ποΈ 1. Basics: Step-By-Step Lab Setup
In this practical, we will set up our lab environment for ethical hacking. We will install Oracle Virtual Box and various VM OS.
ποΈ 2. Perform Foot Printing and Reconnaissance
In this practical, we will perform foot printing and reconnaissance using various tools and techniques.
ποΈ 3. Perform Scanning/Enumeration/Vulnerability Analysis
In this practical, we will perform scanning, enumeration, and vulnerability analysis using various tools and techniques.
ποΈ 4. System Hacking: Perform active online attack to crack the Systemβs password using Responder
In this practical, we will perform an active online attack to crack the system's password using Responder.
ποΈ 5. System Hacking: Gain access to a Remote System using Armitage/Metasploit Framework
In this practical, we will gain access to a remote system using Armitage and the Metasploit Framework.
ποΈ 6. Hack a Windows Machine with a Malicious Office Document using TheFatRat
In this practical, we will hack a Windows machine using a malicious Office document created with TheFatRat.
ποΈ 7. Perform Buffer Overflow Attack to gain access to a Remote System
In this practical, we will perform a buffer overflow attack to gain access to a remote system. Buffer overflow is a vulnerability in which a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
ποΈ 8. Perform Privilege Escalation, Hack the Windows Machine using Metasploit and perform Post-Exploitation using Meterpreter
Step 1: Introduction
ποΈ 9. Malware Threats: Gain Access to the Target System using Trojans
Step 1: Introduction
ποΈ 10. Sniffing: Perform Packet-Sniffing techniques, discover Network Vulnerabilities, Defend against Sniffing Attacks using wireshark
Step 1: Introduction
ποΈ 11. Social Engineering: Perform Social Engineering various techniques using Social-Engineer Toolkit (SET), Netcraft, OhPhish
Step 1: Introduction
ποΈ 12. Denial-of-Service: Perform Dos and DDoS Attacks using various techniques using Metasploit, hping3, HOIC, and Anti DDoS Guardian
Step 1: Introduction
ποΈ 13. Session Hijacking: Perform various session hijacking techniques Zed Attack Proxy, bettercap, Wireshark
Step 1: Introduction
ποΈ 14. Evading IDS, Firewalls, and Honeypots: Perform Intrusion Detection using Various Tools like, snort and evading firewalls NMAP Evasion Techniques and bypass firewall rules using HTTP/FTP Tunneling
Step 1: Introduction
ποΈ 15. Perform footprint the Web Server using various tools like, Ghost Eye, Skipfish etc.
Step 1: Introduction
ποΈ 16. Perform a Web Server Attack using Dictionary Attack
Step 1: Introduction
ποΈ 17. Perform Footprint the Web Infrastructure using tools
Step 1: Introduction
ποΈ 18. Perform Web Application Attacks like Brute-Force, Parameter Tempering, XSS, CSRF using Burpsuite
Step 1: Introduction
ποΈ 19. Perform enumerate and Hack a Web Application using WPScan and Metasploit
To perform an enumeration and hack a web application using WPScan and Metasploit, follow the step-by-step guide below:
ποΈ 20. Perform Exploitation of RCE/File Upload Vulnerability
In this practical, we will learn how to perform the exploitation of RCE (Remote Code Execution) or File Upload vulnerability.
ποΈ 21. Perform gaining Backdoor Access
In this practical, we will learn how to gain backdoor access to a target system.
ποΈ 22. Perform SQL Injection Attacks on an MSSQL Database using sqlmap
In this practical, we will learn how to perform SQL injection attacks on an MSSQL database using sqlmap.
ποΈ 23. Perform various SQL Injection Detection Tools
In this practical, we will learn about various SQL injection detection tools and how to use them to identify SQL injection vulnerabilities in web applications.
ποΈ 24. Perform Footprint, attacks on Wireless Network
In this practical, we will learn how to perform footprinting and attacks on a wireless network.
ποΈ 25. Perform attacks on Android Devices
In this practical, we will learn how to perform attacks on Android devices.
ποΈ 26. Perform S3 Bucket Enumeration using various S3 Bucket Enumeration Tools
In this practical, we will learn how to perform S3 bucket enumeration using various S3 bucket enumeration tools.
ποΈ 27. Encrypt the information using various cryptography tools
In this practical, we will learn how to encrypt information using various cryptography tools.
ποΈ Practicals
Solve This My Practicals list and store each answer in new markdown file. for example : Practical-01.md, ... Practical-11.md