Udemy - Ethical Hacker Certification course
- Category Other
- Type Tutorials
- Language English
- Total size 3.9 GB
- Uploaded By CourseClub
- Downloads 515
- Last checked 1 month ago
- Date uploaded 6 years ago
- Seeders 2
- Leechers 1
Infohash : 21EBA1EDA6519582FF1130AC3D63B6A52E777B03
Ethical Hacker Certification course
this course is for beginners i have covered all sort of topics such as web hacking,remote hacking(metasploit),wireless hacking.
For More Courses Visit: https://desirecourse.com
Files:
[DesireCourse.Com] Udemy - Ethical Hacker Certification course 1. Introduction- 1. Introduction.mp4 (18.6 MB)
- 1. Introduction.vtt (1.0 KB)
- 2. Xamp installation.mp4 (18.2 MB)
- 2. Xamp installation.vtt (1.6 KB)
- 3. Installation Wamp.mp4 (37.8 MB)
- 3. Installation Wamp.vtt (5.7 KB)
- 4. bWAPP installation.mp4 (49.1 MB)
- 4. bWAPP installation.vtt (4.6 KB)
- 5. Burp Suite Installation.mp4 (43.9 MB)
- 5. Burp Suite Installation.vtt (4.3 KB)
- 1. Any Who.mp4 (21.1 MB)
- 1. Any Who.vtt (1.9 KB)
- 2. Spokeo online tool.mp4 (13.8 MB)
- 2. Spokeo online tool.vtt (1.2 KB)
- 1. HTTrack Web Site Copier Tool.mp4 (20.6 MB)
- 1. HTTrack Web Site Copier Tool.vtt (1.7 KB)
- 2. Footprinting a Webserver using IDServe.mp4 (35.2 MB)
- 2. Footprinting a Webserver using IDServe.vtt (2.5 KB)
- 3. Footprinting Webserver using Httprecon Tool.mp4 (38.7 MB)
- 3. Footprinting Webserver using Httprecon Tool.vtt (2.8 KB)
- 4. Web Data Extractor.mp4 (23.1 MB)
- 4. Web Data Extractor.vtt (2.0 KB)
- 1. DOS Introduction.html (3.3 KB)
- 2. DOS Attack With LOIC - Mac pc.mp4 (33.6 MB)
- 2. DOS Attack With LOIC - Mac pc.vtt (2.2 KB)
- 3. How to detect DOS attack.mp4 (25.1 MB)
- 3. How to detect DOS attack.vtt (1.8 KB)
- 4. How to DOS Websites - Slowloris in windows.mp4 (23.8 MB)
- 4. How to DOS Websites - Slowloris in windows.vtt (1.9 KB)
- 5. How To Detect DDOS Attack.mp4 (25.8 MB)
- 5. How To Detect DDOS Attack.vtt (2.1 KB)
- 6. How to DOS Websites - Slowloris using kali linux.mp4 (33.2 MB)
- 6. How to DOS Websites - Slowloris using kali linux.vtt (2.3 KB)
- 7. Performing a DOS Attck with Anonymous DoSer.mp4 (11.8 MB)
- 7. Performing a DOS Attck with Anonymous DoSer.vtt (1.0 KB)
- 8. SlowHTTPtest DOS Attack Tool Kali Linux.mp4 (46.4 MB)
- 8. SlowHTTPtest DOS Attack Tool Kali Linux.vtt (3.5 KB)
- 9. Quiz.html (0.1 KB)
- 1. Hydra - Online Password Attacks.mp4 (44.9 MB)
- 1. Hydra - Online Password Attacks.vtt (3.2 KB)
- 2. Crunch Password Generating Tool.mp4 (32.6 MB)
- 2. Crunch Password Generating Tool.vtt (12.0 MB)
- 3. John the ripper tool to crack passwords.mp4 (36.6 MB)
- 3. John the ripper tool to crack passwords.vtt (2.6 KB)
- 4. Quiz.html (0.1 KB)
- 1. DVWA BURP SUITE Session Hijacking.mp4 (28.1 MB)
- 1. DVWA BURP SUITE Session Hijacking.vtt (2.2 KB)
- 2. Session hijacking arps.mp4 (18.8 MB)
- 2. Session hijacking arps.vtt (1.5 KB)
- 3. Stealing cookies.mp4 (22.8 MB)
- 3. Stealing cookies.vtt (3.8 KB)
- 1. Sniffing Passwords Using ETTERCAP.mp4 (20.7 MB)
- 1. Sniffing Passwords Using ETTERCAP.vtt (1.9 KB)
- 2. Sniffing Passwords Using Wireshark.mp4 (16.7 MB)
- 2. Sniffing Passwords Using Wireshark.vtt (1.3 KB)
- 3. Spoofing MAC Address Using SMAC.mp4 (49.4 MB)
- 3. Spoofing MAC Address Using SMAC.vtt (3.2 KB)
- 4. Sniffing a network using the WINARPAtacker Tool.mp4 (38.5 MB)
- 4. Sniffing a network using the WINARPAtacker Tool.vtt (2.6 KB)
- 5. Wireshark installation.mp4 (33.1 MB)
- 5. Wireshark installation.vtt (2.3 KB)
- 6. Wireshark Overview.mp4 (20.6 MB)
- 6. Wireshark Overview.vtt (2.2 KB)
- 7. IP Address smart scanning whois.mp4 (19.6 MB)
- 7. IP Address smart scanning whois.vtt (1.6 KB)
- 8. Sniffing the Network Using the Omnipeek Network Analyzer.mp4 (37.2 MB)
- 8. Sniffing the Network Using the Omnipeek Network Analyzer.vtt (2.7 KB)
- 9. Quiz.html (0.1 KB)
- 1. Trojan Horse Introduction.html (4.8 KB)
- 2. Installing FatRat.mp4 (36.1 MB)
- 2. Installing FatRat.vtt (2.4 KB)
- 3. Generating backdoor for linux - FatRat.mp4 (52.0 MB)
- 3. Generating backdoor for linux - FatRat.vtt (3.0 KB)
- 4. Hack Android with FatRat.mp4 (61.2 MB)
- 4. Hack Android with FatRat.vtt (4.4 KB)
- 1. Create a virus using JPS Virus Tool(Z).mp4 (34.1 MB)
- 1. Create a virus using JPS Virus Tool(Z).vtt (2.5 KB)
- 2. Virus Analysis Using IDA Pro.mp4 (33.9 MB)
- 2. Virus Analysis Using IDA Pro.vtt (2.4 KB)
- 3. Virus Analysis Using OllyDbg.mp4 (33.2 MB)
- 3. Virus Analysis Using OllyDbg.vtt (2.3 KB)
- 4. Virus Analysis Using Virus Total.mp4 (12.1 MB)
- 4. Virus Analysis Using Virus Total.vtt (1.1 KB)
- 5. Quiz.html (0.1 KB)
- 1. Airmon-ng and Airodump-ng.mp4 (29.4 MB)
- 1. Airmon-ng and Airodump-ng.vtt (2.4 KB)
- 2. Breaking a WPS PIN to Get the Password with Bully.mp4 (61.8 MB)
- 2. Breaking a WPS PIN to Get the Password with Bully.vtt (4.9 KB)
- 3. Hacking WPS wifi using reaver kali linux.mp4 (55.4 MB)
- 3. Hacking WPS wifi using reaver kali linux.vtt (4.2 KB)
- 1. Buffer overflow introduction.html (8.1 KB)
- 2. Basic buffer overflow example.mp4 (16.8 MB)
- 2. Basic buffer overflow example.vtt (1.4 KB)
- 3. Basic buffer overflow attack using C.mp4 (71.6 MB)
- 3. Basic buffer overflow attack using C.vtt (5.3 KB)
- 1. dnsenum Information Gathering Tool Kali Linux.mp4 (37.3 MB)
- 1. dnsenum Information Gathering Tool Kali Linux.vtt (2.8 KB)
- 2. Netdiscover & ARP to Find Internal IP and MAC Addresses.mp4 (35.7 MB)
- 2. Netdiscover & ARP to Find Internal IP and MAC Addresses.vtt (3.0 KB)
- 3. whois web information gathering tool.mp4 (27.1 MB)
- 3. whois web information gathering tool.vtt (2.0 KB)
- 4. Quiz.html (0.1 KB)
- 1. Cryptography Introduction.html (3.0 KB)
- 2. Basic Data Encripting Using Cryptool.mp4 (40.4 MB)
- 2. Basic Data Encripting Using Cryptool.vtt (2.8 KB)
- 3. Data Encrypting Using Advanced Encryption Package.mp4 (45.1 MB)
- 3. Data Encrypting Using Advanced Encryption Package.vtt (3.1 KB)
- 4. Data Encrypting Using Hashcalc Tool.mp4 (52.6 MB)
- 4. Data Encrypting Using Hashcalc Tool.vtt (3.3 KB)
- 5. Data Encrypting Using MD5 Calculator.mp4 (29.4 MB)
- 5. Data Encrypting Using MD5 Calculator.vtt (2.0 KB)
- 6. Encripting and Decripting Data Using BCTextEncoder.mp4 (27.5 MB)
- 6. Encripting and Decripting Data Using BCTextEncoder.vtt (1.9 KB)
- 7. Quiz.html (0.1 KB)
- 1. HTTP Tunneling Using HTTPort.mp4 (97.6 MB)
- 1. HTTP Tunneling Using HTTPort.vtt (7.3 KB)
- 1. System Hacking Introduction.html (3.0 KB)
- 2. Hiding files using the Stealth Files Tool.mp4 (63.5 MB)
- 2. Hiding files using the Stealth Files Tool.vtt (3.9 KB)
- 3. System Monitoring Using RemoteExec.mp4 (63.1 MB)
- 3. System Monitoring Using RemoteExec.vtt (5.2 KB)
- 1. EHC Last video of this course.mp4 (39.8 MB)
- 1. EHC Last video of this course.vtt (4.5 KB)
- 1. Enumeration Introduction.html (0.8 KB)
- 2. Enumeration Introduction.mp4 (13.5 MB)
- 2. Enumeration Introduction.vtt (1.1 KB)
- 3. Enumerating the System Using Hyena.mp4 (22.6 MB)
- 3. Enumerating the System Using Hyena.vtt (1.5 KB)
- 4. SuperScan Tool for Enumerating NetBIOS.mp4 (18.5 MB)
- 4. SuperScan Tool for Enumerating NetBIOS.vtt (1.4 KB)
- 5. Enumerating a Network Using SoftPerfect Network Scanner.mp4 (12.7 MB)
- 5. Enumerating a Network Using SoftPerfect Network Scanner.vtt (1.2 KB)
- 1. NMAP in kali.mp4 (72.0 MB)
- 1. NMAP in kali.vtt (5.0 KB)
- 2. Installing NMAP in windows.mp4 (21.4 MB)
- 2. Installing NMAP in windows.vtt (1.7 KB)
- 3. Exploring and Auditing a Network Using Nmap1.mp4 (21.5 MB)
- 3. Exploring and Auditing a Network Using Nmap1.vtt (2.0 KB)
- 4. Exploring and Auditing a Network Using Nmap2.mp4 (31.5 MB)
- 4. Exploring and Auditing a Network Using Nmap2.vtt (2.7 KB)
- 5. Exploring and Auditing a Network Using Nmap3.mp4 (17.5 MB)
- 5. Exploring and Auditing a Network Using Nmap3.vtt (1.5 KB)
- 6. Fingerprinting Open Ports Using the Amap.mp4 (17.7 MB)
- 6. Fingerprinting Open Ports Using the Amap.vtt (17.7 MB)
- 7. Angry IP Scanner Script.mp4 (22.9 MB)
- 7. Angry IP Scanner Script.vtt (1.7 KB)
- 8. Scanning System and Network Resources Using Advanced IP Scanner.mp4 (21.6 MB)
- 8. Scanning System and Network Resources Using Advanced IP Scanner.vtt (1.8 KB)
- 9. Monitoring TCPIP Connections Using the Currports Tool.mp4 (22.4 MB)
- 9. Monitoring TCPIP Connections Using the Currports Tool.vtt (1.8 KB)
- 1. Metasploit Introduction.mp4 (33.6 MB)
- 1. Metasploit Introduction.vtt (2.8 KB)
- 2. Metasploit Basic Commands Part1.mp4 (21.2 MB)
- 2. Metasploit Basic Commands Part1.vtt (2.0 KB)
- 3. Metasploit basic commands Part2.mp4 (45.2 MB)
- 3. Metasploit basic commands Part2.vtt (3.8 KB)
- 4. Search targets in metasploit.mp4 (29.4 MB)
- 4. Search targets in metasploit.vtt (2.1 KB)
- 5. Windows hacking.mp4 (31.6 MB)
- 5. Windows hacking.vtt (2.1 KB)
- 6. Hacking android.mp4 (26.7 MB)
- 6. Hacking android.vtt (2.0 KB)
- 7. Quiz.html (0.1 KB)
- 1. Gathering a Information about a Person.mp4 (50.8 MB)
- 1. Gathering a Information about a Person.vtt (3.0 KB)
- 10. Hack Remote PC Using HTA Attack in SET Toolkit.mp4 (30.4 MB)
- 10. Hack Remote PC Using HTA Attack in SET Toolkit.vtt (2.2 KB)
- 11. MAC address Spoofing with MACChanger.mp4 (41.9 MB)
- 11. MAC address Spoofing with MACChanger.vtt (3.0 KB)
- 12. Quiz.html (0.1 KB)
- 2. Gather Email Info - Maltego tool.mp4 (34.7 MB)
- 2. Gather Email Info - Maltego tool.vtt (2.6 KB)
- 3. Discovering Domain info Emails associated with Target.mp4 (22.5 MB)
- 3. Discovering Domain info Emails associated with Target.vtt (1.7 KB)
- 4. Mass Mailer Attack to Single Email.mp4 (38.3 MB)
- 4. Mass Mailer Attack to Single Email.vtt (3.0 KB)
- 5. Mass Mailer Attack to Multiple Emails.mp4 (36.6 MB)
- 5. Mass Mailer Attack to Multiple Emails.vtt (2.7 KB)
- 6. SocialFish - The Ultimate Phishing Tool(Ngrok Integration).mp4 (27.3 MB)
- 6. SocialFish - The Ultimate Phishing Tool(Ngrok Integration).vtt (2.2 KB)
- 7. Detecting Phishing Page Using PhishTank.mp4 (15.0 MB)
- 7. Detecting Phishing Page Using PhishTank.vtt (1.6 KB)
- 8. Credential Harvest Attack Using Settoolkit.mp4 (28.6 MB)
- 8. Credential Harvest Attack Using Settoolkit.vtt (2.3 KB)
- 9. Create a Payload and Listener -Social Engineering Toolkit.mp4 (84.2 MB)
- 9. Create a Payload and Listener -Social Engineering Toolkit.vtt (5.8 KB)
- 1. Web Applicaton Haking Introduction.mp4 (49.1 MB)
- 1. Web Applicaton Haking Introduction.vtt (4.5 KB)
- 2. Cross site Request Forgery Combined with curl - Web application Hacking.mp4 (34.9 MB)
- 2. Cross site Request Forgery Combined with curl - Web application Hacking.vtt (3.7 KB)
- 3. DVWA Upload and Use cpp php Backdoor shell.mp4 (86.4 MB)
- 3. DVWA Upload and Use cpp php Backdoor shell.vtt (7.7 KB)
- 4. Striker - vulnerability scanner.mp4 (26.6 MB)
- 4. Striker - vulnerability scanner.vtt (2.1 KB)
- 5. Webcruiser - Web Application Scanner.mp4 (51.9 MB)
- 5. Webcruiser - Web Application Scanner.vtt (3.7 KB)
- 6. XAttacker - Website vulenarbility Scanner.mp4 (30.0 MB)
- 6. XAttacker - Website vulenarbility Scanner.vtt (2.2 KB)
- 1. XSS Introduction.mp4 (26.3 MB)
- 1. XSS Introduction.vtt (1.9 KB)
- 10. Becon flooding using mdk3.mp4 (40.9 MB)
- 10. Becon flooding using mdk3.vtt (3.3 KB)
- 11. Extracting SAM Hashes Using PWDump7 Tool.mp4 (33.9 MB)
- 11. Extracting SAM Hashes Using PWDump7 Tool.vtt (2.5 KB)
- 12. Manipulating Parameters.mp4 (27.8 MB)
- 12. Manipulating Parameters.vtt (2.1 KB)
- 2. Types of Cross-Site Scripting Attacks.mp4 (45.0 MB)
- 2. Types of Cross-Site Scripting Attacks.vtt (3.9 KB)
- 3. Cross Site Scripting(XSS) Introduction.html (30.5 KB)
- 4. XSS Basics demonstration.mp4 (27.1 MB)
- 4. XSS Basics demonstration.vtt (1.5 KB)
- 5. finding XSS websites.mp4 (17.3 MB)
- 5. finding XSS websites.vtt (1.9 KB)
- 6. Finding reflected XSS vulenarabilities.mp4 (19.3 MB)
- 6. Finding reflected XSS vulenarabilities.vtt (1.9 KB)
- 7. XSS Stored Low.mp4 (48.8 MB)
- 7. XSS Stored Low.vtt (3.6 KB)
- 8. XSS Stored Medium.mp4 (22.6 MB)
- 8. XSS Stored Medium.vtt (2.1 KB)
- 9. XSS Stored High.mp4 (18.2 MB)
- 9. XSS Stored High.vtt (1.4 KB)
- 1. SQL Injection Introduction.html (7.4 KB)
- 10. Extracting data through Union Statement1.mp4 (30.0 MB)
- 10. Extracting data through Union Statement1.vtt (2.5 KB)
- 11. Extracting data through Union Statement2.mp4 (19.0 MB)
- 11. Extracting data through Union Statement2.vtt (1.9 KB)
- 12. Extracting data through Union Statement3.mp4 (48.0 MB)
- 12. Extracting data through Union Statement3.vtt (3.9 KB)
- 13. Extracting data through Union Statement4.mp4 (25.9 MB)
- 13. Extracting data through Union Statement4.vtt (2.4 KB)
- 14. SQL Injection Quiz.html (0.1 KB)
- 15. Quiz.html (0.1 KB)
- 2. SQL Injection Introduction.mp4 (46.6 MB)
- 2. SQL Injection Introduction.vtt (3.4 KB)
- 3. Havij - SQL Injection Exploitation.mp4 (60.4 MB)
- 3. Havij - SQL Injection Exploitation.vtt (5.3 KB)
- 4. Bypass Login page SQL Injection.mp4 (31.3 MB)
- 4. Bypass Login page SQL Injection.vtt (3.1 KB)
- 5. Boolean Blind SQL Injection Explotiting.mp4 (20.4 MB)
- 5. Boolean Blind SQL Injection Explotiting.vtt (3.9 KB)
- 6. Setting up DVWA1.mp4 (31.7 MB)
- 6. Setting up DVWA1.vtt (2.7 KB)
- 7. Setting up DVWA2.mp4 (54.1 MB)
- 7. Setting up DVWA2.vtt (3.7 KB)
- 8. Checking sql vulnerability.mp4 (18.2 MB)
- 8. Checking sql vulnerability.vtt (1.8 KB)
- 9. Extracting data through Union Statement Theory.mp4 (56.1 MB)
- 9. Extracting data through Union Statement Theory.vtt (4.6 KB)
- [DesireCourse.Com].url (0.0 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://62.138.0.158:6969/announce
- udp://87.233.192.220:6969/announce
- udp://88.198.231.1:1337/announce
- udp://151.80.120.113:2710/announce
- udp://111.6.78.96:6969/announce
- udp://90.179.64.91:1337/announce
- udp://51.15.4.13:1337/announce
- udp://191.96.249.23:6969/announce
- udp://35.187.36.248:1337/announce
- udp://123.249.16.65:2710/announce
- udp://127.0.0.1:6969/announce
- udp://210.244.71.25:6969/announce
- udp://78.142.19.42:1337/announce
- udp://173.254.219.72:6969/announce
- udp://51.15.76.199:6969/announce
- udp://91.212.150.191:3418/announce
- udp://103.224.212.222:6969/announce
- udp://92.241.171.245:6969/announce
- udp://51.15.40.114:80/announce
- udp://37.19.5.139:6969/announce