Praveen Tech
1.34K subscribers
3 photos
11 files
51 links
Technology updates
Download Telegram
*Beginner to intermediate level course*

*Join only if you don't know anything about hacking*


ใ€‹Total Modules โ‹ฎ 17(video+pdf+ live session)

*Job and internship Group access for lifetime*
*Fee Rs - 299*

All topics will be finished within 45 days then next 45 days will be labs case studies and interviews questions and computer networking so let's start

๐Ÿ“ฅ Module 1 โž– INTRODUCTION

01.The Course Overview
02.Course Overview โ€“ How to Get the Most Out of This Course
03.Teaser โ€“ Bypass Antivirus in Windows 10 and Hack Windows 10 Completely
04.Ethical Hacking โ€“ Latest Terminologies

๐Ÿ“ฅ โž–โž– Module 2 โž–โž– ๐Ÿ“ฅ
Network Pentesting Lab Setup and Overview

05.Download and Install VMware Workstation
06.Download Windows 10 and Kali Linux 2018
07.Installation of Windows
08.Update and Upgrade the Kali Linux Operating System
09.What Is Network Pentesting
10.Various Components of Network Pentesting

๐Ÿ“ฅ โž–โž– Module 3 โž–โž– ๐Ÿ“ฅ
Network Pentetsing โ€“ Network Scanning Techniques
11.IP Scanners in Network
12.Port Scanning in Network Using Nmap
13.Nessus Installation
14.Vulnerability Scanning Using Nessus
๐Ÿ“ฅ โž–โž– Module 4 โž–โž– ๐Ÿ“ฅ
Network Pentesting โ€“ Network Host Exploitation with the AV Bypass Mechanism

15.Installation of Antivirus Bypass Frameworks
16.Bypass Windows 10 Defender and Hack Windows 10 from Kali Linux
17.Bypass Windows 10 Antivirus and Hack Windows 10 from Kali Linux
18.Various Meterpreter Commands

๐Ÿ“ฅ โž–โž– Module 5 โž–โž– ๐Ÿ“ฅ
Network Pentesting โ€“ Network IoT Devices Exploitation

19.About Router Pentesting
20.Download and Install VyOS on a VMware Workstation (Virtual Router)
21.Start Services in Router
22.Password Cracking (Brute Forcing) Using the Hydra and Medusa Tools

๐Ÿ“ฅ โž–โž– Module 6 โž–โž– ๐Ÿ“ฅ
Other Major Network Attacks

23.Man-in-the-Middle Attack Overview
24.Man-in-the-Middle Attack (MITM) Using Wireshark and Ettercap
25.Social Engineering Attack Overview
26.Social Engineering Attack Using Social Engineering Toolkit
27.About the Browser Exploitation Framework
28.Browser Exploitation Attack Using BeEF

๐Ÿ“ฅ โž–โž– Module 7 โž–โž– ๐Ÿ“ฅ
Website Pentesting Lab Setup and Overview

29.Download and Install Xampp Server in Kali Linux
30.Download and Install a Buggy Web Application
31.Website Introduction
32.Website Pentesting Overview
๐Ÿ“ฅ โž–โž– Module 8 โž–โž– ๐Ÿ“ฅ
Website Pentesting โ€“ Scanning Websites
33.Acunetix Web Vulnerability Scanner
34.Burp Suite Community Edition
35.Zed Attack Proxy Tool (ZAP)
36.Report Creation and Analysis

๐Ÿ“ฅ โž–โž– Module 9 โž–โž– ๐Ÿ“ฅ
Website Pentesting โ€“ SQL Injection Attack
37.SQL Injection Attack Overview
38.SQL Injection Attack on Buggy Web Application
39.HTML Injection Attack on a Buggy Web Application
40.SQL Injection on a Live Website Using Sqlmap Kali Linux

๐Ÿ“ฅ โž–โž– Module 10 โž–โž– ๐Ÿ“ฅ
Website Pentesting โ€“ XSS and CSRF Attacks
41.About XSS Attack and Types
42.Persistent XSS Attack on a Buggy Web Application
43.Non-Persistent XSS Attack on a Buggy Web Application
44.DOM-Based XSS Attack
45.About CSRF Attacks
46.CSRF Attack on a Buggy Web Application

๐Ÿ“ฅ โž–โž– Module 11 โž–โž– ๐Ÿ“ฅ
Website Pentesting โ€“ Other Major Web Attacks
47.Shell Upload Attack on a Buggy Web Application47.Shell Upload Attack on a Buggy Web Application
48.Buffer Overflow Attack on a Web Application
49.Brute-Force Attack on the Login Panel of a Web Application
50.Local File Inclusion Attack on a Web Application

๐Ÿ“ฅ โž–โž– Module 12 โž–โž– ๐Ÿ“ฅ
Android Pentesting Lab Setup and Overview
51.Download and Install Android Studio
52. #important Start Android Phone in Android Studio
53.Download and Install APK File in Android Phone
54.About Android Pentesting
55.Scope of Android Pentesting
๐Ÿ“ฅ โž–โž– Module 13 โž–โž– ๐Ÿ“ฅ
Android Pentesting โ€“ Analyze Log Files and Find Secret Information
56.About Android Log Files
57.Information About Task
58.Open Log Files Using Logcat
59.Analyze Log Files and Find Secret Code
๐Ÿ“ฅ โž–โž– Module 14 โž–โž– ๐Ÿ“ฅ
Android Pentesting โ€“ Reverse Engineering Process
60.About the Reverse Engineering Process in Android
61.Information About Task
62. #important Download and Install the Dex2jar Tool.mp4
63.Download and Install the JD-Gui Tool
๐Ÿ“ฅ โž–โž– Module 15 โž–โž– ๐Ÿ“ฅ
Android Pentesting โ€“ Break Encryption in Android
64.Encryption Process in Android
65.Information About Task
66. #important Analyze the Code and Find the Encryption Algorithm

67.Complete the Task
๐Ÿ“ฅ โž–โž– Last Module 16 โž–โž– ๐Ÿ“ฅ
Android Pentesting โ€“ SQL Injection Attack on Android
68.About SQL Injection Attack on Android
69.Download and Install Drozer and Drozer-Agent.apk
70.Drozer Commands
71.Perform an SQL Injection Attack on Android Using Drozer



โซธ Language : English (Indian)
ใ€‹Members Presented โ‹ฎ 14000

Payment :
UPI : praveen96265366141@ybl

After send screenshot to me in Instagram

Send me your gmail phone number and name to join