About
About Us
Help
Privacy Policy
Terms of Service
LearnDesk
Learn
Academics
Business
Creative
Health and Fitness
Lifestyle
Personal Development
Software
Topics
Admissions
Engineering
Hardware
Hospitality
Humanities
Chinese
Languages
Maths
Pharma
View All Topics
Topics
Accounting
Advertising
Analysis
Analytics
Business Communication
eCommerce
Entrepreneurship
Finance
Finance - India
Freelancing
View All Topics
Topics
Arts & Crafts
Audio Editing
Audio Production
Dance
Design
Film Production
Music
Photography
Video Production
Writing
View All Topics
Topics
Dieting
Fitness
Food Safety
Games
Medical
Medical Professionals
Meditation
Mental Health
Pregnancy
Safety & First Aid
View All Topics
Topics
Beauty & Makeup
Food
Fashion
Gaming
Home Improvement
Parenting
Pet Care & Training
Relationships
Sustainable Living
View All Topics
Topics
Career Development
Learning
Religion and Spirituality
Self-Improvement
View All Topics
Topics
Accounting
Amazon Web Services
App Development
Continuous Integration
Backup Software
Business Automation
Computational Fluid Dynamics
Business Intelligence
Computer Aided Design (CAD)
View All Topics
Teach
Teach Online
Schedule
Items
Billing
Users
Marketing
Analytics
Settings
Change School
Account
Log In
Sign Up
Learn Ethical Hacking: Beginner to Advanced
Introduction and Installation
Introduction to the Course
VirtualBox Installation
Kali Linux Installation
Enabling Full-Screen
Basic Linux Commands
Basic Commands: Part 1
Basic Commands: Part 2
Basic Commands: Part 3
Creating a Secure Hacking Environment
Changing IP Address and Wireless Adapter Aetup
Creating a Bootable Kali USB Drive
Essential Networking Terms
Essential Hacking Terms
Additional Kali Tools to Install
Changing Our MAC Address with Macchanger
Foot Printing
Google Hacking
Nikto Basics
Who is Tool
Email Harvesting
Shodan
Zone Transfer with Dig
Scanning
Installing Metasploitable
Nmap: Part 1
Nmap: Part 2
Nmap: Part 3
Zenmap
TCP Scans
Nmap Bypassing Defenses
Nmap Scripts: Part 1
Nmap Scripts: Part 2
Website Penetration Testing
Installing OWASP
HTTP Request
HTTP Response
Burpsuite Configuration
Editing Packets in Burpsuite
What Web and Dirb
Password Recovery Attack
Burpsuite Login Brute-force
Hydra Login Brute-force
Session Fixation
Injection Attacks
Simple Command Injection
Exploiting Command Injection Vulnerability
Finding Blind Command Injection
SQL Basics
Manual SQL Injection: Part 1
Manual SQL Injection: Part 2
SQL Map Basics
XML Injection
Installing XCAT and Preventing Injection Attacks
Reflected XSS
Stored XSS
Changing HTML Code with XSS
XSSer and XSSsniper
Wireless Cracking
Wireless Attacking Theory
Enabling Monitor Mode
Capturing Handshake with Airodump
RockYou.txt
Cracking with Aircrack
Cracking with Hashcat
Creating Password Lists with Crunch
Creating Password Lists with Cupp
Rainbow Tables: Part 1
Rainbow Tables: Part 2
Installing Fluxion
Finding and Cracking Hidden Networks
Preventing Wireless Attacks
Man in the Middle Attacks
ARP Protocol Basics
Man in the Middle Attack Theory
Installing MITMF
Manual ARP Spoofing
Problems While Installing MITMF
HTTP Traffic Sniffing
DNS Spoofing and HTTPS Password Sniffing
Hooking Browsers with BEEF
Screen Shotting Targets Browser
Cloning Any Webpage
Ettercap Basics
System Hacking with Metasploit
MSF Console Environment
Metasploit Modules Explained
Bruteforcing SSH with Metasploit
Attacking Tomcat with Metasploit
Getting Meterpreter with Command Injection
PHP Code Injection
2 Metasploitable Exploits
Wine Installation
Creating Windows Payloads with Msfvenom
Encoders and Hex Editor
Windows 10 Meterpreter Shell
Meterpreter Environment
Windows 10 Privilege Escalation
Preventing Privilege Escalation
Post Exploitation Modules
Getting Meterpreter Over Internet with Port Forwarding
EternalBlue Exploit
Persistence Module
Hacking Over the Internet with Ngrok
Android Device Attack with Venom
The Real Hacking Begins Now
Python Crash Course
Variables
Raw Input
If-Else Statements
For Loops
While Loops
Python Lists
Functions
Classes
Importing Libraries
Files in Python
Try and Except Rule
Coding an Advanced Backdoor
Theory Behind Reverse Shells
Simple Server Code
Connection with Reverse Shell
Sending and Receiving messages
Sending Messages with While True Loop
Executing Commands on Target System
Fixing Backdoor Bugs and Adding Functions
First Test Using Our Backdoor
Trying to Connect Every 20 Seconds
Creating Persistence: Part 1
Creating Persistence: Part 2
Changing Directory
Uploading and Downloading Files
Downloading Files From the Internet
Starting Programs Using Our Backdoor
Capturing Screenshot on the Target PC
Embedding Backdoor in an Image: Part 1
Embedding Backdoor in an Image: Part 2
Checking for Administrator Privileges
Adding Help Option
Creating a Keylogger for the Backdoor
Importing Pynput
Simple Keylogger
Adding Report Function
Writing Keystrokes to a File
Adding the Keylogger to Our Reverse Shell: Part 1
Adding the Keylogger to Our Reverse Shell: Part 2
Final Project Test
Basic Authentication Bruteforcer
Printing Banner
Adding Available Options
Starting Threads for Bruteforce
Writing Function to Run the Attack
Bruteforcing Router Login
Bypassing Antivirus with Your Future Programs
Sending Malware with Spoofed Email
Bonus: Building a Career in Cyber Security
What Will You Learn in This Section?
Why is Ethical Hacking a Valuable Skill?
What is the Best Ethical Hacking Certification?
Tips for Getting Your First Job as an Ethical Hacker
How I Started My Career as an Ethical Hacker
How to Price Your Work
Coding an Advanced Backdoor
Learn Ethical Hacking: Beginner to Advanced
By:
Joseph Delgadillo
Share
Share the link to this page
Copied
Facebook
Twitter
WhatsApp
LinkedIn
Email
Add to Calendar
Add the class to your calendar
Add to Google Calendar
Add to Apple Calendar
Add to Yahoo Calendar
Add to Outlook Calendar
Print
Completed
We'll cover the following topics in this section:
Theory Behind Reverse Shells
Simple Server Code
Connection with Reverse Shell
Sending and Receiving messages
Sending Messages with While True Loop
Executing Commands on Target System
Fixing Backdoor Bugs and Adding Functions
First Test Using Our Backdoor
Trying to Connect Every 20 Seconds
Creating Persistence: Part 1
Creating Persistence: Part 2
Changing Directory
Uploading and Downloading Files
Downloading Files From the Internet
Starting Programs Using Our Backdoor
Capturing Screenshot on the Target PC
Embedding Backdoor in an Image: Part 1
Embedding Backdoor in an Image: Part 2
Checking for Administrator Privileges
Adding Help Option
Previous
Next
Sign Up
Signup to access thousands of classes
Continue with Facebook
Continue with Google
OR
Continue with Email
Already a member?
Log In
By registering for a LearnDesk account, you agree to our
Terms of Service
and
Privacy Policy
.
Share
Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.
Share with Google Contacts