• Stars
    star
    2,480
  • Rank 18,539 (Top 0.4 %)
  • Language
  • Created almost 5 years ago
  • Updated 7 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Practical Ethical Hacking Labs 🗡🛡

Ethical Hacking Labs

h

This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the resources of CEH content and different resources across the internet.

⌨️ The tutorials is very practical/hands-on. Don't worry if you are a completely noob, you don't need to be an expert to start learn ethical hacking. Google is always your best friend. This repo will guide you very carefully from basics to more advanced techniques.

✅ Prerequisites:

  • Any computer with at least 8GB RAM (16GB recommended)
  • At least 80GB of free disk space available
  • Hardware-based virtualization support

⚠️ Disclaimer: This is purely for educational purposes only. DO NOT try these techniques with any public network. Because if you are find guilty for causing any harm to any individual, government, corporate body, non-profit etc you will be sued with serious charges of cyber crime. I recommend you to practice the lessons in this course on your owned system and your own data in a private or local network.


⚙️ Core Knowledge

First things first, you really need to understand how things work before start to disassembly and look for vulnerable components. The more you understand how things works, a better hacker you'll be. The 'Core Knowledge' (module 0) is just a jumpstart to these topics.

Core Knowledge provides a jumpstart to networking, linux systems, virtualization, lab building, scripting and also information security topics. If you are familiar on these topics you can skip it straight to Ethical Hacking module.

⚔️ Ethical Hacking

  1. Footprinting and Reconnaissance
  2. Scanning Networks
  3. Enumeration
  4. Vulnerability Analysis
  5. System Hacking
  6. Malware
  7. Sniffing
  8. Social Engineering
  9. Denial-of-Service
  10. Session Hijacking
  11. Bonus - 🔬 The Forensic Approach

💭 To Do:

  • Add Foundational level modules (networking, virtualization, crypto, linux kernel and scripting).
  • Bonus modules to add:
    • Introduction to Infosec terms and methodologies (from CEH Study Guide)
    • More Reconnaissance techniques.
    • Active Directory: Lab build and attack vectors.
    • Web application: Enumeration and exploitation using some OWASP Top 10 vulnerabilities and Bug Bounty techniques.
    • Wireless hacking (WPA)