Pay What You Want: The Ultimate White Hat Hacker Bundle

21 Reviews
8 Courses
-

Pay What You Want: The Ultimate White Hat Hacker Bundle

21 Reviews
8 Courses
-

How It Works

Beat the Leader's price and get featured on the Leaderboard!

Beat the average price and you'll take home the entire bundle.

If what you pay is less than the average, you'll still take home something great.

Price locked in for: 15:00
Beat the average price$18.69
Pay what you want

What's Included In This Bundle ($1,528.00) Value

Cyber Security Volume II: Network Security
$120.00 ValueCyber Security Volume II: Network Security
Learn Website Hacking and Penetration Testing From Scratch
$180.00 ValueLearn Website Hacking and Penetration Testing From Scratch
Ethical Hacking Using Kali Linux From A to Z
$150.00 ValueEthical Hacking Using Kali Linux From A to Z
From Zero to Hero in Web, Network and WiFi Hacking
$210.00 ValueFrom Zero to Hero in Web, Network and WiFi Hacking
Web Application Penetration Testing Professional: WAPTP v3.1
$299.00 ValueWeb Application Penetration Testing Professional: WAPTP v3.1
Hack People, Systems and Mobile Devices
$249.00 ValueHack People, Systems and Mobile Devices
Ethical Hacking for Beginners
$125.00 ValueEthical Hacking for Beginners
Learn Hacking Windows 10 Using Metasploit From Scratch
$195.00 ValueLearn Hacking Windows 10 Using Metasploit From Scratch
CC

CarrieMarie Clark

$265.00

Leaderboard Champion

Rank
User
Paid
2
M
Michael Johnson
$264.00
3
S
Stephen Neimann
$263.00
4
v
velarte gabriel
$262.00
5
P
Peter Leeson
$261.00
6
L
Logan Pilgrim
$261.00
7
D
David Patillo
$260.00
8
S
Scott Shedd
$259.00
9
S
Sean Darragh
$258.00
10
L
Lawrence Mione
$257.00

Product Details

  • Certification included
  • Experience level required: All levels
  • Access 81 lectures & 9 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

81 Lessons (9h)

  • Introduction
    Course Outline2:20
  • Preparing
    Installing Kali Linux 2.0 as ISO image6:10
    Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)4:52
    Installing Kali Linux 2.0 as a Virtual Machine (VMware)2:37
    Setup Windows 10 as a Virtual Machine2:27
    Setup Metasploitable as a Virtual Machine2:24
    Configure the Network Settings4:46
    Connecting Wi-Fi card to the Virtual Machine1:29
    Updating Kali Linux 2.0
  • Information Gathering
    Introduction1:21
    Discovering the connected clients4:13
    Scanning the target OS (Part 1)13:11
    Scanning the target OS (Part 2)8:19
    Scanning the target OS using GUI6:06
  • Gaining Access
    Gaining Access introduction1:03
    Metaasploit Fundmentals12:29
    Creating a Payload using Msfvenom6:05
    Creating an Encoded Payload using Msfvenom5:59
    Testing the payload in the target OS7:26
  • Encoding and Combining the Payload
    Introduction0:47
    Installing Veil Framework3:38
    Creating an undetectable payload7:45
    Combine an EXE file with the Payload (1st method)8:39
    Combine an EXE file with the Payload (2nd method)5:58
    Combine the Payload with an Image,PDF,MP3 etc....11:40
    Combine the Payload with an Excel, Word file9:19
    Spoofing the Backdoor extension7:09
  • Post Exploitation
    Introduction0:54
    Interact with the Target Computer (Part 1)6:29
    Interact with the Target Computer (Part 2)6:11
    Persist your connection in the target OS7:46
    Escalate your privileges in Windows 107:22
    Escalate your privileges in Windows 8.1/8/75:18
    Migrating the backdoor with system processes7:53
    Check the virtualization & Clear log event5:54
    Uninstalling programs from the target OS5:18
    Add/Remove users and changing the Admin password5:55
    What is Pivoting?10:44
    Pivot from the Victim System to Own Every Device on the Network (1st Case)10:35
    Pivot from the Victim System to Own Every Device on the Network (2nd Case)12:24
    Stealing the target Wi-Fi password8:05
    Capture the keystrokes of the target keyboard6:57
    Stealing Windows Credentials6:33
    Cracking the administrator password8:47
    Stealing the stored passwords & Visited websites9:50
    Recover the deleted files from the target OS8:01
    Enumerate USB Drive history2:19
    Redirect the target from to any website16:13
    Downloading files using Windows PowerShell16:13
  • Hooking with BeEF
    Introduction0:54
    Hooking the target browser with BeEF12:04
    Play any sound in the target browser9:28
    Capture a screenshot from the target browser2:46
    Redirect the target to any website5:44
    Run any YouTube video in the target browser4:20
    Stealing the target online accounts with BeEF5:48
    Integrate Metasploit framework with BeEF Project8:31
    Having some Fun with BeEF8:27
    Hacking the target Windows OS through the hooked browser8:58
  • Perform the previous attacks over WAN Network
    Introduciton1:17
    Configuring the router and port forwarding (1st method)9:16
    Configure the Backdoor5:29
    Port forwarding using VPS SSH tunnel (2nd method)14:26
    Configure BeEF over WAN network5:52
  • Protection & Detection
    Detect & Kill any Meterpreter session6:14
    Detect the running backdoor manually9:59
    Detecting the combined backdoor with an image,pdf etc....1:46
    Detecting the combined backdoor (MD5 hash)4:22
    Encrypting your keyboard keystrokes5:54
    Analyzing the network connections6:38
    Analyze the running processes4:03
    Detecting the backdoor using sandbox4:15
  • Compromising any Windows OS just by plugging a USB stick (Bouns Section)
    Demonstration2:02
    The Theory
    The needed hardware and software7:47
    Installing the needed software3:42
    Converting the commands to Arduino script (C/C++)10:26
    Change the administrator password and force him to sign out17:15
    Fully control any Windows OS within 2 seconds15:34

Learn Hacking Windows 10 Using Metasploit From Scratch

SS
Saad Sarraj

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people in Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side in his teaching, and the theory behind every attack.

Description

In this beginner- and professional-friendly course, you'll learn how black hat hackers hack Windows using advanced techniques, while improving your knowledge on how to analyze and secure Windows, and detect a hacker's identity. Across the example-based course, you'll get hands-on instruction in white hat hacking.

  • Access 81 lectures & 9 hours of content 24/7
  • Learn how to download & setup Kali Linux 2.0, Windows 10, & Metasploit as virtual machines
  • Understand how to gather as much info as possible from your target
  • Use msfconsole interface like a professional
  • Encode & combine the payload
  • Gain full access over a target OS & learn how to interact w/ it using Meterpreter command line
  • Perform various attacks over WAN network
  • Detect & protect from all of the attacks discussed

Specs

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
  • This item is excluded from coupons.
Your cart is empty. Continue Shopping!
Processing order...