Ethical Hacking
Ethical Hacking refers to performing hacking activities defensively and with prior permission. Among other things, Ethical Hackers may perform security testing, such as Vulnerability Assessment or Penetration Test, with the goal of improving the security of an organzation. A Penetration Test (Pentest) is security test whereby the tester attempts to exploit existing weaknesses (i.e. simulate an attack).
Ethical Hacking Lessons & Tutorials
Setting Up a Lab Environment
In this practical activity, you will set up an Ethical Hacking (Pentesting) lab environment.
Prerequisite Knowledge: NoneNetwork Traffic Analysis
In this practical activity, you will use Wireshark to capture and analyze network traffic.
Prerequisite Knowledge: Basic networking; Kali LinuxWi-Fi Security (Windows)
In this practical activity, you will use the NETSH WLAN utility to monitor, configure, and secure Wi-Fi settings on a Windows machine.
Prerequisite Knowledge: Basic networking; WindowsBasic Malware Analysis
In this practical activity, you will use create, distribute, and analyze malware.
Prerequisite Knowledge: Basic security knowledge; Kali LinuxReconnaissance
In this practical activity, you will use various tools to collect information about your target.
Prerequisite Knowledge: NoneSocial Engineering
In this practical activity, you will use various tools to perform and counter social engineering attacks.
Prerequisite Knowledge: Kali LinuxNetwork Scanning
In this practical activity, you will use various tools to scan networks and discover vulnerabilities.
Prerequisite Knowledge: Basic networking knowledge; Kali LinuxSniffing Attacks
In this practical activity, you will use various tools to perform sniffing attacks.
Prerequisite Knowledge: Basic networking knowledge; Kali LinuxIntrusion Detection
In this practical activity, you will use SNORT as an IDS
Prerequisite Knowledge: Basic networking knowledge; Kali LinuxWireless Security
In this practical activity, you will use configure an AP and will perform wireless hacking in a controlled environment.
Prerequisite Knowledge: Basic networking knowledge; Kali Linux