TAKE THIS COURSE₹ 17,800
Course Currilcum
-
- Knowing JAP 00:00:00
- Elaborating JAP 00:00:00
-
- All About Chalo INDIA Startup Drive 00:00:00
- Introduction to Ethical Hacking 00:00:00
- Overview of Malware 00:00:00
- Viruses and Worms 00:00:00
- Ransomware and Crypto Malware 00:00:00
- Trojans and RATs 00:00:00
- Rootkits 00:00:00
- Keyloggers 00:00:00
- Adware and Spyware 00:00:00
- Bots and Botnets 00:00:00
- Logic Bombs 00:00:00
- What is Linux? 00:00:00
- Lab Setup 00:00:00
- lab setup Part 2 00:00:00
- Building our own lab 00:00:00
- Getting Started 00:00:00
- Getting Started Part 2 00:00:00
- Basic Commands of linux 00:00:00
- Files and the Filesystem 00:00:00
- Files and the Filesystem part2 00:00:00
- Users and Groups 00:00:00
- Installing software 00:00:00
- Installing software part 2 00:00:00
- Manually installing software 00:00:00
- Shells 00:00:00
- shells part 2 00:00:00
- Shells part 3 00:00:00
- More utilities 00:00:00
- more utilities part 2 00:00:00
- more utilities part 3 00:00:00
- Networking at Command line 00:00:00
- File transfer utilities 00:00:00
- Learning Linux Part ā 1 00:00:00
- Learning Linux Part ā 2 00:00:00
- Learning Linux Quiz 00:01:00
- Building our Lab 00:00:00
- Process management 00:00:00
- Process management part 2 00:00:00
- Ethical Hacking Methodology 00:00:00
- Latest lab setup 00:00:00
- Networking ā Electricity in Computing 00:00:00
- Networking Layers 00:00:00
- Introduction to Vulnerability 00:00:00
- VALC ā Vulnerability Assessment Life Cycle 00:00:00
- Using NMAP to find Vulnerability 00:00:00
- Introduction to Exploitation 00:00:00
- Manual Exploitation 00:00:00
- Reverse Shell and Bind shell 00:00:00
- Staged and Non-Staged Payloads 00:00:00
- Automatic Exploitation 00:00:00
- Introduction to Shell Scripting 00:00:00
- Text Editor 00:00:00
- Naming & Permission of Shell Script 00:00:00
- Shell Scripting ā Hello World 00:00:00
- Shell Scripting ā Why? 00:00:00
- User Defined Variables 00:00:00
- System Variables 00:00:00
- Command Line Argument 00:00:00
- Read Command 00:00:00
- Command Substitution 00:00:00
- For Loop 00:00:00
- Functions 00:00:00
- While Loop 00:00:00
- Until Loop 00:00:00
- If Else Condition 00:00:00
- Case Statement 00:00:00
- Bash Debugging 00:00:00
- Python Scripting 1 00:00:00
- DoppelgƤnger Domain 00:00:00
- Introduction to Web App Pentesting 00:00:00
- Spidering and Fuzzing with ZAP 00:00:00
- Bug Hunting Platforms 00:00:00
- Introduction to recon 00:00:00
- Enumerating Subdomains ā Sublist3r 00:00:00
- Enumerating Subdomains ā Assetfinder 00:00:00
- Finding Live Domains 00:00:00
- Sorting Live Subdomains 00:00:00
- Create Shell Script for Recon Unlimited
- Enumerating Subdomains ā Gobuster 00:00:00
- Subdomain & X-Request QUIZ 00:02:00
- Web challenges 1 00:00:00
- PHP Code Injection Lab 00:00:00
- Practical SQL injection 00:00:00
- Introduction to Cryptography 00:00:00
- Objectives of Cryptography 00:00:00
- Types of cryptography 00:00:00
- Encoding & Decoding 00:00:00
- symetric key encryption 00:00:00
- WORKING OF DES 00:00:00
- Cryptanalysis 00:00:00
- SSH 00:00:00
- Hashing 00:00:00
- Checking File Integritiy 00:00:00
- Crpytanalysis_practical 00:00:00
- Disk Encryption 00:00:00
- ssl 00:00:00
- Introduction to Android 00:00:00
- Android Architecture 00:00:00
- Connecting a Wireless Adapter To Kali 00:00:00
- Android App Structure Intents 00:00:00
- Android App Structure-Broadcast Receive 00:00:00
- M1: Improper Platform Usage 00:00:00
- M2: Insecure Data Storage 00:00:00
- M3: Insecure Communication 00:00:00
- M4: Insecure Authentication 00:00:00
- M5: Insufficient Cryptography 00:00:00
- M6: Insecure Authorization 00:00:00
- M7: Client Code Quality 00:00:00
- M8: Code Tampering 00:00:00
- M10: Extraneous Functionality 00:00:00
- Reversing APK -1 00:00:00
- Reversing APK-2 00:00:00
- Ethical Hacking OWASP Quiz 00:02:00
- Dynamic Analysis using Logcat 00:00:00
- Dynamic Analysis using Drozer (SQL Injection) 00:00:00
- Dynamic analysis using MobSF 00:00:00
- Quiz – 1 00:04:00
- Introduction to Active Directory 00:00:00
- Wreath 1-4 00:00:00
- AD 1 nmap 00:00:00
- AD 1 Recon 00:00:00
- AD 1 getting a shell 00:00:00
- AD 1 Enumeration 00:00:00
- AD 1 Getting the Root 00:00:00
- RED TEAM Engagement 00:00:00
- RED TEAM Engagement part 2 00:00:00
- RED TEAM Engagement part 3 00:00:00
- Red Team Intelligence 00:00:00
- Red Team Operation security 00:00:00
- Practical C2 00:00:00
- HTB Support Part 1 00:00:00
- HTB Support Part 2 00:00:00
- Windows management instrumentation 00:00:00
- Windows management instrumentation 2 00:00:00
- Binary Exploitation 00:00:00
- OSI & TCP/IP Model 00:00:00
- Network Devices 00:00:00
- Interfaces and Cables 00:00:00
- VLAN Part 2 Lab 00:00:00
- Connecting Devices LAB 00:00:00
- Command Injection Ć¢ā¬ā Looking glass 00:00:00
- Cookie manipulation Ć¢ā¬ā Baby Auth 00:00:00
- Weak nginx config- Baby nginxatsu 00:00:00
- XML External Entity Injection Ć¢ā¬ā baby WAFfiles Order 00:00:00
- Broken Authentication -Console 00:00:00
- Improper Error Handling Ć¢ā¬ā Baby BoneChewerCon 00:00:00
- XSS- Full Stack Conf 00:00:00
- Foothold of Kernel Exploit Ć¢ā¬ā Devel 00:00:00
- Hacking the Enterprise Network Part 1 00:00:00
- Kernal Explot Ć¢ā¬ā Privesc 00:00:00
- OWASP TOP TEN Ć¢ā¬ā Broken Access Control 00:00:00
- RastaLabs Ć¢ā¬ā Password Spraying 00:00:00
- Dante Ć¢ā¬ā Enterprise WordPress Hacking 00:00:00
- Broken Access control Ć¢ā¬ā IDOR 00:00:00
- OWASP Top 10- Cryptographic Failure 00:00:00
- Cryptographic Failure Ć¢ā¬ā HTTP 00:00:00
- Broken Access Control: User ID controlled by request parameter 00:00:00
- Broken access control- with unpredictable user IDs 00:00:00
- Broken access control Ć¢ā¬ā request parameter with data leakage in redirect 00:00:00
- Broken access control Ć¢ā¬ā Password Disclosure 00:00:00
- Dante Ć¢ā¬ā Web to Root 00:00:00
- URL Based Access Control 00:00:00
- No access control on one step 00:00:00
- Method Based Access Control 00:00:00
- No access control on one step 00:00:00
- Enumeration With Powerview and ADModule 00:00:00
- Referer Based Access Control 00:00:00
- Enumeration Ć¢ā¬ā OUs and GPOs 00:00:00
- Enumeration with ACL for Domain Rights/Permissions 00:00:00
- Enumeration of Trust in Forest 00:00:00
- Broken Access Control Ć¢ā¬ā Final Test 00:00:00