Udemy - Learn Ethical Hacking & Reverse Engineering
- Category Other
- Type Tutorials
- Language English
- Total size 5.0 GB
- Uploaded By tutsnode
- Downloads 1101
- Last checked 1 day ago
- Date uploaded 5 years ago
- Seeders 18
- Leechers 7
Infohash : 39D59A1226773999519A75778C61F18ECFB51612
Description
If you want to learn ethical hacking & also reverse engineering the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack and also to reverse software. These websites typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn hacking and reversing. All you need is a PC. In this course I am only using a Windows PC to do ethical hacking and reverse engineering.
The website we will be hacking is DefendTheWeb which is a popular hackerās playground where hackers play hacking games reminiscent of CTF (Capture the Flag) and learn at the same time. However, without some help and guidance you will find it quite challenging. Hence this course. I will walk through each level from Basic to Realistic.
For the Reverse Engineering lessons, you will learn how to reverse CrackMeās. A CrackMe is a small program designed to test a programmerās reverse engineering skills.
These CrackMeās typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn reverse engineering (reversing). Traditionally, reverse engineering is taught by first learning C/C++, assembly language and then debugging. Note that we do not crack software nor condone the act of cracking software.
The crackmeās we will be reversing is provided by CrackingLessons and Crackmes One which are a popular reverserās playground . Information on solving crackmes on the Internet is terse and unstructured. Hence this course. I will walk through each level just like in a classroom where you can follow along and ask questions in the Q & A section. All you need is a PC running Windows.
Great way to learn Web Development, Information Technology (IT), Assembly programming and Reverse Engineering:
If you had always wanted to learn HTML, Javascript, PHP, MySQL, etc, Assembly and Reverse Engineering, what better way than to learn how to hack websites ethically and reverse engineering. . This course is also a great stepping stone to other Reverse Engineering fields like malware analysis, exploits development and software testing. So letās get started in your journey of hacking & cracking to learn.
This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start hacking the fun and easy way!
Who this course is for:
Web developers who have no knowledge on hacking
Students who want to learn hacking the fun way by hacking real websites (legally)
Those who enjoy computer games and want to try hacking as a game
Programmers who want to level up their skill to reverse engineering software
IT or computing students who want to know how software works internally
Requirements
Basic knowledge of HTML, Javascript and SQL
Basic understanding of GET and POST requests
A PC, Linux not required
Basic knowledge in C, Assembly Language and Win32 API would be helpful but not mandatory
Last Updated 7/2020
Files:
Learn Ethical Hacking & Reverse Engineering [TutsNode.com] - Learn Ethical Hacking & Reverse Engineering 35. Debugger Stepping Basics- 1. Debugger Stepping Basics.mp4 (327.0 MB)
- 1.1 Debugger-stepping-basics.txt (0.4 KB)
- 1. Introduction.mp4 (40.1 MB)
- 2. Registering for an account with defendtheweb.net.mp4 (18.2 MB)
- 3. How to use this Guide.mp4 (41.6 MB)
- 3.1 How to use this guide.rtf (1.5 KB)
- 1. Intro 1 (Client code information leak).mp4 (28.9 MB)
- 2. [NEW] Intro 2 (HTML tag information leak).mp4 (23.4 MB)
- 3. Intro 3 (Javascript code information leak).mp4 (89.8 MB)
- 3.1 intro-3-updated.txt (0.3 KB)
- 4. Intro 4 (Path traversal vulnerability).mp4 (30.3 MB)
- 5. Intro 5 (Javascript prompt() function information leak).mp4 (13.7 MB)
- 6. [NEW] Intro 6 (Client code modification vulnerability).mp4 (30.7 MB)
- 7. [NEW] Intro 7 (robots.txt data leak vulnerability).mp4 (17.5 MB)
- 7.1 intro-7-updated.txt (0.1 KB)
- 8. Intro 8 (Path traversal vulnerability).mp4 (66.1 MB)
- 8.1 intro-8-updated.txt (0.2 KB)
- 9. Intro 9 (Client code modification vulnerability).mp4 (32.0 MB)
- 10. Intro 10 (Javascript code exposure and decryption).mp4 (27.2 MB)
- 10.1 intro-10-updated.txt (0.0 KB)
- 11. Intro 11 (File redirection vulnerability).mp4 (20.5 MB)
- 12. Intro 12 (MD5 decryption).mp4 (10.9 MB)
- 12.1 intro-12-new.txt (0.0 KB)
- 1. 24-bit (File extension manipulation exploit).mp4 (14.9 MB)
- 1. World of PeacecraftRealistic (Dumpster diving for emails).mp4 (23.8 MB)
- 1. Secure Agent (Browser Spoofing).mp4 (20.8 MB)
- 1. Crypt1Crypt (Reverse encryption).mp4 (13.7 MB)
- 1.1 crypt1-crypt.txt (0.0 KB)
- 1. Beach (Steganography analyis).mp4 (29.9 MB)
- 1. Squashed imageStego (Cracking steganography).mp4 (17.5 MB)
- 1. HTTP MethodIntro (HTTP POST exploit & Bypassing CSRF-token protection).mp4 (88.2 MB)
- 1.1 post.txt (0.2 KB)
- 1. Library GatewayRealistic (Javascript code exposure vulnerability).mp4 (25.3 MB)
- 1. SidIntro (Cookie tampering to bypass login).mp4 (15.0 MB)
- 1. Crypt2Crypt (Cracking Caeser Cipher encryption).mp4 (16.8 MB)
- 1.1 crypt2-crypt.txt (0.0 KB)
- 1. [NEW] Crypt3Crypt (Decoding Morse Code).mp4 (29.7 MB)
- 1. SQLi1SQLi (Bypassing login page password using SQL Injection Attack).mp4 (46.6 MB)
- 1.1 sql-injection-attack.txt (0.2 KB)
- 1. Recon (Information gathering skills, including B6-Keys).mp4 (43.2 MB)
- 1.1 recon-including-b6-key.txt (0.2 KB)
- 1. Crypt4Crypt (Decrypting ciphertext using online decryptors).mp4 (22.0 MB)
- 1.1 crypt4-crypt.txt (0.0 KB)
- 1. Map It (Portscanning and gaining remote access).mp4 (46.1 MB)
- 1.1 mapit.txt (0.1 KB)
- 1. Crypt5Crypt (Reversing & Decrypting ciphertext using online decryptors).mp4 (28.6 MB)
- 1.1 crypt5-crypt.txt (0.1 KB)
- 1. [NEW] SQLi2SQLi (Hacking admin username & password using SQL Injection Attack).mp4 (86.0 MB)
- 1.1 sqli2-sqli.txt (0.6 KB)
- 1. [NEW] Princess SlagRealistic (Directory traversal attack & null byte attacks).mp4 (83.3 MB)
- 1. Xmas '08Realistic (Website defacement attacks).mp4 (78.2 MB)
- 1.1 xmas08-realistic.txt (0.1 KB)
- 1. Planet BidRealistic (Password reminder exploits).mp4 (140.0 MB)
- 1.1 planetbid-realistic.txt (0.0 KB)
- 1. Access Logs (Log Injection Attack).mp4 (30.4 MB)
- 1. Sandra Murphy (XML Injection Attack).mp4 (35.6 MB)
- 1.1 sandra-murply.txt (0.2 KB)
- 1. AlphabetizeCoding (Using Javascript coding to defeat countdown timer).mp4 (116.1 MB)
- 1.1 alphabetize-coding.txt (0.3 KB)
- 1. AliensStego (Decoding wav files to extract passwords).mp4 (84.0 MB)
- 1.1 aliens-stego.txt (0.1 KB)
- 1. Custom EncodingCoding (Decryption & hacking website countdown timer).mp4 (133.6 MB)
- 1.1 custom-encoding-coding.txt (1.2 KB)
- 1. Missile codesForensics (Analyzing and extracting data from disk images).mp4 (193.2 MB)
- 1.1 missile-codes-forensics.txt (0.3 KB)
- 1.2 password.zip (0.1 KB)
- 1. Introduction to Captcha1 challenge.mp4 (18.3 MB)
- 2. Downloading and Installing an OCR software.mp4 (19.5 MB)
- 2.1 captcha1-captcha-installing-abby.txt (0.1 KB)
- 3. Using Abby (OCR tool) to convert image to text.mp4 (23.7 MB)
- 4. Download and install AutoIt (Automation tool).mp4 (26.0 MB)
- 4.1 captcha1-captcha-installing-autoit.txt (0.1 KB)
- 5. Using AutoIt.mp4 (188.5 MB)
- 5.1 demo.zip (0.4 KB)
- 1. Intro to Captcha2 challenge.mp4 (53.5 MB)
- 2. Collecting key images.mp4 (125.0 MB)
- 2.1 collecting-key-images.zip (0.6 KB)
- 3. Splitting the captcha image into 15 sample files.mp4 (28.4 MB)
- 3.1 split.zip (0.2 KB)
- 4. Installing node.js.mp4 (27.1 MB)
- 4.1 captcha2-installing-nodejs.txt (0.1 KB)
- 5. Intro to Node.js.mp4 (34.3 MB)
- 6. Using node.js to decode captcha image.mp4 (87.2 MB)
- 6.1 app.zip (0.6 KB)
- 7. Using AutoIt to defeat countdown timer.mp4 (109.5 MB)
- 7.1 using-autoit-to-defeat-timer.zip (1.2 KB)
- 1. Introduction to the Captcha3 challenge.mp4 (22.7 MB)
- 1.1 captcha3-what-is-needed.txt (0.3 KB)
- 2. Installing and Using Python.mp4 (86.4 MB)
- 3. Installing Pillow library for Python Image Manipulation.mp4 (55.0 MB)
- 3.1 captcha3-install-pillow-library.txt (0.1 KB)
- 3.2 piltest.py (0.3 KB)
- 4. Collecting key images.mp4 (129.4 MB)
- 4.1 cropcaptcha.py (1.5 KB)
- 5. Splitting the captcha3 sample using python.mp4 (20.1 MB)
- 5.1 cropcaptcha.py (1.5 KB)
- 6. Creating nodejs script to decode captcha sample images.mp4 (41.5 MB)
- 6.1 app.zip (0.6 KB)
- 7. Using AutoIt to automate tasks and defeat timer limitation.mp4 (38.3 MB)
- 7.1 using-auto-it-captcha3.zip (2.2 KB)
- 1. Introduction to crackme's.mp4 (20.0 MB)
- 1.1 intro-to-crackmes-v3.txt (0.1 KB)
- 1. Downloading and installing x64dbg and Detect It Easy (DIE).mp4 (60.6 MB)
- 1.1 installing-x64dbg-and-detect-it-easy.txt (0.1 KB)
- 1. Setting up your cracking workspace and workflow.mp4 (116.9 MB)
- 1.1 download-link-for-mexican-crackme.txt (0.1 KB)
- 1. Stepping Into Calls.mp4 (237.5 MB)
- 1.1 Stepping-into-calls.txt (0.2 KB)
- 1. Breakpoints.mp4 (85.9 MB)
- 1.1 BreakPoints.txt (0.3 KB)
- 2. Setting Breakpoints on Strings.mp4 (116.4 MB)
- 2.1 BreakPoints-on-strings.txt (0.3 KB)
- 1. Reversing Jumps.mp4 (105.0 MB)
- 1.1 Reversing-jumps.txt (0.3 KB)
- 1. How to patch a program.mp4 (151.5 MB)
- 1.1 Patching.txt (0.3 KB)
- 2. Patching with Jumps.mp4 (91.3 MB)
- 2.1 Patching-with-jumps.txt (0.3 KB)
- 1. The 5 steps of cracking software.mp4 (40.1 MB)
- 1.1 Summary-of-cracking-workflow.txt (0.6 KB)
- 1. Introduction to cracking gui-based programs.mp4 (29.1 MB)
- 1.1 intro-cracking-gui-based-progs.txt (0.1 KB)
- 1. Analyzing the PE for a gui-based program.mp4 (40.1 MB)
- 1. Setting up x64dbg.mp4 (10.7 MB)
- 1.1 setting-up-x64dbg.txt (0.1 KB)
- 2. Crack the Serial Key using BP on strings.mp4 (115.8 MB)
- 2.1 crack-serial-key-using-bp-on-strings.txt (0.2 KB)
- 1. Window api functions.mp4 (77.3 MB)
- 2. Pushing parameters to the stack.mp4 (90.7 MB)
- 2.1 pushing-parameters-to-the-stack.txt (0.5 KB)
- 1. Patching to bypass wrong serial key message.mp4 (153.1 MB)
- 1.1 bypassing-wrong-serial-key-message.txt (0.6 KB)
- 1.2 eax-ax-al-differences.png (65.3 KB)
- 2. Bypassing using xor assembly.mp4 (141.0 MB)
- 2.1 bypassing-using-xor-assembly.txt (0.7 KB)
- 1. Bonus Lecture.mp4 (10.6 MB)
- 1.1 useful-resources-for-further-study.pdf (623.5 KB)
- TutsNode.com.txt (0.1 KB)
- [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
Comments
Code:
- udp://inferno.demonoid.pw:3391/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://torrent.gresille.org:80/announce
- udp://glotorrents.pw:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://9.rarbg.to:2710/announce
- udp://shadowshq.yi.org:6969/announce
- udp://tracker.zer0day.to:1337/announce