Uthena

Course description

Would you like to learn how to do ethical hacking and penetration testing because this will help you level up your cyber security and ethical hacking career?

In this course you will learn:

  • Introduction to Ethical Hacking
  • Build your hacking environment!
  • Linux Terminal and CLI
  • What is Tor? How can you use it to protect your anonymity online?
  • ProxyChains for using proxy servers, hiding your ip, and obtaining access.
  • What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
  • What is a macchanger? How can you use it to change your mac address?
  • Footprinting with Nmap and external resources.
  • Attacking wireless networks. Overview of the tools.
  • Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.
  • Signal jamming and denial of service.
  • SSL strips.
  • and much more…


This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

  • 2

    Build your hacking environment!

    • Installing VirtualBox with RPM and why use a virtual machine.

    • Installing VirtualBox using the default package manager from repositories.

    • Creating the virtual environment.

    • Installing VirtualBox on Windows.

    • Kali Linux installation within a virtual environment.

    • Booting up Kali Linux for the first time.

    • Installing VirtualBox Guest Additions.

  • 3

    Linux Terminal and CLI

    • Introduction to the Linux terminal.

    • Linux command line interface (CLI) basics.

    • Linux CLI explained in greater detail.

  • 4

    What is Tor? How can you use it to protect your anonymity online?

    • Using Tor to protect your anonymity online.

    • Tor continued.

  • 5

    ProxyChains for using proxy servers, hiding your ip, and obtaining access.

    • Proxychains for using proxy servers, hiding your IP, and obtaining access.

    • Proxychains - part 2.

    • Proxychains - part 3.

  • 6

    What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?

    • Staying anonymous with a virtual private network (VPN).

    • VPN continued.

  • 7

    What is a macchanger? How can you use it to change your mac address?

    • Macchanger - part 1.

    • Macchanger - part 2.

  • 8

    Footprinting with Nmap and external resources.

    • Footprinting with nmap.

    • Nmap continued.

    • External resources using public listings of known vulnerabilities.

  • 9

    Attacking wireless networks. Overview of the tools.

    • Introduction to wifi cracking WPA/WPA2.

    • Aircrack and reaver installation.

    • Installing aircrack-ng on Windows and crunch on Linux.

  • 10

    Breaking WPA/WPA2 encryption. WiFi hacking and WiFi hacker training.

    • Aircrack-ng and crunch usage example - part 1.

    • Aircrack-ng and crunch usage example - part 2.

    • Aircrack-ng and crunch usage example - part 3.

    • Cracking WPS pins with reaver - part 1.

    • Cracking WPS pins with reaver - part 2.

    • Cracking WPS pins with reaver - part 3.

  • 11

    Signal jamming and denial of service.

    • Signal jamming and denial of service.

    • Signal jamming and denial of service - continued.

  • 12

    SSL strips.

    • SSL strip - part 1.

    • SSL strip - part 2.

    • SSL strip - part 3.

  • 13

    Let's have a bit of fun!

    • Funny things - part 1.

    • Funny things - part 2.

    • Funny things - part 3.

  • 14

    Evil twin method! Clone wireless access points to steal data.

    • Evil twin - part 1.

    • Evil twin - part 2.

    • Evil twin - part 3.

  • 15

    Attacking routers to give you free reign over the entire network!

    • Using known vulnerabilities - part 1.

    • Using know vulnerabilities - part 2.

    • Using known vulnerabilities - part 3.

  • 16

    DNS setting hacking to redirect users with post authentication exploitation.

    • Post authentication exploitation (DNS) - part 1.

    • Post authentication exploitation (DNS) - part 2.

    • Post authentication exploitation (DNS) - part 3.

  • 17

    Website attacks with SQL injections.

    • SQL injection - part 1.

    • SQL injection - part 2.

    • SQL injection - part 3.

    • SQL injection - part 4.

    • SQL injection - part 5.

  • 18

    Brute-forcing methods for cracking passwords.

    • Cracking hashes.

    • Cracking linux passwords with john the ripper - part 1.

    • Cracking linux passwords with john the ripper - part 2.

    • Cracking Windows passwords with john the ripper.

    • Hydra usage - part 1.

    • Hydra usage - part 2.

  • 19

    Denial of Service (DoS) attacks demonstrated and explained.

    • DoS attack demo part 1 - introduction to denial of service attacks.

    • DoS attack demo part 2 - combine slowloris.pl with nmap.

    • DoS attack demo part 3 - featuring ha.ckers.org.

  • 20

    Reverse shells. Gain remote control of any device!

    • Intro to metasploit and reverse shells.

    • Metasploit continued.

    • Making reverse shells persistent on another system and escalating privileges.

    • Creating a persistent reverse shell with Metasploit.

    • Netcat.

    • How to upload a reverse shell onto a web server.

Private Label Rights (PLR)

This course is available with Private Label Rights (PLR).  

When you buy a course with private label rights on Uthena, the author of the course gives you permission to download the course and sell it as your own on your website according to the terms of the PLR license included.

If you would like to know more about the license terms, please visit this page.

After purchasing, you will have access to the course on Uthena and you will receive the PLR license with a download link and a special bonus.

Uthena

See a sample of the PLR license.

You have the option to buy Master Resell Rights (MRR) to this course, which allows your customers to have the right to sell the course as well.

See a sample of the MRR license.

Take this course today!

"The Complete Ethical Hacking Course: Beginner to Advanced!"

  • $37.81

    Lifetime enrollment

    Buy Now!
  • $297.00

    Course + Master Resell Rights

    Buy Now!
  • $67.81

    Course + Private Label Rights

    Buy Now!

You can buy Private Label Rights (PLR) for this course and others, click here.

You can buy Master Resell Rights (MRR) for this course and others, click here.