Ethical Hacking


Description

Learn how hackers attack computers and networks, and how to protect Windows and Linux systems.
Suitable for those who understand the basics of the Internet and computer systems, but are new to security.

Projects

H 0: Binary Games    20
H 1: Kali VM    15
   H 1C: Google Cloud Machines    15
H 2: Windows VM    20
   H 2C: Metasploit & Nmap on Debian)    10
H 3: Armitage    15
   H 3C: Metasploit v. EasyFTP    10
H 4.1: Creating Infectious Media with Metasploit       15
H 5: Nmap    40
   H 5: Nmap (Cloud version)    40
H 6: Wireshark    30
H 7: Essential Linux    30
H 8: Buffer Overflow    30
H 9: Scapy    15
H 10: Reset Windows Password    15
H 11: Quantum Computing    15
H 12: Windows Password Hashes    15
H 13: Canary Tokens    5
H 14: DoH    15
H 15: Nessus    25
H 16: SQL Injection with Havi    25
We Chall    

Resources

Download VMware Player 14
Download VMware-player-12.5.1-4542065.exe

Posted for WCIL 5-20-19
"H" prefix added 7-9-19
H 13 and H 14 added, H 11 updated 7-11-19
H 15 and H16 added 7-12-19