A Student Support Portal by PHMC SECURITIES
A Student Live Chat (7 PM to 11 PM IST, Time is Favorable For all Countries) Mon - Fri
Free Access to Web Hacking P-LAB for One Month on Verification of Identity
A VPN Server for Static IP to Access P-LAB
The WAPT E-Book by PHMC SECURITIES
Attendance Certificate worth 10 CPE Point
( Make sure to email at support@phmcsecurities.org from your registered Email for claiming your Additional Resources)
This course Currently Includes The All 7 Modules in our Series but We are Adding More Additional Lectures each Month
Module 1 : Extreme Basics :-
Understanding the Process of Hacking
Choosing an Operating System
Preparing a Portable Hacking USB Drive
Working with Visualization and Installing Kali Linux
Working with Cloud and Pen-Testing Tools
Orientation to Kali Linux
Understanding File Operations, Navigation and Permissions & Ownership in Terminal
Module 2 : Hack the Web :-
Setting DVWA Lab for Legal Safety
Understanding and Exploiting Vulnerabilities :-
CSRF
XSS Reflected, Stored and DOM
Command Injection
File Upload and Inclusion
SQL Injection
Weak Session IDs
Brute Forcing
Creating Payload to Attack Web Applications
Scanning for Vulnerabilities through Automated Tools like VEGA
Module 3 : Anonymity and Deception :-
Working with Proxy, VPN and TOR
Advanced TOR to VPN and VPN to TOR Circuits
Mac Address and DNS LEAKS
Fake Online Identity and Email
Spoofed Call and SMS from Any Number
and a lot much More
Module 4 : Human is the Weakest Link :-
Open Source Intelligence Data Gathering on Human
Main Techniques Used
Ethical Hacking through Hardware like Arduino and Digispark
Extreme Level Phishing though GoPhish on a Virtual Private Server
Module 5 : The Art of Reconnaissance :-
Working with Google Hacking
Getting Deep with Nmap
Detecting OS, Finding Ports, Checking for Vulnerabilities
and some more things to be added soon
Module 6 : Attack like a Pro :-
Setting up Metasploit
Learning MSFConsole, MSFVenom
Multi Handler and Meterpreter
Introduction to Venom for Antivirus Evasion
Making Fully Undetectable Payloads
Module 7 : Reporting:-
Learn What to Mention
Learn What not to Mention
Steps to Recreate and PoC
Example of a Good Report
💢💢💢💢💢💢💢💢
Product Details: https://bit.ly/3qdBPzB
File size: 4.1GB
Payment and delivery:
1. Please provide your EMAIL address in “message:” during checkout.
2. The download link will be emailed to you after payment has been confirmed.
🔥 All files will be delivered through Google Drive.
🔥 Lifetime Access
Kindly PM us if you are looking for other ebooks/ Video Courses.
Enjoy learning!