Black Hat Course

Teacher:

Progragamer

đź“– Duration:

9 Hours

⏳ Lectures:

33 Lectures

$100.00

80$

🕸️ Master the Art of Offensive Hacking and Unleash Your Full Potential!

🔑 Course Highlights:

Dive into the clandestine world of cybersecurity with our groundbreaking course,

“Exploring Cyber Shadows: Black Hat Hacking .” This innovative program is the first of its kind in the Arab world,

designed to provide a comprehensive understanding of the techniques, tools, and mindset of black hat hackers.

👥 Who Should Join?

Cybersecurity professionals

Information security officers

Software developers

IT students and researchers

Anyone interested in learning more about the dark side of cybersecurity and black hat hacking

Students Requirements

Basic understanding of cybersecurity concepts and principles.

Familiarity with computer networks and operating systems.

Proficiency in using common cybersecurity tools and software.

Willingness to adhere to ethical guidelines and legal regulations in cybersecurity practices.

Access to a reliable internet connection and necessary hardware/software for virtual labs and exercises.

Commitment to continuous learning and staying updated on evolving cybersecurity threats and techniques.

Completion of at least one of our previous cybersecurity courses or equivalent training to ensure a foundational understanding of cybersecurity concepts and methodologies.

Hardware Requirements

Personal Computer or Laptop: Participants must have access to a personal computer or laptop with the following specifications:

Processor: Intel Core i5 or equivalent

RAM: Minimum 6GB RAM

Storage: Minimum 256GB SSD

Operating System: Windows 10/11 or Linux (recommended)

Virtualization Support: The computer must support virtualization technology (e.g., Intel VT-x or AMD-V) to run virtual machines for practical exercises and labs.

Software Requirements

Virtualization Software: Participants must have virtualization software installed on their computers to run virtual machines for practical exercises. Recommended virtualization software includes:

Oracle VirtualBox

VMware Workstation Player

VMware Fusion (for macOS users)

Operating Systems:

Kali Linux: A pre-installed Kali Linux virtual machine image will be provided for hands-on exercises related to penetration testing and ethical hacking.

Parrot OS: A pre-installed Parrot OS virtual machine image will be provided for specific exercises and demonstrations related to cybersecurity and digital forensics.

Windows: Participants may need virtual machine image of Windows operating system (e.g., Windows 10) for certain exercises and demonstrations.

Course Outline: What You’ll Learn

 

Modules and Lessons:

Module 1: Advanced Information Gathering 

Google Droks

Doxing

Dark web

Top 10 Advanced OSINT Tools Full Tutorial

 

Module 2: Undetectable Reverse Shell Scripts Techniques

Create simple Undetectable Reverse Shell on Local Host

Undetectable  Meterpreter shell from a Reverse Shell

Undetectable Reverse and Meterpreter Shell over the Network

Undetectable RS by DLL Injection

Undetectable Meterpreter session from DLL Injection

Automated Script for Undetectable Meterpreter Session

Undetectable Hoax Shell payloads

 

Module 3: Social Engineering

Introduction to Social Engineering

SetoolKit Email Spoofing

SetoolKit QR Codes and Short URL’s

Go Phish Mail Spoofing

Brevo with Zphisher Email Spoofing

SMS Spoofing

In Session Phishing using Beef Platform

Revershell by Microsoft-Word

Hiding payloads inside Images

Binding raw payloads in exe files

Bypassing 2FA

 

Module 4: Command and Control (C2) Frameworks 

Empire4 (4 Lessons)

DiscoSploit

Havoc Framework

CraxRat Framework local hacking

CraxRat Framework external hacking

Xworms for Windows

Evilginx

 

Module 5: MITM Attacks

Introduction to MITM Attacks / Cane&Abel

ARP Spoofing and SSL Stripping by Cane

ARP/DNS Spoofing Ettercap

Bettercap Full Tutorials

 

Module 6: Keyloggers

Create Undetectable Python Keylogger

Keylogger to Email with Visual Studio

 

Module 7: Ransomwares

Get your own Ransomware