• Course Categories
    • Business, Management & Law
    • Finance
    • Personal Development
    • Productivity
    • Marketing
    • Trading
    • Design
    • Health & Fitness
    • Languages
    • Videography
    • Photography
    • Web Development
  • Cart
  • Gift Bundles
  • Popular courses
  • All Courses
  • All Access Pass
      • Sign UpLogin
    EDPLX.COM | Over 1000 Home Study, Distance Learing Courses.EDPLX.COM | Over 1000 Home Study, Distance Learing Courses.
    • Course Categories
      • Business, Management & Law
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Design
      • Health & Fitness
      • Languages
      • Videography
      • Photography
      • Web Development
    • Cart
    • Gift Bundles
    • Popular courses
    • All Courses
    • All Access Pass
    • Browse
    • Cart
    • All Access Pass
      • Sign UpLogin
      • Build
      • Business
      • Finance
      • Personal Development
      • Productivity
      • Marketing
      • Trading
      • Create
      • Design
      • Health & Fitness
      • Languages
      • Photography
      • Videography
      • Web Development
      • All Courses
      • Gift Bundles
      • Popular Courses
      • Live Courses

      Information Technology

      Test
      • Home
      • All courses
      • Information Technology
      • Certified Ethical Hacking Course
      CoursesInformation TechnologyCertified Ethical Hacking Course
      • Introduction and Installation 4

        • Lecture1.1
          Introduction to the course 05 min
        • Lecture1.2
          VirtualBox installation 16 min
        • Lecture1.3
          Kali Linux installation 14 min
        • Lecture1.4
          Enabling full-screen 18 min
      • Basic Linux Commands 3

        • Lecture2.1
          Basic commands part 1 10 min
        • Lecture2.2
          Basic commands part 2 21 min
        • Lecture2.3
          Basic commands part 3 13 min
      • Creating a Secure Hacking Environment 6

        • Lecture3.1
          Changing IP address and wireless adapter setup 05 min
        • Lecture3.2
          Creating a bootable Kali USB drive 05 min
        • Lecture3.3
          Essential networking terms 10 min
        • Lecture3.4
          Essential hacking terms 18 min
        • Lecture3.5
          Additional Kali tools to install 09 min
        • Lecture3.6
          Changing our MAC address with macchanger 07 min
      • Footprinting 6

        • Lecture4.1
          Google hacking 13 min
        • Lecture4.2
          Nikto basics 11 min
        • Lecture4.3
          Whois tool 07 min
        • Lecture4.4
          Email harvesting 06 min
        • Lecture4.5
          Shodan 11 min
        • Lecture4.6
          Zone transfer with Dig 07 min
      • Scanning 9

        • Lecture5.1
          Installing Metasploitable 07 min
        • Lecture5.2
          Nmap part 1 16 min
        • Lecture5.3
          Nmap part 2 12 min
        • Lecture5.4
          Nmap part 3 13 min
        • Lecture5.5
          Zenmap 08 min
        • Lecture5.6
          TCP scans 16 min
        • Lecture5.7
          Nmap bypassing defenses 18 min
        • Lecture5.8
          Nmap scripts part 1 10 min
        • Lecture5.9
          Nmap scripts part 2 14 min
      • Website Penetration Testing 24

        • Lecture6.1
          Installing OWASP 09 min
        • Lecture6.2
          HTTP request 10 min
        • Lecture6.3
          HTTP response 11 min
        • Lecture6.4
          Burpsuite configuration 13 min
        • Lecture6.5
          Editing packets in Burpsuite 13 min
        • Lecture6.6
          Whatweb and Dirb 10 min
        • Lecture6.7
          Password recovery attack 16 min
        • Lecture6.8
          Burpsuite login bruteforce 11 min
        • Lecture6.9
          Hydra login bruteforce 09 min
        • Lecture6.10
          Session fixation 14 min
        • Lecture6.11
          Injection attacks 06 min
        • Lecture6.12
          Simple command injection 11 min
        • Lecture6.13
          Exploiting command injection vulnerability 08 min
        • Lecture6.14
          Finding blind command injection 14 min
        • Lecture6.15
          SQL basics 11 min
        • Lecture6.16
          Manual SQL injection part 1 13 min
        • Lecture6.17
          Manual SQL injection part 2 21 min
        • Lecture6.18
          SQLmap basics 17 min
        • Lecture6.19
          XML injection 16 min
        • Lecture6.20
          Installing XCAT and preventing injection attacks 06 min
        • Lecture6.21
          Reflected XSS 11 min
        • Lecture6.22
          Stored XSS 12 min
        • Lecture6.23
          Changing HTML code with XSS 08 min
        • Lecture6.24
          XSSer and XSSsniper 14 min
      • Wireless Cracking 13

        • Lecture7.1
          Wireless attacking theory 11 min
        • Lecture7.2
          Enabling monitor mode 04 min
        • Lecture7.3
          Capturing handshake with airodump 15 min
        • Lecture7.4
          RockYou.txt 14 min
        • Lecture7.5
          Cracking with Aircrack 16 min
        • Lecture7.6
          Cracking with Hashcat 15 min
        • Lecture7.7
          Creating password lists with Crunch 19 min
        • Lecture7.8
          Creating password lists with Cupp 07 min
        • Lecture7.9
          Rainbow tables part 1 17 min
        • Lecture7.10
          Rainbow tables part 2 06 min
        • Lecture7.11
          Installing Fluxion 06 min
        • Lecture7.12
          Finding and cracking hidden networks 08 min
        • Lecture7.13
          Preventing wireless attacks 08 min
      • Man in the Middle Attacks 11

        • Lecture8.1
          ARP protocol basics 11 min
        • Lecture8.2
          Man in the middle attack theory 07 min
        • Lecture8.3
          Installing MITMf 07 min
        • Lecture8.4
          Manual ARP spoofing 13 min
        • Lecture8.5
          Problems while installing MITMf 06 min
        • Lecture8.6
          HTTP traffic sniffing 09 min
        • Lecture8.7
          DNS spoofing and HTTPS password sniffing 21 min
        • Lecture8.8
          Hooking browsers with BEEF 16 min
        • Lecture8.9
          Screenshotting targets browser 11 min
        • Lecture8.10
          Cloning any webpage 09 min
        • Lecture8.11
          Ettercap basics 07 min
      • System Hacking with Metasploit 21

        • Lecture9.1
          MSFconsole environment 16 min
        • Lecture9.2
          Metasploit modules explained 12 min
        • Lecture9.3
          Bruteforcing SSH with Metasploit 15 min
        • Lecture9.4
          Attacking Tomcat with Metasploit 09 min
        • Lecture9.5
          Getting Meterpreter with command injection 25 min
        • Lecture9.6
          PHP code injection 06 min
        • Lecture9.7
          2 Metasploitable exploits 07 min
        • Lecture9.8
          Wine installation 12 min
        • Lecture9.9
          Creating Windows payloads with Msfvenom 10 min
        • Lecture9.10
          Encoders and Hex editor 19 min
        • Lecture9.11
          Windows 10 Meterpreter shell 12 min
        • Lecture9.12
          Meterpreter environment 12 min
        • Lecture9.13
          Windows 10 privilege escalation 12 min
        • Lecture9.14
          Preventing privilege escalation 07 min
        • Lecture9.15
          Post exploitation modules 14 min
        • Lecture9.16
          Getting Meterpreter over Internet with port forwarding 11 min
        • Lecture9.17
          Eternalblue exploit 21 min
        • Lecture9.18
          Persistence module 13 min
        • Lecture9.19
          Hacking over the internet with Ngrok 11 min
        • Lecture9.20
          Android device attack with Venom 10 min
        • Lecture9.21
          The real hacking begins now! 03 min
      • Python Crash Course 11

        • Lecture10.1
          Variables 14 min
        • Lecture10.2
          Raw input 11 min
        • Lecture10.3
          If-else statements 11 min
        • Lecture10.4
          For loops 07 min
        • Lecture10.5
          While loops 09 min
        • Lecture10.6
          Python lists 08 min
        • Lecture10.7
          Functions 14 min
        • Lecture10.8
          Classes 11 min
        • Lecture10.9
          Importing libraries 07 min
        • Lecture10.10
          Files in Python 12 min
        • Lecture10.11
          Try and except rule 05 min
      • Coding an Advanced Backdoor 20

        • Lecture11.1
          Theory behind reverse shells 07 min
        • Lecture11.2
          Simple server code 13 min
        • Lecture11.3
          Connection with reverse shell 07 min
        • Lecture11.4
          Sending and receiving messages 11 min
        • Lecture11.5
          Sending messages with while true loop 08 min
        • Lecture11.6
          Executing commands on target system 10 min
        • Lecture11.7
          Fixing backdoor bugs and adding functions 21 min
        • Lecture11.8
          First test using our backdoor 18 min
        • Lecture11.9
          Trying to connect every 20 seconds 13 min
        • Lecture11.10
          Creating persistence part 1 06 min
        • Lecture11.11
          Creating persistence part 2 17 min
        • Lecture11.12
          Changing directory 12 min
        • Lecture11.13
          Uploading and downloading files 23 min
        • Lecture11.14
          Downloading files from the internet 23 min
        • Lecture11.15
          Starting programs using our backdoor 07 min
        • Lecture11.16
          Capturing screenshot on the target PC 19 min
        • Lecture11.17
          Embedding backdoor in an image part 1 14 min
        • Lecture11.18
          Embedding backdoor in an image part 2 09 min
        • Lecture11.19
          Checking for administrator privileges 12 min
        • Lecture11.20
          Adding help option 09 min
      • Creating a Keylogger for the Backdoor 7

        • Lecture12.1
          Importing Pynput 11 min
        • Lecture12.2
          Simple keylogger 10 min
        • Lecture12.3
          Adding report function 11 min
        • Lecture12.4
          Writing keystrokes to a file 14 min
        • Lecture12.5
          Adding the keylogger to our reverse shell part 1 23 min
        • Lecture12.6
          Adding the keylogger to our reverse shell part 2 08 min
        • Lecture12.7
          Final project test 15 min
      • Basic Authentication Bruteforcer 7

        • Lecture13.1
          Printing banner 12 min
        • Lecture13.2
          Adding available options 11 min
        • Lecture13.3
          Starting threads for bruteforce 09 min
        • Lecture13.4
          Writing function to run the attack 11 min
        • Lecture13.5
          Bruteforcing router login 10 min
        • Lecture13.6
          Bypassing antivirus with your future programs 14 min
        • Lecture13.7
          Sending malware with spoofed email 14 min
      • BONUS-Building a Career in Cyber Security 6

        • Lecture14.1
          What will you learn in this section? 03 min
        • Lecture14.2
          Why is ethical hacking a valuable skill? 23 min
        • Lecture14.3
          What is the best ethical hacking certification? 17 min
        • Lecture14.4
          Tips for getting your first job as an ethical hacker 19 min
        • Lecture14.5
          How I started my career as an ethical hacker 14 min
        • Lecture14.6
          How to price your work 11 min
        This content is protected, please login and enroll course to view this content!
        Prev Windows 10 privilege escalation
        Next Post exploitation modules

        Categories

        • Business, Management & Law
          • Finance
          • Marketing
          • Personal Development
          • Productivity
          • Trading
        • Course Builder
        • Design
        • Finance
        • Health & Social Care
        • Information Technology
        • Languages
        • Marketing
        • Open Learning College
          • Course Builder
        • Personal Development
        • Photography
        • Productivity
        • Trading
        • Videography

        EDPLX is a learning community with online courses in design, business, web development, photography, fitness and more. Anyone can join the community to learn cutting-edge skills, network with other creatives and discover new oppotunities.

        Company
        • About
        • Blog
        • Contact
        • FAQ
        Community
        • Become an Instructor
        • Redeem Voucher
        new-logo

        @2024 All rights reserved. Privacy Policy and Terms and condition.

        EDPLX Limited 15398152

        Facebook-f
        Youtube
        Twitter
        Instagram

        Connect with

        Login with Facebook

        logo

        Login

        Connect with

        Login with Facebook

        logo


        Lost your password?

        Not a member yet? Register now

        Sign up with your Email

        Are you a member? Login now

        • Login
        • Sign Up
        Forgot Password?
        Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.