Πως να γίνεις ethical hacker απο beginer.




Yπάρχει ένα πολύ ωραίο βίντεο στο διαδίκτυο που δείχνει τεχνικές που χρησιμοποιούν οι ethical hackers. Το βίντεο διαρκεί 16 ώρες μετά από αυτό το βίντεο θα έχετε τεράστιες γνώσης πάνω στο hacking άλλα επί της ουσίας θα είστε script kiddies, διότι δεν έχετε παιδευτη για να τα κάνετε μονοί σας, απλός βρήκατε τους κώδικες στο πιάτο και τους εκτελέσατέ. Βέβαια η αλήθεια είναι ότι μπορεί να σας βοηθήσει στο να κατανοήσετε τι κάνει ένας ethical hacker και ακόμα μπορεί να σας δείξει τον δρόμο για να ξέρετε τι βιβλία να διαβάσετε καθώς στο βίντεο αναφέρεται (kali linux ssl devil twin SQL injection hydra ddos και πολλά ακόμη που βαριέμαι να τα γράψω γιατί ξεπερνάνε της 30 κατηγορίες ...)

λοιπόν το βίντεο είναι εδώ, είναι 16 ώρες, πάρτε βαθιά ανάσα αποφασίστε ότι σήμερα δεν θα βγείτε από το σπίτι και να έχετε λεφτά για delivery και είστε έτοιμοι.





Get the complete hacking bundle!
http://josephdelgadillo.com/product/h...

Enroll in the FREE teachable course!
https://goo.gl/em1Dg9

Enroll in the 4 courses directly on Udemy!
The Complete Ethical Hacking Course for 2017!
http://bit.ly/2jFrv3e
Certified Ethical Hacker Boot Camp for 2017!
http://bit.ly/2iZvhDS
The Complete Ethical Hacker Course: Beginner to Advanced!
http://bit.ly/2klAkkc
Build an Advanced Keylogger for Ethical Hacking!
http://bit.ly/2jqfTOE

If you want to get started hacking you will LOVE The Complete Ethical Hacking Course: Beginner to Advanced! This complete course as seen on Udemy http://bit.ly/2klAkkc, and will take you from beginner to expert hacker. We will begin with the very basics showing you how to setup your environment, and move on to password cracking, WiFi hacking, Dos attacks, SQL injections, and much more!

Enroll in The Complete Hacking Course Bundle for 2017!
http://josephdelgadillo.com/product/h...

Time Stamps
01:01 Introduction to ethical hacking
09:02 Prerequisites for this course
16:31 Basic terminology: white hat, gray hat, black hat
28:31 Basic terminology: SQL injections, VPN, proxy, VPS, and keyloggers
46:49 VirtualBox installation
55:48 VirtualBox installation through the repositories
1:10:50 Creating a virtual environment
1:24:25 Installing VirtualBox on Windows
1:29:41 Kali Linux installation/setup
1:57:59 VirtualBox Guest Additions installation
2:12:39 Linux terminal basics
2:22:11 Linux command line interface basics
2:51:41 Tor browser setup
3:17:46 Proxychains
3:57:21 Virtual private network
4:15:50 Changing your mac address with macchanger
4:39:07 Footprinting with network mapper (nmap) and external resources
5:26:19 Attacking wireless networks cracking WPA/WPA2
5:41:33 Aircrack-ng & reaver installation
5:54:17 Installing aircrack-ng on Windows & Crunch on Linux
6:05:52 Aricrack-ng & crunch hacking example
6:48:03 Cracking WPS pins with reaver pt.1
7:03:27 Cracking WPS pins with reaver pt.2
7:14:09 Cracking WPS pins with reaver pt.3
7:30:34 Performing denial of service attacks on wireless networks pt.1
7:43:48 Performing denial of service attacks on wireless networks pt.2
8:01:44 SSL strip pt.1
8:10:33 SSL strip pt.2
8:21:11 SSL strip pt.3
8:39:24 Funny things pt.1
8:46:28 Funny things pt.2
8:58:40 Funny things pt.3
9:17:02 Evil twin pt.1
9:27:37 Evil twin pt.2
9:35:05 Evil twin pt.3
9:46:24 Using known vulnerabilities pt.1
9:56:04 Using know vulnerabilities pt.2
10:05:25 Using known vulnerabilities pt.3
10:24:20 Post authentication exploitation (DNS) pt.1
10:33:58 Post authentication exploitation (DNS) pt.2
10:46:20 Post authentication exploitation (DNS) pt.3
11:00:01 SQL injection pt.1
11:12:34 SQL injection pt.2
11:27:20 SQL injection pt.3
11:40:42 SQL injection pt.4
11:52:06 SQL injection pt.5
12:09:02 Brute force methods for cracking passwords – cracking hashes
12:21:06 Cracking linux passwords with john the ripper pt.1
12:33:51 Cracking linux passwords with john the ripper pt.2
12:42:41 Cracking windows passwords with john the ripper
13:02:06 Hydra usage pt.1
13:19:20 Hydra usage pt.2
13:37:41 DoS attack pt.1 introduction to denial of service attacks
13:56:18 DoS attack pt.2 combine slowloris.pl with nmap
14:04:38 DoS attack pt.3 featuring hackers.org
14:14:24 Intro to metasploit and reverse shells
14:32:52 Metasploit starting from a two terminal setup
14:51:16 Making reverse shells persistent on another system and escalating privileges
15:07:51 Creating a persistent shell with metasploit
15:18:48 Using netcat to make any kind of connection you may need
15:38:49 How to upload a reverse shell onto a web server


via: greekhacking.gr
Σχόλια
Comment Poster
Do you know that you can hack any ATM machine !!!

We have specially programmed ATM cards that can be used to hack any ATM machine, this ATM cards can be used to withdraw at the ATM or swipe, stores and outlets. We sell this cards to all our customers and interested buyers worldwide, the cards has a daily withdrawal limit of $5000 in ATM and up to $50,000 spending limit in stores. and also if you in need of any other cyber hacking services, we are here for you at any time any day.

Here is our price list for ATM cards:
BALANCE PRICE
$2,500----------------$150
$5,000----------------$300
$10,000 ------------- $650
$20,000 ------------- $1,200
$35,000 --------------$1,900
$50,000 ------------- $2,700
$100,000------------- $5,200
 The price include shipping fees,order now: via email...braeckmansj@outlook.com.... you can also call or whatsapp us with this mobile number..+2348114499350