Awesome
<p align="center">Ethical Hacking Labs
</p>This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the resources of CEH content and different resources across the internet.
⌨️ The tutorials is very practical/hands-on. Don't worry if you are a completely noob, you don't need to be an expert to start learn ethical hacking. Google is always your best friend. This repo will guide you very carefully from basics to more advanced techniques.
✅ Prerequisites:
- Any computer with at least 8GB RAM (16GB recommended)
- At least 80GB of free disk space available
- Hardware-based virtualization support
⚠️ Disclaimer: This is purely for educational purposes only. DO NOT try these techniques with any public network. Because if you are find guilty for causing any harm to any individual, government, corporate body, non-profit etc you will be sued with serious charges of cyber crime. I recommend you to practice the lessons in this course on your owned system and your own data in a private or local network.
⚙️ Core Knowledge
First things first, you really need to understand how things work before start to disassembly and look for vulnerable components. The more you understand how things works, a better hacker you'll be. The 'Core Knowledge' (module 0) is just a jumpstart to these topics.
Core Knowledge provides a jumpstart to networking, linux systems, virtualization, lab building, scripting and also information security topics. If you are familiar on these topics you can skip it straight to Ethical Hacking module.
- Networking 101
- Lab Building / Virtualization
- Introduction to Linux
- [Scripting]
- Information Security 101
⚔️ Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Introduction
- LLMNR / NBT-NS Spoofing
- Dumping and Cracking SAM hashes
- Rainbow Tables
- Establishing a VNC Session
- Escalating Privileges
- Hacking Windows with MS Word file
- Hacking Windows with Msf/Meterpreter - Post Exploitation
- Hiding Data - NTFS streams
- Hiding Data - Steganography
- Using Covert_TCP
- Auditpol basics
- More Windows GUI Tools
- Malware
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Bonus - 🔬 The Forensic Approach
💭 To Do:
- Add Foundational level modules (
networking,virtualization, crypto, linux kernel and scripting). - Bonus modules to add:
Introduction to Infosec terms and methodologies (from CEH Study Guide)- More Reconnaissance techniques.
- Active Directory: Lab build and attack vectors.
- Web application: Enumeration and exploitation using some OWASP Top 10 vulnerabilities and Bug Bounty techniques.
- Wireless hacking (WPA)