Etičko hakovanje

vodic ka etičkom hakovanju, razbijanu šifri, upadanja u sisteme, monitoring naše mreže
4.2 (3 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
59 students enrolled
Free
Start Learning Now
  • Lectures 29
  • Length 9.5 hours
  • Skill Level Beginner Level
  • Languages Serbian
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2016 Serbian

Course Description

Na ovom kursu radićemo osnove samog linux OS, tj komande i navođenje kroz isti. Bilo bi dobro poznavanje operativnih sistema generalno, kao i računarskih mreža, ali nije neophodno. Važniji deo kursa će biti o samom pentestingu i etičkom hakovanju. Dobite odgovor na svako vaše do sada ne odgovoreno pitanje o hakovanju. Spomenućemo između ostalog hakovanje wifi, osnove o Tor, Proxychains, Nmap, Sql injections,ssl strip, dos napadi. Redovno će biti i novih video klipova. Za sva pitanja, stojim na raspolaganju.

What are the requirements?

  • Poznavanje osnova računarskih mreža je prednost, ali nije obaveza
  • Poznavanje osnova Linux OS-a je prednost, ali nije obaveza
  • Mrežna kartica
  • Kali Linux 2.0 (ili bilo koja druga verzija, ali ja radim na 2.0)
  • Wireless kartica
  • Fedora Linux 23 (ili bilo koja druga verzija, ali ja radim na 23)

What am I going to get from this course?

  • Nauče osnove Linux OS-a
  • Nauče osnove računarskih mreža i sigurnosti kroz razne primere
  • Kako da razmišljaju kao pravi white hacker
  • Testiraju razne sisteme
  • Uočavanje slabosti sistema
  • Razbijanje raznih šifri

What is the target audience?

  • Svi ljubitelji računarskih mreža koji žele da prošire svoje znanje bi trebalo da pogledaju kurs
  • Svi koji vole nove stvari, da istražuju o sigurnosti sistema
  • Početnici koji nemaju osnove OS-a ili računarskih mreža su takođe dobrodošli, što da ne
  • Najbolje namenjen za osobe koji imaju već znanja o računarskim mrežama, ali nije obavezno

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Uvod
Uvod u kurs
05:33
Preduslovi za kurs
09:38
Section 2: Kako zaraditi novac legalno uz etičko hakovanje?
Kako zaraditi?
05:46
Section 3: Termini pre nego što počnemo
Osnovni termini ( kao što su hat, grey hat, i black hat hacking, vpn, ddos,...)
14:14
Section 4: Izgradnja našeg okruženja
Instalacija i podešavanje radnog okruženja
41:08
Section 5: Osnovne funkcionalnosti Linux terminala i CLI
Uvod u Linux terminal
17:18
Section 6: Anonimnost na webu
Tor i primena u anonimnosti na webu
23:52
ProxyChains i anonimnost
18:26
Kako postati anoniman korišteći VPN (Virtual Private Network)
22:51
MAC adresa i anonimnost menjajući istu
18:43
Section 7: Prikupljanje podataka pre napada
Footprining i nmap
18:27
Section 8: Wireless napadi i kloniranje AP
Hakovanje WiFi šifre
13:26
Kloniranje wireless access pointa (AP)
19:02
Section 9: Napad na web sajtove koristeći SQL Injections
SQL Injection
01:02:31
Section 10: Reverse shells. Kontrola bilo kod uređaja
Reverse shells. Daljinska kontrola uredjaja. Hakovanje racunara
21:39
Reverse shells. Daljinska kontrola uredjaja. Hakovanje tableta⁄telefona
44:57
Reverse shells. Upotreba Ncat za uspostavljanje BILO koje konekcije
17:03
Kreiranje lažnog update radi hakovanja klijenta
22:32
Section 11: Hakovanje šifri
Pogađanje lozinki i Brutus program
11:41
MITM (man in the middle) napad
59:24
Hydra i xHydra
16:13
Section 12: Brute-force metoda
Brute-force metoda za probijanje username i passworda
16:00
Brute-force web resursa uz dirb i dirbuster
07:18
Section 13: Analiza naše mreže, hakovanje raznih web resursa
Detekcija sumnjivih aktivnosti na nasoj mrezi
16:30
Spiderovanje i analiza websajta koristeći burp
11:02
Brute-force web resursa uz dirb i dirbuster
07:18
Cross-Site Request Forgery (CSRF)
08:30
Reflected Cross-Site Scripting (XSS)
15:52
Rainbow table tehnika probijanja lozinki (Windows)
12:02

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Tomislav Fedek, Ability to overcome complex challenges

My name is Tomislav, and i have bachelor of electrical and computer engineering-bsc applied.

My final work was from computer network field. I am very interested in that field, and I was enroll in some courses for ethical hacking, and networks in generals. Working alone since i degree (2014). I was working in retail company for 1 year as IT support.

I can troubleshoot wide range of network related problems. I have good knowledge of OS (linux and windows), working with them for few years. I am having also advanced knowledge of linux terminal command line. I am also advanced in Windows OS, including the newest, windows 10. I am also having good knowledge of installation, upgrades of network, and computer (in general) equipment.

I am using a wireshark to monitor trafic, and also some other things for that. I also have a good communication skills.

My goal is to learn students to that what I know, and Udemy is seems the best for that.


Ready to start learning?
Start Learning Now