Ethical hacking guide A-Z
The most comprehensive entry guide to ethical hacking out there .
off original price!
The coupon code you entered is expired or invalid, but the course is still available!
What you'll learn
The basics of the web and networking
Portscanning and network hacking
Getting a foothold
Privilege escalations
Web hacking
API hacking
Mobile hacking
Pentesting
Description
SUDO
I can not promise this course will find you bugs. I can promise i will leave you with a solid methodology that's netted me a few nice extra monthly salaries. This method is not guaranteed to work for you. You will need to adept. You will need to work.
If any course promises you that they WILL find you bugs, run as fast as you can.
CAT 'goals.txt'
I can hack, but i can only hack one target at a time. My passion is teaching so why not hit two birds with one stone?
I created this course because i strongly believe that if i hack 1 target i am just me but if i train 1000 hackers, we are an army.
This is my goal, i want to make the internet a safer place but i can't do it alone.
Who this course is for:
Beginner bug bounty hunters who are looking for a solid methodology and mindset
Experienced pentesters looking to get into bug bounties
Companies training their cybersecurity staff to withstand even the toughest of logic attacks
The course Contains :
The basics of networking, the web, and hacking
OSCP based enumeration techniques and an attack plan for foothold and priv esc
API testing
Mobile testing
Web application testing
And much more...
Who this course is for:
OSCP students
IT engineers
QA Engineers
Pentesters
Your Instructor
Wesley Thijs
I am the XSS Rat, an experienced ethical hacker who stands for quality and who believes knowledge is a building block we can all use to grow bigger than we ever were. As a software test i have a unique skill set that centers around logic flaws and IDORs which i have not seen very much by other hunters. This gives me the advantage of finding less duplicates and maximizing my chance of finding a vulnerability by picking the correct target and applying the correct test strategy.
Course Curriculum
Introduction
Available in
days
days
after you enroll
00x00 Syllabus
Available in
days
days
after you enroll
00x01 Introduction
Available in
days
days
after you enroll
-
StartIntroduction
-
StartIntro Video (7:18)
-
StartWhat is "Ethical" hacking"?
-
StartHow to engage a target?
-
StartHow to engage a target? (3:53)
-
Start@Ch1R0n1n: What it means to be an Ethical Hacker.pdf
-
Start@Ch1R0n1n: What it means to be an Ethical Hacker.pptx
-
Start@Ch1R0n1n: What is an Ethical Hacker? (13:28)
-
StartQUIZ: How ethical are you?
-
StartAssignment: Describe the deliverables of a pentest in your own words
-
StartAssignment: Let's fuzz hackxpert.com
00x02- Networking and Web application basics
Available in
days
days
after you enroll
-
StartWeb fundamentals Video (7:30)
-
StartWeb fundamentals
-
StartAssignment: Web
-
StartTransferring files (3:08)
-
StartDownloading files
-
StartFundamentals - Fuzzing.mp4 (2:49)
-
StartFuzzing
-
StartAssignment: Let's fuzz hackxpert.com
-
StartNetworking fundamentals
-
StartAssignment: Networking
-
StartQuiz: 00x02 Fundamentals
-
StartRealistic assignment: Fuzz our pentesting assignment
-
StartSOLUTION: Realistic assignment: Fuzz our pentesting assignment
00x03 - Tools
Available in
days
days
after you enroll
-
StartLinux CLI (2:33)
-
StartNetcat (5:08)
-
StartNetcat In depth Article
-
StartOWASP Zap Is Awesome_ First Impressions.mp4 (14:42)
-
Start00x03 OWASP ZAP
-
StartAssignment: Using OWASP ZAP
-
StartQuiz: 00x03 tools
-
Start00x03 Active recon
-
StartDNS in depth
-
StartDNS (7:11)
-
StartQuiz:00x03 DNS
-
StartAssignment: 00x03 DNS
00x04 Passive information gathering
Available in
days
days
after you enroll
00x05 Getting a foothold
Available in
days
days
after you enroll
-
StartGetting a foothold (3:47)
-
Start@Ch1R0n1n: Directory Busting Walkthrough.mp4 (17:38)
-
Start@Ch1R0n1n: Directory Busting.ppt
-
Start@TheXSSRat: Directory_brute_forcing.pdf
-
Start@Ch1R0n1n: Working with Exploits.mp4 (12:18)
-
Start@Ch1R0n1n: Working with Exploits.ppt
-
StartSMB enum
-
Start@Ch1R0n1n: SMB Enumeration.mp4 (21:35)
-
Start@Ch1R0n1n: SMB Enumeration.ppt
-
StartFTP Enumeration.MP4 (23:31)
-
StartFTP Enumeration
-
StartFTP Enumeration.ppt
-
StartSNMP enum
-
StartNFS enum
-
StartTelnet enum
-
StartSSH enum
-
StartEnumeration cheat sheet
-
StartGetting a foothold- The puzzle pieces fall in place - Video (12:29)
-
StartGetting a foothold- The puzzle pieces fall in place
-
StartQuiz: 0x05 Enum
-
StartAssignment: - Foothold
-
StartAssignment: - Foothold - Solutions
00x006 Privilege escalation
Available in
days
days
after you enroll
-
StartLinux priv-esc (33:16)
-
StartLinux priv esc PPTX
-
StartLinux priv esc Article
-
StartLinux priv esc Ex 1 MP4 (12:04)
-
StartLinux priv esc Ex 2 MP4 (20:52)
-
StartQuiz: Privilege escalation [Linux]
-
StartWindows Priv Esc MP4 (66:43)
-
StartWindows_Privilege_Escalation.pdf
-
StartWindows priv esc Article
-
StartAssignment: 00x06 Reading the doctor's hidden files
-
StartAssignment: Linux priv esc
00x07 Vulnerability scanning
Available in
days
days
after you enroll
00x08 Buffer overflows
Available in
days
days
after you enroll
00x09 Burp Suite (Large section)
Available in
days
days
after you enroll
-
StartIntro (0:35)
-
StartDashboard + live and passive scans (16:33)
-
StartBurp Suite Dashboard.pdf
-
Start03 Target tab.mp4 (4:48)
-
StartTarget tab
-
StartProxy tab (10:11)
-
StartBurp suite Proxy .pdf
-
Start05 Intruder.mp4 (9:58)
-
StartIntruder
-
Start06 Repeater.mp4 (5:00)
-
StartRepeater
-
Start07 Sequencer.mp4 (3:46)
-
StartSequencer
-
Start08 Decoder.mp4 (2:57)
-
StartDecoder
-
Start09 comparer.mp4 (1:48)
-
StartComparer
-
Start10 Market place (Plugins) + more.mp4 (2:53)
-
StartBurp Suite Extender
-
StartBurp collaborator
-
StartBurp Authorize
-
StartBurp Match and replace
-
StartBurp Suite Content discovery
-
StartBurp suite Top 5 Professional extensions
-
StartTesting mobile applications with burp suite
-
StartBurp suite How to use burp to look for SQLi
-
StartQuiz : Burpsuite
-
StartExercises
-
StartASSIGNMENT: Get to know burp suite community edition
-
Start00x09 ASSIGNMENT - SOLUTION: Let's engage with burp suite free
00x10-00 Introduction to JWT hacking
Available in
days
days
after you enroll
00x10-01 Open redirects
Available in
days
days
after you enroll
00x10-02 CSRF
Available in
days
days
after you enroll
00x10-03 Broken Acces Control
Available in
days
days
after you enroll
00x10-04 IDOR
Available in
days
days
after you enroll
-
StartIDOR Exp (15:57)
-
StartIDOR - Slides.pdf
-
Startidors_-what-are-they-and-how-do-you-look-for-them (11:45)
-
Startdon-t-test-for-idor-s-manually-autorize-is-so-much-faster (6:25)
-
Start5-ways-to-test-for-idor-demonstrated (9:51)
-
Startdid-you-know-you-can-chain-idors (5:47)
-
StartQuiz: IDOR
-
StartLabs IDOR
00x10-05 Business Logic Laws
Available in
days
days
after you enroll
-
Startbusiness-logic-vulnerabilities (5:16)
-
Startbusiness-logic-flaws_-you-should-probably-look-into-this (15:55)
-
StartBusiness_logic_flaws - full text.pdf
-
StartBusiness logic flaws - Powerpoint
-
StartBusiness_logic_vulnerabilities.pdf
-
Startfull-business-logic-flaws (21:28)
-
StartLabs Logic errors
-
StartQuiz : Business Logic
00x10-6 XXE
Available in
days
days
after you enroll
00x10-07 Template Injection
Available in
days
days
after you enroll
00x10-08 XSS
Available in
days
days
after you enroll
-
Startultimate-xss-guide (27:45)
-
StartXSS - Ultimate beginner guide.pdf
-
StartWAF_evasion_techniques.pdf
-
StartTesting for reflected XSS.pdf
-
StartTesting for stored XSS.pdf
-
StartDOM_XSS_.pdf
-
Startadvanced-xss-techniques (17:28)
-
StartXSS - Advanced techniques.pdf
-
Startwaf-bypass-techniques (21:14)
-
StartLabs: XSS
00x10-09 Insecure deserilisation
Available in
days
days
after you enroll
00x10-10 Captcha bypass
Available in
days
days
after you enroll
00x10-11 SSRF
Available in
days
days
after you enroll
00x10 Command Injection
Available in
days
days
after you enroll
00x10 SQLi
Available in
days
days
after you enroll
-
Start0-intro (2:11)
-
Start1-what-are-sqli (2:59)
-
Start2-detecting-sqli (5:13)
-
Start3-types-of-sqli (10:26)
-
Start4-boolean-based-sqli (6:47)
-
Start5-sqlmap (3:19)
-
Start6-references-amp-exercises (3:50)
-
StartSlides.pdf
-
Start1-portswigger-simple-login-bypass (2:59)
-
Start2-union-based-sqli-to-rce (9:00)
-
Start3-mssql-injection-to-rce (7:47)
-
Start4-waf-bypasses (1:57)
-
Start5-sqli-waf-bypass (17:02)
-
Start6-sqli-xss-and-xxe-all-in-one-payload (20:39)
00x10-11 (Admin) login pages
Available in
days
days
after you enroll
00x11-1 Broad scope web application methodology - General methodology
Available in
days
days
after you enroll
00x11-2 Broad scope web application methodology - Manual Hacking
Available in
days
days
after you enroll
00x11-3 Broad scope web application methodology - Vulnerability scanning
Available in
days
days
after you enroll
00x11-4 Broad scope web application methodology - Practical Methodology
Available in
days
days
after you enroll
-
StartCreating_our_list_of_su20creating20our20list20of20subdomains.pdf
-
StartProcessing_Our_List_Of_S20processing20our20list20of20subdomain.pdf
-
StartSubdomain_flyov20subdomain20flyover.pdf
-
StartExploiting_open_p20exploiting20open20ports.pdf
-
StartVulnerability_scanni20vulnerability20scanning.pdf
-
StartVulnerability_testing_stra20vulnerability20testing20strategy.pdf
00x11-5 Broad scope web application methodology - Extra's
Available in
days
days
after you enroll
-
StartAnalyzing_javascript_files.pdf
-
StartWhat_the_ffuf_.pdf
-
StartNuclei template cheat sheet
-
Startvulnerability scanning
-
StartNuclei scanning
-
StartRunning_your_scripts_on_a_VPS.pdf
-
StartBroad Scope Methodology.png
-
StartDirectory_brute_forcing.pdf
-
Startquickly-identify-a-target-from-a-list-of-thousands-of-dns-records-multi-domain-r (3:18)
-
Startexploit-db-examples (3:15)
-
StartList_of_to20list20of20tools.pdf
-
Startyou-are-probably-doing-directory-brute-forcing-wrong-here-s-why (5:43)
-
StartQuiz: Creating nuclei templates
00x12 API Testing
Available in
days
days
after you enroll
-
StartPostman - Theory (17:06)
-
StartAPI hacking with postman Part 1 - getting the basics down (20:57)
-
StartAPI hacking with postman Part 2 - importing the API description (3:33)
-
StartAPI hacking with postman Part 3 Pre-request scripts, tests and console (11:01)
-
StartAPI hacking with postman Part 4 - Getting dirty with data sources (8:03)
-
StartREST-API_goat_project.pdf
-
Startpostman lab - Tiredful API.pdf
-
StartAPI Broken Access Control Through Replacing HTTP Method (5:14)
-
StartAPI hacking by Chaining postman into burp suite (8:15)
00x12 OWASP API top 10
Available in
days
days
after you enroll
-
StartAPI0 2019 What is an API?
-
StartAPI1 2019 Broken Object Level Authorization
-
StartAPI2 2019 Broken User Authentication
-
StartAPI3 2019 Excessive Data Exposure
-
StartAPI4 2019 Lack of rate limiting
-
StartAPI5 2019 Broken Function Level Authorization
-
StartAPI6 2019 Mass Assignment
-
StartAPI7 2019 Security Misconfiguration
-
StartAPI8 2019 Injection
-
StartAPI9 2019 Improper Assets Management
-
StartAPI top 10 - 0 through 3 (28:57)
-
StartOWASP API TOP 10 - 4 to 7 (31:47)
-
StartAPI8-2019 Injection (9:41)
-
StartAPI9-2019 improper asset management (7:16)
-
StartOWASP API top 10 - 10 insufficient logging and monitoring (1:31)
00x13 Mobile hacking
Available in
days
days
after you enroll
-
StartOWASP M1.2016 improper platform usage (5:24)
-
StartOWASP M2.2016 - insecure data storage (1:28)
-
StartOWASP M3.2016 Insecure communication (2:07)
-
StartOWASP M4.2016 Insecure authentication (3:38)
-
StartOWASP M5 Insufficient cryptography (2:22)
-
StartOWASP M6. Insecure authorization (3:07)
-
StartOWASP M7. bad code quality (5:35)
-
StartOWASP M8. Code tampering (2:36)
-
StartOWASP M9 Reverse engineering (2:33)
-
StartOWASP M10. Extranous functionality (1:56)
00x13 Mobile hacking - Setting up Android Lab
Available in
days
days
after you enroll
00x16 Password attacks
Available in
days
days
after you enroll
Extras
Available in
days
days
after you enroll
French Translation
Available in
days
days
after you enroll
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_1.docx
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_2.docx
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_3.docx
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_4.docx
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_5.docx
-
StartEthical hacking guide A-Z_FR_V1.1_Chap_6.docx
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.
off original price!
The coupon code you entered is expired or invalid, but the course is still available!