HACK2ED – BEGINNERS HACKING COURSE

HACK2ED IS WOLD’S MOST AFFORDABLE HACKING COURSE IN HINDI CREATED BY VANSH GURDASWANI AND YASH DHARMANI, IN THE COURSE YOU GET 20 FOLDERS 80+ VIDEOS, THE COURSE WAS DESIGN FOR BEGINNERS SO YOU DD’DNT NEED PROGRAMMING LANGUAGES YOU JUS ONLY NEED BASIC COMPUTER KNOWLEDGE  TO LEARN THIS COURSE

 

 

This is an educational purpose Course only. I didn’t harm anyone I (Vansh Gurdaswani) used my own device during explaining this Course so please don’t use this method for any kind of illegal or malicious activities because hacking is a crime if you do this then it’s can land you in jail. I do not support any kind of illegal or malicious hacking.

Introduction

1
1.introduction of hack2ed ethical hacking course
3:05

hello friends yeh video ek introduction hai ethical hacking course ka.  kaisa hai yeh course? kya expect kar sakta hai issh course sah aur kaisa aap muje sah contact kar sakta hai? yeh sare question ka answer diya mein nha issh course mein umeed hai ki video appko pasand aya ghi

2
2. overview of Hack2ed course

Setup Hacking Environment

1
1. Download and install metasploitable os in vmware
2
1. installing windows 10 in vmware
3
2. How to Download

Linux Basics

1
1. Introduction to terminal
2
2. Linux basic part 1
3
3. Linux basic part 2

Anonimity

1
Setup & use of basic vpn in windows
2
what is tor?
3
how to setup tor in kali linux
4
How to visit deep web or dark web

Footprinting

1
What is footprinting , whois , the harvester , nmap , social media doxing explain
2
Whois Lookup
3
the harvester
4
Nmap Network imformation Gathering
5
Social Media Doxing

Email & Call & Sms Bombing

1
How to do call bombing
2
how to do sms bombing
3
Email bombing part 1
4
Email bombing part 2

DOS & DDOS

1
What is dos & ddos attack
2
Practical of ddos attack in kali linux using slowloris
3
dos attack on any network router

Cryptography

1
What is Cryptography
2
MD5 hashes Practical | how to convert any text in hashes or convert hashes into normal text
3
how to encrypt & decrypt any text
4
How to bind any message in image

Brute force

1
what is brute force attack
2
How to create custom wordlist for brute force attack using crunch
3
Hack social media sites accounts using brute force

Phishing

1
What is Phishing
2
Normal phishing Practical demonstration
3
{ Dns Swifter } How to find best domain for phishing site
4
A great phishing tool Social Fish
5
Phishing without making a website

HoneyPot

1
What is honeypot?
2
practical of basic honeypot

Wifi Hacking

1
A small message
2
Theory Behind Cracking WEP Encryption
3
Basic Case
4
Associating With Target Network Using Fake Authentication Attack
5
Packet Injection – ARP Request Reply Attack
6
Packet Injection – Korek Chopchop Attack
7
Packet Injection – Fragmentation Attack

Mitm (man in the middle attack)

1
Introuduction | a small message
2
ARP Poisoning Theory
3
Bettercap Basics
4
ARP Poisoning Using Bettercap
5
Spying on Network Devices (Capturing Passwords, Visited Websites…etc)

Website hacking

1
How website works?
2
Download & install dvwa web application in local host
3
WHAT IS SQL INJECTION?
4
SQL INJECTION PRACTICAL
5
what is cross site scripting
6
Practical of stored xss vulnerability​
7
what is file upload vulnerability?
8
How to hack webservers using file upload vulnerability?

Website Vulnerability Scanner

1
How to find admin pannel of any website
2
how to scan website for vulnurabilities from nikto

Windows Hacking

1
Welcome to Windows hacking section | How to make basic windows payload
2
How to download & install viel evasion
3
How to make a undetectable payload
4
What is beef framework | how to use beef | how to give fake update with beef
5
talking about my script
6
script part 2 convert script format bat to exe , change logo of script , run silently
7
Talking about my Social Engineering trick
8
Excute social engineeringto hack windows pc

A Useful Script

1
Some useful scripts

Android Hacking

1
[YouTube Video] How to bind payload in apk Backdoor by using script
2
Part 2 Apk Binding With Social Enginnering [YOUTUBE VIDEO]
3
How to download and setup apktool in windows ( Do not skip this video)
4
How to bind payload in any apk manually fix “unable to rebuilt apk “
5
How to bind payload n picsart fix unable to rebuilt apk part 2
6
part 3 apk binding ( finding launchable activity)
7
How To Create Fud Android Payload (concept) (HACK2ED VIDEO)
8
Exploit android (Dump Contacts, Call Logs, Masssages, Sdcard Data, And Many More )
9
Some Social Engineering Tricks To Hack Android [HACK2ED COURSE VIDEO]

Hack Outside Network

1
INTRODUCTION TO HACK OUTSIDE NETWORK
2
Theory of Hack Outside Network | how it’s work?
3
Hack Outside With Your Own Wifi router
4
Port Forwarding Using Portmap.io (android)​
5
Port Forwarding Using Portmap.io (Pc)
6
HACK OUTSIDE NETWORK WITH ONE LINK SERVEO.NET (BEEF-OUTSIDE NETWORK)
7
Hack Outside Network Attack Without Router ( V.P.S Port Forwarding part 1)
8
Hack Outside Network Attack Without Router (V.P.S Port Forwarding part 2) with a bonus tip

Bonus

1
The Final Video
No, You Cannot Download The Course

SOME VIDEOS OF ANDROID HACKING SECTION IS NOT WORKING WE WILL FIX IT SOON

Bonus Section Of the Course Is Out Now.

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 276 students
Duration: 14 Hours
Lectures: 87
Level: Beginner