Ethical Hacking தமிழ்
Course Description
Ethical hacking is the process of testing and securing computer systems, networks, and applications by identifying vulnerabilities and weaknesses before malicious hackers can exploit them. Unlike black hat hackers, ethical hackers have authorization from the system's owner to conduct tests and report findings.
Key Concepts of Ethical Hacking:
-
Reconnaissance (Footprinting): Gathering public information to understand the target system.
-
Scanning and Enumeration: Identifying open ports, services, and network vulnerabilities.
-
Exploitation: Attempting to exploit identified vulnerabilities in a controlled manner.
-
Post-Exploitation: Understanding the impact of the vulnerability and how attackers might escalate privileges.
-
Reporting: Documenting findings and suggesting remediation steps to improve security.
Ethical hackers use tools and techniques similar to those used by malicious hackers, but the intent is to improve security and prevent cyber attacks. They adhere to strict legal and ethical guidelines to ensure their actions are authorized and beneficial to the organization.
Course Curriculum
- 1.Lab Setup
- 2.Virtual Machine
- 3. Installing Virtual Box in Mac
- 4.Installing Vbox in Windows
- 5.Installing Vbox in Linux
- 6. Install kali in Mac
- 7.Download Kali Linux
- 8.Install Kali Linux on Virtual Box
- 9. Installing Bwapp in Mac
- 10.Installing Metasploitable 2 in Mac
- 11.Installing Bwapp on Virtual Box
- 12.Installing Metasploitable 2 on Virtual Box
- 1.Web Hacking 101
- 2.DNS
- 3.URL Overview
- 4.URL
- 5. Request & Response
- 6.Burp Config
- 7.Burp Proxy Part 1
- 8. Burp Proxy Part 2
- 9.Burp Repeater
- 10. HTTP Methods
- 11.HTTP Status Code
- 12.HTTP Headers
- 13.Start Your BWapp
- 14.Host Header Attack
- 15.LFI & RFI + RCE
- 16.DOS Attack on Web
- 17.LIVE DOS Attack on Win 10
- 18.HTML Injection
- 19.SQL Injection
- 20.About CVE
- 21.HeartBleed Vulnerability
- 22.Final Video