• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

Ethical Hacking Labs (1 Viewer)

Currently reading:
 Ethical Hacking Labs (1 Viewer)

Recently searched:

martin9

Member
LV
2
Joined
Feb 3, 2023
Threads
10
Likes
25
Awards
6
Credits
5,679©
Cash
0$
This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the resources of CEH content and different resources across the internet.


keyboard
The tutorials is very practical/hands-on. Don't worry if you are a completely noob, you don't need to be an expert to start learn ethical hacking. Google is always your best friend. This repo will guide you very carefully from basics to more advanced techniques.


white_check_mark
Prerequisites
:


  • Any computer with at least 8GB RAM (16GB recommended)
  • At least 80GB of free disk space available
  • Hardware-based virtualization support



warning
Disclaimer
: This is purely for educational purposes only. DO NOT try these techniques with any public network. Because if you are find guilty for causing any harm to any individual, government, corporate body, non-profit etc you will be sued with serious charges of cyber crime. I recommend you to practice the lessons in this course on your owned system and your own data in a private or local network.



gear
Core Knowledge​


First things first, you really need to understand how things work before start to disassembly and look for vulnerable components. The more you understand how things works, a better hacker you'll be. The 'Core Knowledge' (module 0) is just a jumpstart to these topics.


Core Knowledge provides a jumpstart to networking, linux systems, virtualization, lab building, scripting and also information security topics. If you are familiar on these topics you can skip it straight to Ethical Hacking module.



crossed_swords
Ethical Hacking​


  1. Footprinting and Reconnaissance
  2. Scanning Networks
  3. Enumeration
  4. Vulnerability Analysis
  5. System Hacking
  6. Malware
  7. Sniffing
  8. Social Engineering
  9. Denial-of-Service
  10. Session Hijacking
  11. Bonus -
    microscope
    The Forensic Approach



thought_balloon
To Do
:


  • Add Foundational level modules (networking, virtualization, crypto, linux kernel and scripting).
  • Bonus modules to add:
    • Introduction to Infosec terms and methodologies (from CEH Study Guide)
    • More Reconnaissance techniques.
    • Active Directory: Lab build and attack vectors.
    • Web application: Enumeration and exploitation using some OWASP Top 10 vulnerabilities and Bug Bounty techniques.
    • Wireless hacking (WPA)

Link:
 
  • Like
Reactions: ngr and Carders001

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom