BLACK HAT COURSE
Black Hat Course
Teacher:
Progragamer
đź“– Duration:
9 Hours
⏳ Lectures:
33 Lectures
- 935
🔑 Course Highlights:
Dive into the clandestine world of cybersecurity with our groundbreaking course,
“Exploring Cyber Shadows: Black Hat Hacking .” This innovative program is the first of its kind in the Arab world,
designed to provide a comprehensive understanding of the techniques, tools, and mindset of black hat hackers.
👥 Who Should Join?
Cybersecurity professionals
Information security officers
Software developers
IT students and researchers
Anyone interested in learning more about the dark side of cybersecurity and black hat hacking
Students Requirements
Basic understanding of cybersecurity concepts and principles.
Familiarity with computer networks and operating systems.
Proficiency in using common cybersecurity tools and software.
Willingness to adhere to ethical guidelines and legal regulations in cybersecurity practices.
Access to a reliable internet connection and necessary hardware/software for virtual labs and exercises.
Commitment to continuous learning and staying updated on evolving cybersecurity threats and techniques.
Completion of at least one of our previous cybersecurity courses or equivalent training to ensure a foundational understanding of cybersecurity concepts and methodologies.
Hardware Requirements
Personal Computer or Laptop: Participants must have access to a personal computer or laptop with the following specifications:
Processor: Intel Core i5 or equivalent
RAM: Minimum 6GB RAM
Storage: Minimum 256GB SSD
Operating System: Windows 10/11 or Linux (recommended)
Virtualization Support: The computer must support virtualization technology (e.g., Intel VT-x or AMD-V) to run virtual machines for practical exercises and labs.
Software Requirements
Virtualization Software: Participants must have virtualization software installed on their computers to run virtual machines for practical exercises. Recommended virtualization software includes:
Oracle VirtualBox
VMware Workstation Player
VMware Fusion (for macOS users)
Operating Systems:
Kali Linux: A pre-installed Kali Linux virtual machine image will be provided for hands-on exercises related to penetration testing and ethical hacking.
Parrot OS: A pre-installed Parrot OS virtual machine image will be provided for specific exercises and demonstrations related to cybersecurity and digital forensics.
Windows: Participants may need virtual machine image of Windows operating system (e.g., Windows 10) for certain exercises and demonstrations.
Course Outline: What You’ll Learn
Â
Modules and Lessons:
Module 1: Advanced Information GatheringÂ
Google Droks
Doxing
Dark web
Top 10 Advanced OSINT Tools Full Tutorial
Â
Module 2: Undetectable Reverse Shell Scripts Techniques
Create simple Undetectable Reverse Shell on Local Host
Undetectable Meterpreter shell from a Reverse Shell
Undetectable Reverse and Meterpreter Shell over the Network
Undetectable RS by DLL Injection
Undetectable Meterpreter session from DLL Injection
Automated Script for Undetectable Meterpreter Session
Undetectable Hoax Shell payloads
Â
Module 3: Social Engineering
Introduction to Social Engineering
SetoolKit Email Spoofing
SetoolKit QR Codes and Short URL’s
Go Phish Mail Spoofing
Brevo with Zphisher Email Spoofing
SMS Spoofing
In Session Phishing using Beef Platform
Revershell by Microsoft-Word
Hiding payloads inside Images
Binding raw payloads in exe files
Bypassing 2FA
Â
Module 4: Command and Control (C2) FrameworksÂ
Empire4 (4 Lessons)
DiscoSploit
Havoc Framework
CraxRat Framework local hacking
CraxRat Framework external hacking
Xworms for Windows
Evilginx
Â
Module 5:Â MITM Attacks
Introduction to MITM Attacks / Cane&Abel
ARP Spoofing and SSL Stripping by Cane
ARP/DNS Spoofing Ettercap
Bettercap Full Tutorials
Â
Module 6: Keyloggers
Create Undetectable Python Keylogger
Keylogger to Email with Visual Studio
Â
Module 7: Ransomwares
Get your own Ransomware
