Hacking Complete

Gain the knowledge hackers use to compromise systems and use it to protect your own!

Last updated 2022-01-10 | 4.2

- Get started using Fedora (Linux)
- Understand the basics of terminal
- Troubleshoot networks using Wireshark

What you'll learn

Get started using Fedora (Linux)
Understand the basics of terminal
Troubleshoot networks using Wireshark
Stay anonymous online
Set up a VPN server
Hack wireless networks
Crack passwords and encryption using HashCat
Clone websites
Protect & defend your own network
Learn how to deploy a keylogger from a USB: Works out of the box for Windows 7 8 8.1 and 10

* Requirements

* A computer to follow along with exercises in the course
* USB drive to install Linux
* Wireless card & router access
* Various programs used to demo attacks (FREE)
* An eager mind!

Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:

  • Introduction to ethical hacking
  • Linux installation, terminal basics, and Wireshark Setup
  • Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
  • Aircrack-ng, HashCat, and wifi hacking
  • Defending your own networks from attacks
  • Cloning websites
  • Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
  • Windows power shell scripting

This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!

DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.

English & Spanish subtitles available.

Thank you for taking the time to read this, and we hope to see you in the course!

Who this course is for:

  • This course was designed for students in the IT/Network Security field
  • No previous experience is required

Course content

15 sections • 92 lectures

Introduction Preview 16:23

What you can expect to learn in this course and hardware & software requirements.

Create a USB for Installation Preview 10:10

Explains how to set up the environment.

Installation Procedure Part 1 Preview 11:16

Guides you through the process of Linux installation.

Installation Procedure Part 2 Preview 06:22

Guides you through the process of Linux installation.

Improve Safety and Anonymity of your Browser Preview 07:08

General browser configuration.

Fedora KDE Desktop Orientation (optional) Preview 14:44

Getting acquainted in Fedora KDE Desktop.

Terminal Basics Part 1 Preview 16:03

Showing basic Linux commands.

Terminal Basics Part 2 Preview 11:46

Showing basic Linux commands.

Wireshark Setup Part 1 Preview 05:02

Setting up Wireshark and configuring it for later usage.

Wireshark Setup Part 2 Preview 07:54

Setting up Wireshark and configuring it for later usage.

How to Connect to the Internet via Proxy Part 1 Preview 17:47

Explains how to connect to the Internet via Proxy for the purposes of anonymization.

How to Connect to the Internet via Proxy Part 2 Preview 02:50

Explains how to connect to the Internet via Proxy for the purposes of anonymization.

How to set up a Proxy Server for Traffic Monitoring Part 1 Preview 19:52

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 2 Preview 09:55

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 3 Preview 14:39

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 4 Preview 19:04

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to set up a Proxy Server for Traffic Monitoring Part 5 Preview 09:23

Here I demonstrate and explain how  proxy server can be set up and configured so that you my be able to see what sort of information do the proxy providers have and are able to get in regard to your traffic.

How to Connect to a VPN Preview 07:48

Learn how to anonymize your traffic by using a VPN server as an anonymizer.

How to set up your own VPN Server Part 1 Preview 10:14

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 2 Preview 09:23

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 3 Preview 13:32

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic.

How to set up your own VPN Server Part 4 Preview 05:58

Here I will demonstrate and explain how you can set up your own VPN server and utilize it for the purposes of anonymization and also you will get to see what sort of information can the VPN providers see in regard to your traffic. 

Monitor VPN Server Traffic Preview 09:45

Here I will show you how you can monitor the traffic of your VPN server.

Tor Browser Preview 11:21

Lets have a look at how we can access the dark side of the Internet by using the Tor network via Tor browser.

How to set up a Tor Relay Part 1 Preview 18:32

Here we are going to take a look at how a Tor relay can be set up and configured.

How to set up a Tor Relay Part 2 Preview 05:44

Here we are going to take a look at how a Tor relay can be set up and configured.

Installing aircrack-ng Preview 16:20

Lets go ahead and install one of the necessary prerequisites for this chapter, namely aircrack-ng, which will be used in combination with our CPU to bruteforce the WPA2 key.

Capturing WPA2 Handshake Preview 12:55

In order for us to begin the cracking procedure, we need to go ahead and capture a handshake between the authenticated client and the wireless access point.

Crunch Password Generator Installation Preview 09:18

Since we are going to need something to generate lists of possible passwords, I decided to use Crunch for this purpose as it is very convenient due to its numerous options.

Crunch Password Generator Rule Sets Preview 18:50

Lets learn how to create custom rule sets for the password generation process so that our passwords would fit within a certain range of predefined rules.

Crunch Password Generator in Combination with aircrack-ng Preview 13:51

In this final stage, we will feed aircrack with the passwords generated by Crunch and aircrack, in turn, will attempt to guess the passphrase by utilizing the CPU.

Installing NVIDIA Drivers Preview 15:11

Installing drivers for our dedicated GPU.

Installing HashCat Preview 08:39

Step by step guide on how to install HashCat.

Preparing the Capture File for HashCat Preview 02:09

Here we will learn how to prepare the capture file for HashCat.

HashCat Part 1 Preview 13:15

Getting started with Hashcat, one of the world's fastest CPU/GPU based password recovery tools.

HashCat Part 2 Preview 14:13

Advanced Hashcat tutorial for attacks & automation.

Changing your mac address Preview 13:32

Here I will show you how to utilize the tool to change the mac address of your network devices so that you may reach a higher degree of anonymity.

Set up a Sandboxed Environment for our Hotspot Part 1 Preview 18:16

Install a virtual machine to isolate the incoming traffic.

Set up a Sandboxed Environment for our Hotspot Part 2 Preview 11:52

Install a virtual machine to isolate the incoming traffic.

Setting up an Open Wireless Hotspot Part 1 Preview 08:39

Configuring our network card to function as a wireless hotspot.

Setting up an Open Wireless Hotspot Part 2 Preview 03:40

Configuring our network card to function as a wireless hotspot.

Setting up the Fake DNS Resolutions Part 1 Preview 05:51

How to bring up and configure your own DNS server.

Setting up the Fake DNS Resolutions Part 2 Preview 03:08

How to bring up and configure your own DNS server.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 1 Preview 07:48

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 2 Preview 08:51

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 3 Preview 05:04

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 4 Preview 13:07

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 5 Preview 10:48

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 6 Preview 19:47

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 7 Preview 03:36

Here we are going to learn how to create a fake DNS server and force false URL to IP address resolutions. To complete the procedure we will need our web server to be able to serve false SSL certificates to the visiting clients. In addition to all of this, we will also write custom scripts for credential harvesting and redirects to the original website.

Disconnect Clients from a Wireless Access Point Preview 13:37

Here we will learn how to DOS the wireless connection by deauthenticating the authenticated clients.

How to Clone Websites Preview 06:45

Here we will use the tool wget in order to clone websites.

Bitsquatting Part 1 Preview 14:26

Bitsquatting Part 2 Preview 20:05

Bitsquatting Part 3 Preview 18:11

Bitsquatting Part 4 Preview 19:38

Bitsquatting Part 5 Preview 10:15

Installing Windows VM Part 1 Preview 10:01

Installing Windows VM Part 2 Preview 07:03

Install CodeBlocks with a Compiler Preview 04:17

Download and Compile the Keylogger Preview 09:00

Set up a Server for Keylogger Preview 15:51

Upload the Keylogger to the Server Preview 14:02

Download Arduino Preview 02:36

Set up Arduino and Teensyduino Preview 05:44

Confirm that everything works Preview 08:43

Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1 Preview 09:33

Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2 Preview 05:39

Generate Files in System32 Preview 09:58

Sets of Commands to be Executed Part 1 Preview 11:54

Sets of Commands to be Executed Part 2 Preview 09:21

Call Functions and Run Commands Preview 04:29

Powershell Script Part 1 Preview 08:57

Powershell Script Part 2 Preview 11:13

Powershell Script Part 3 Preview 14:23

Visual Basic Script Preview 14:00

Compile and Load Preview 01:05

Decrypt Part 1 Preview 18:37

Learn how to decrypt the encrypted files.

Decrypt Part 2 Preview 12:46

Part 2 of how to decrypt the encrypted files.

Decrypt Part 3 Preview 16:20

Part 3 of how to decrypt the encrypted files.

Intro Preview 03:41

Announcing a new course

CheatEngine Setup Preview 02:01

In this video I demonstrate how to set up Cheat Engine.

RAM Editing Part 1 Preview 08:56

This tutorial demonstrates how to perform RAM editing by using Cheat Engine and C++.

RAM Editing Part 2 Preview 17:08

Part 2 of memory editing.

RAM Editing Part 3 Preview 18:13

Part 3 of memory editing.

RAM Editing Part 4 Preview 10:01

Part 4 of memory editing.

RAM Editing Part 5 Preview 07:16

Part 5 of memory editing.