Ethical Hacking - System Hacking
3.1 (21 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,645 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking - System Hacking to your Wishlist.

Add to Wishlist

Ethical Hacking - System Hacking

The complete solution for system hacking
3.1 (21 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,645 students enrolled
Created by IJAS AHAMMED
Last updated 7/2016
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • student will have a complete information about password cracking,stegnagraphy and other topics related to ethical hacking.
  • Master all the basics of system hacking
View Curriculum
Requirements
  • The software required to perform this course is given as links in the description of each video tutorial.
  • The students should need some basic knowledge about computers.
Description

This course will not waste your time, Are you tired of watching tutorials that take hours to explain simple concepts? You came to right place. All this course asks you is 2-3 hours of your life.

This class will immerse the student into an interactive environment where they will be shown how to  hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. 

password hacking is one of  the easiest and most common ways hackers obtain computer access.Although strong passwords have some difficulty to crack are easy to create and maintain,people often neglect this.therefore passwords are one of the weakest link in information sequriety chain.password rely on secrecy.After password is compromised everyone can access system with it.Hackers have many ways to obtain passwords they use remote cracking utilities or network analysers.This tutorial demonstrates how easily hackers gather password information from your network and describes password vulnerabilities that exist in computer networks an countermeasures to prevent these.

OBJECTIVES

  • extracting administrative passwords
  • hiding files and extracting hidden files
  • monitering system remotely

S u m m a r y

 Attackers use a variety of means to penetrate systems.
Password guessing and cracking is one of the first steps.
Password sniffing is a preferred eavesdropping tactic.

 Vulnerability scanning aids the attacker in identifying which password cracking
technique to use.
 Keystroke logging and other spyware tools are used to gain entry to systems to keep up
attacks.
0 Invariably, attackers destroy evidence of "having been there and done the damage."
Stealing files as well as hiding files are the means to sneak out sensitive information.



NOTE: This course will be updated and will finally become advanced course.

  • After system hacking it will cover scanning networks,footprinting and many more.... topics . 
Who is the target audience?
  • students who have keen intest in hacking.
  • students who have intreast about ethical hacking but domt know where to start.
  • students who have intrest in password cracking.
  • people and office administrators who need to hide lots of important datas.
  • students who are studying about computers and related subjects.
  • This course is probably not for you if you're an expert programmer looking to learn advanced Java concepts
Compare to Other Ethical Hacking Courses
Curriculum For This Course
+
EXTRACTING ADMINISTRATOR PASSWORDS USING LCP
2 Lectures 06:10

Lcp program audits user account passwords and recovers them in windows.General features of this protocols are password recovery,brute force session distribution,account information importing,and hashing.It can be used to test password security,or recover lost passwords.The program can import from local computer,by loading a SAM,LC,LCSpwdump or sniff file.LCP supports dictionary attack,brute force attacks.


LAB ANALYSIS

  1. Document Everything
  2. Use this for training purpose
Preview 02:22

You can download latest version of LCP from the link:http://www.lcpsoft.com/en/index.html

Preview 03:48
+
hiding files using NTFS streams
2 Lectures 07:49

NTFS supersedes the FAT file system as the preferred file system for Microsoft Windows operating systems.Ntfs has several improvements over fat and HPFS(high performance file system),such as improved for metadata and advanced data structures.

Preview 01:50

+
find hidden files using ads spy
2 Lectures 01:44
find hidden files using ads spy theory
00:52

You can download latest version of ADS spy from the link:http://www.merijn.nu/programs.php#adsspy

find hidden files using ads spy lab
00:52
+
Stealth file tool
2 Lectures 05:14

Stealth files use a process called stegnography to hide any files inside of another file.it is an alternate to encryption of files because no one can decrypt the encrypted information or data from the files unless they know that hidden files exist.

Stealth file tool theory
01:19

You can download latest version of stealth file tool from the link:http://www.froebis.com/english/sf40.shtml

Stealth file tool
03:55
+
EXTRACTING SAM HASHES USING PWDUMP7 TOOL
1 Lecture 05:03

Pwdump7 can be used to dump protected files.you can always copy a used file just by executing :pwdump7.exe

EXTRACTING SAM HASHES USING PWDUMP7 TOOL(THEORY+LAB)
05:03
+
l0pht crack
1 Lecture 02:28

You can download latest version of l0pht crack from the link:www.l0phtcrack.com

l0pht crack
02:28
+
Hiding data using snow stegnagraphy
2 Lectures 07:53

The program SNOW is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected.

Hiding data using snow stegnagraphy theory
01:40

You can download latest version of snow tool from the link:www.darkside.com.au/snow/

Hiding data using snow stegnagraphy lab
06:13
+
User system monitoring and surveillance using spytech spy agent
1 Lecture 09:13

Spytech SpyAgent is award winning, powerful computer spy software that allows you to monitor EVERYTHING users do on your computer - in total stealth. SpyAgent provides a large array of essential computer monitoring features, as well as website, application, and chat client blocking, logging scheduling, and remote delivery of logs via email or FTP. SpyAgent will put your mind at ease with its innovative and unmatched, yet easy to use feature-set that provides the ultimate all-in-one computer monitoring software package.

You can download latest version of spytool tool from the link:

www.spytech-web.com/spyagent.shtml

User system monitoring and surveillance using spytech spy agent
09:13
+
IMAGE STENAGRAPHY USING QUICK STEGO
1 Lecture 03:37

QuickStego lets you hide text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages. Once text is hidden in an image the saved picture is still a 'picture', it will load just like any other image and appear as it did before. The image can be saved, emailed, uploaded to the web (see the picture of the lady with a laptop above - this image has hidden text) as before, the only difference will be that it contains hidden text.

You can download latest version of Quick stego tool from the link:www.quickcrypto.com/free-steganography-software.html

IMAGE STENAGRAPHY USING QUICK STEGO
03:37
About the Instructor
IJAS AHAMMED
3.2 Average rating
24 Reviews
3,835 Students
2 Courses
Trainer

I am a story teller and a proud instructor. I am currently doing my engineering course.I am good at coding and have an experience in the field of ethical hacking for one year.

I believe in using online education / online courses to reach out to more students. Online Courses also allows students to learn at their own pace and in the comfort of their homes. I am passionate about teaching students how to code complex programs.