basics
22 - Learn Python Intermediate
- 001 Learning Python
- 002 Python Data Types
- 004 Numbers
- 005 Math Functions
- 006 DEVELOPER FUNDAMENTALS I
- 007 Operator Precedence
- 009 Optional bin() and complex
- 010 Variables
- 011 Expressions vs Statements
- 012 Augmented Assignment Operator
- 013 Strings
- 014 String Concatenation
- 015 Type Conversion
- 017 Formatted Strings
- 018 String Indexes
- 019 Immutability
- 020 Built-In Functions + Methods
- 021 Booleans
- 022 Exercise Type Conversion
- 023 DEVELOPER FUNDAMENTALS II
- 024 Exercise Password Checker
- 025 Lists
- 026 List Slicing
- 027 Matrix
- 028 List Methods
- 029 List Methods 2
- 030 List Methods 3
- 031 Common List Patterns
- 032 List Unpacking
- 033 None
- 034 Dictionaries
- 035 DEVELOPER FUNDAMENTALS III
- 036 Dictionary Keys
- 037 Dictionary Methods
- 038 Dictionary Methods 2
- 039 Tuples
- 040 Tuples 2
- 041 Sets
- 042 Sets 2
- 043 Breaking The Flow
- 044 Conditional Logic
- 045 Indentation In Python
- 046 Truthy vs Falsey
- 047 Ternary Operator
- 048 Short Circuiting
- 049 Logical Operators
- 050 Exercise Logical Operators
- 051 is vs ==
- 052 For Loops
- 053 Iterables
- 054 Exercise Tricky Counter
- 055 range()
- 056 enumerate()
- 057 While Loops
- 058 While Loops 2
- 059 break, continue, pass
- 060 Our First GUI
- 061 DEVELOPER FUNDAMENTALS IV
- 062 Exercise Find Duplicates
- 063 Functions
- 064 Parameters and Arguments
- 065 Default Parameters and Keyword Arguments
- 066 return
- 067 Methods vs Functions
- 068 Docstrings
- 069 Clean Code
- 070 args and kwargs
- 071 Exercise Functions
- 072 Scope
- 073 Scope Rules
- 074 global Keyword
- 075 nonlocal Keyword
- 076 Why Do We Need Scope
- 077 Modules in Python
- 079 Optional PyCharm
- 080 Packages in Python
- 081 Different Ways To Import
23 - Learn Python 3 Error Handling
24 - Learn Python 4 File IO
课程内容
24个章节 , 220个讲座
01 - Introduction
02 - Setting Up Our Hacking Lab
- 001 What is A Virtual Machine
- 002 Why Linux
- 004 Downloading Virtual Box & Kali Linux
- 006 Creating Our First Virtual Machine
- 007 Installing Kali Linux Operating System
- 008 Update 1 - New & Old Versions of Kali Linux
- 010 Full Screen Mode & Network Settings
- 011 Troubleshooting Network Connection in Kali Linux
- 013 5 Stages Of A Penetration Test
03 - Linux Operating System
04 - Reconnaissance & Information Gathering
- 001 What is Information Gathering
- 002 Obtaining IP Address, Physical Address Using Whois Tool
- 003 Whatweb Stealthy Scan
- 004 Aggressive Website Technology Discovering on IP Range
- 006 Gathering Emails Using theHarvester & Hunter.io
- 007 How To Download Tools Online
- 008 Finding Usernames With Sherlock
- 009 Bonus - Email Scraper Tool In Python 3
05 - Scanning
- 001 Theory Behind Scanning
- 002 TCP & UDP
- 004 Installing Vulnerable Virtual Machine
- 005 Netdiscover
- 006 Performing First Nmap Scan
- 007 Different Nmap Scan Types
- 009 Discovering Target Operating System
- 010 Detecting Version Of Service Running On An Open Port
- 011 Filtering Port Range & Output Of Scan Results
- 012 What is a FirewallIDS
- 013 Using Decoys and Packet Fragmentation
- 014 Security Evasion Nmap Options
06 - Python Coding Project #1 - Portscanner
07 - Vulnerability Analysis
08 - Exploitation & Gaining Access
- 001 What is Exploitation
- 002 What is a Vulnerability
- 003 Reverse Shells, Bind Shells
- 004 Metasploit Framework Structure
- 005 Msfconsole Basic Commands
- 006 Our First Exploit - vsftp 2.3.4 Exploitation
- 007 Misconfigurations Happen - Bindshell Exploitation
- 008 Information Disclosure - Telnet Exploit
- 009 Software Vulnerability - Samba Exploitation
- 010 Attacking SSH - Bruteforce Attack
- 011 Exploitation Challenge - 5 Different Exploits
- 012 Explaining Windows 7 Setup
- 013 Eternal Blue Attack - Windows 7 Exploitation
- 014 DoublePulsar Attack - Windows Exploit
- 015 BlueKeep Vulnerability - Windows Exploit
- 017 Update 2 - Routersploit
- 018 Update 3 - Router Default Credentials
- 019 Exercise Imposter Syndrome
09 - SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
10 - Gaining Access (Viruses, Trojans, Payloads ...)
11 - Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
12 - Python Coding Project #2 - Backdoor
13 - Website Application Penetration Testing
- 001 Website Penetration Testing Theory
- 002 HTTP Request & Response
- 003 Information Gathering & Dirb Tool
- 004 Burpsuite Configuration
- 005 ShellShock Exploitation
- 006 Command Injection Exploitation
- 007 Getting Meterpreter Shell With Command Execution
- 008 Reflected XSS & Cookie Stealing
- 009 Stored XSS
- 010 HTML Injection
- 011 SQL Injection
- 012 CSRF Vulnerability
- 013 Hydra Bruteforce Attack Example 1
- 014 Hydra Bruteforce Attack Example 2
- 015 Burpsuite Intruder
14 - Python Coding Project #3 - Login Bruteforce, Directory Discovery
15 - Man In The Middle - MITM
16 - Extra Wireless Access Point Cracking
17 - Extra Gaining Access To An Android Device
18 - Extra Introduction To Anonymity
19 - Extra Hacking Active Directory
20 - Where To Go From Here
21 - Learn Python Basics
22 - Learn Python Intermediate
- 001 Learning Python
- 002 Python Data Types
- 004 Numbers
- 005 Math Functions
- 006 DEVELOPER FUNDAMENTALS I
- 007 Operator Precedence
- 009 Optional bin() and complex
- 010 Variables
- 011 Expressions vs Statements
- 012 Augmented Assignment Operator
- 013 Strings
- 014 String Concatenation
- 015 Type Conversion
- 017 Formatted Strings
- 018 String Indexes
- 019 Immutability
- 020 Built-In Functions + Methods
- 021 Booleans
- 022 Exercise Type Conversion
- 023 DEVELOPER FUNDAMENTALS II
- 024 Exercise Password Checker
- 025 Lists
- 026 List Slicing
- 027 Matrix
- 028 List Methods
- 029 List Methods 2
- 030 List Methods 3
- 031 Common List Patterns
- 032 List Unpacking
- 033 None
- 034 Dictionaries
- 035 DEVELOPER FUNDAMENTALS III
- 036 Dictionary Keys
- 037 Dictionary Methods
- 038 Dictionary Methods 2
- 039 Tuples
- 040 Tuples 2
- 041 Sets
- 042 Sets 2
- 043 Breaking The Flow
- 044 Conditional Logic
- 045 Indentation In Python
- 046 Truthy vs Falsey
- 047 Ternary Operator
- 048 Short Circuiting
- 049 Logical Operators
- 050 Exercise Logical Operators
- 051 is vs ==
- 052 For Loops
- 053 Iterables
- 054 Exercise Tricky Counter
- 055 range()
- 056 enumerate()
- 057 While Loops
- 058 While Loops 2
- 059 break, continue, pass
- 060 Our First GUI
- 061 DEVELOPER FUNDAMENTALS IV
- 062 Exercise Find Duplicates
- 063 Functions
- 064 Parameters and Arguments
- 065 Default Parameters and Keyword Arguments
- 066 return
- 067 Methods vs Functions
- 068 Docstrings
- 069 Clean Code
- 070 args and kwargs
- 071 Exercise Functions
- 072 Scope
- 073 Scope Rules
- 074 global Keyword
- 075 nonlocal Keyword
- 076 Why Do We Need Scope
- 077 Modules in Python
- 079 Optional PyCharm
- 080 Packages in Python
- 081 Different Ways To Import