Practical Hacking MasterClass | Infosec4TC

Practical Hacking MasterClass | Infosec4TC
English | Size: 3.83 GB
Category: Tutorial

With This Course, You will Get Following Complementary Additional Resources

A Student Support Portal by PHMC SECURITIES
A Student Live Chat (7 PM to 11 PM IST, Time is Favorable For all Countries) Mon – Fri
Free Access to Web Hacking P-LAB for One Month on Verification of Identity
A VPN Server for Static IP to Access P-LAB
Attendance Certificate worth 10 CPE Point

( Make sure to email at [email protected] from your registered Email for claiming your Additional Resources)
This course Currently Includes The All 7 Modules in our Series but We are Adding More Additional Lectures each Month

Module 1 : Extreme Basics :-

Understanding the Process of Hacking
Choosing an Operating System
Preparing a Portable Hacking USB Drive
Working with Visualization and Installing Kali Linux
Working with Cloud and Pen-Testing Tools
Orientation to Kali Linux
Understanding File Operations, Navigation and Permissions & Ownership in Terminal
Module 2 : Hack the Web :-

Setting DVWA Lab for Legal Safety
Understanding and Exploiting Vulnerabilities :-
XSS Reflected, Stored and DOM
Command Injection
File Upload and Inclusion
SQL Injection
Weak Session IDs
Brute Forcing
Creating Payload to Attack Web Applications
Scanning for Vulnerabilities through Automated Tools like VEGA
Module 3 : Anonymity and Deception :-

Working with Proxy, VPN and TOR
Advanced TOR to VPN and VPN to TOR Circuits
Mac Address and DNS LEAKS
Fake Online Identity and Email
Spoofed Call and SMS from Any Number
and a lot much More
Module 4 : Human is the Weakest Link :-

Open Source Intelligence Data Gathering on Human
Main Techniques Used
Ethical Hacking through Hardware like Arduino and Digispark
Extreme Level Phishing though GoPhish on a Virtual Private Server
Module 5 : The Art of Reconnaissance :-

Working with Google Hacking
Getting Deep with Nmap
Detecting OS, Finding Ports, Checking for Vulnerabilities
and some more things to be added soon
Module 6 : Attack like a Pro :-

Setting up Metasploit
Learning MSFConsole, MSFVenom
Multi Handler and Meterpreter
Introduction to Venom for Antivirus Evasion
Making Fully Undetectable Payloads
Module 7 : Reporting:-

Learn What to Mention
Learn What not to Mention
Steps to Recreate and PoC
Example of a Good Report

Buy Long-term Premium Accounts To Support Me & Max Speed


If any links die or problem unrar, send request to
About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.