Learn Ethical Hacking & Reverse Engineering

Learn Ethical Hacking & Reverse Engineering

Learn Ethical Hacking & Reverse Engineering

Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe’s

Language: english

Note: 4.4/5 (472 notes) 46,594 students

Instructor(s): Paul Chin

Last update: 2021-11-28

What you’ll learn

  • Web Hacking
  • Website defacement
  • Tampering Cookies
  • Hacking Admin Passwords
  • Hack Bank Accounts to Transfer Money
  • Stealing email mailing lists
  • Reversing Encryption
  • Tampering voting pages
  • Hacking website database
  • Tampering browser javascript to gain access
  • How to crack software serial number keys
  • Remove Nag Screen Reminders asking you to register
  • Convert Trial Software to Fully Functional Software
  • Extend 30-day Trial Period Software
  • Learn Reverse Engineering and Assembly Language
  • Browser Spoofing
  • SQL Injection Attacks
  • Port scanning
  • Log Injection Attacks
  • Computer Forensics
  • Hacking Captchas

 

Requirements

  • Basic knowledge of HTML, Javascript and SQL
  • Basic understanding of GET and POST requests
  • A PC, Linux not required
  • Basic knowledge in C, Assembly Language and Win32 API would be helpful but not mandatory

 

Learn Ethical Hacking & Reverse Engineering

Excel Skills for Business [Coursera]

Description

If you want to learn ethical hacking  & also reverse engineering the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack  and also to reverse software. These websites typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn hacking and reversing.  All you need is a PC. In this course I am only using a Windows PC to do ethical hacking and reverse engineering.

The website we will be hacking is DefendTheWeb which is a popular hacker’s playground where hackers play hacking games reminiscent of CTF (Capture the Flag) and learn at the same time. However, without some help and guidance you will find it quite challenging. Hence this course. I will walk through each level from Basic to Realistic. 

For the Reverse Engineering lessons, you will  learn how to reverse CrackMe’s.   A CrackMe is a small program designed to test a programmer’s reverse engineering skills.

These CrackMe’s typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn reverse engineering (reversing).  Traditionally, reverse engineering is taught by first learning C/C++, assembly language and then debugging. Note that we do not crack software nor condone the act of cracking software.

The crackme’s we will be reversing is provided by CrackingLessons and Crackmes One which are a popular reverser’s playground . Information on solving crackmes on the Internet is terse and unstructured. Hence this course. I will walk through each level just like in a classroom where you can follow along and ask questions in the Q & A section. All you need is a PC running Windows.

Great way to learn Web Development, Information Technology (IT), Assembly programming and Reverse Engineering:

If you had always wanted to learn HTML, Javascript, PHP, MySQL, etc, Assembly and Reverse Engineering, what better way than to learn how to hack websites ethically and reverse engineering. .  This course is also a great stepping stone to other Reverse Engineering fields like malware analysis, exploits development and software testing.   So let’s get started in your journey of hacking & cracking to learn.

This course is backed by a 30-day money back guarantee.  So, go ahead and enroll in this course now and start hacking the fun and easy way!

 

Learn Ethical Hacking & Reverse EngineeringLearn Ethical Hacking & Reverse Engineering

Who this course is for

  • Web developers who have no knowledge on hacking
  • Students who want to learn hacking the fun way by hacking real websites (legally)
  • Those who enjoy computer games and want to try hacking as a game
  • Programmers who want to level up their skill to reverse engineering software
  • IT or computing students who want to know how software works internally

 

Course content

  • [new] Introduction
    • Introduction
    • Registering for an account with defendtheweb.net
    • How to use this Guide
  • [new] Intro Levels
    • Intro 1 (Client code information leak)
    • [NEW] Intro 2 (HTML tag information leak)
    • Intro 3 (Javascript code information leak)
    • Intro 4 (Path traversal vulnerability)
    • Intro 5 (Javascript prompt() function information leak)
    • [NEW] Intro 6 (Client code modification vulnerability)
    • [NEW] Intro 7 (robots.txt data leak vulnerability)
    • Intro 8 (Path traversal vulnerability)
    • Intro 9 (Client code modification vulnerability)
    • Intro 10 (Javascript code exposure and decryption)
    • Intro 11 (File redirection vulnerability)
    • Intro 12 (MD5 decryption)
  • [new] 24-bit (File extension manipulation exploit)
    • 24-bit (File extension manipulation exploit)
  • [new] Word of Peacecraft/Realistic (Dumpster diving for emails)
    • World of Peacecraft/Realistic (Dumpster diving for emails)
  • [new] Secure Agent (Browser Spoofing)
    • Secure Agent (Browser Spoofing)
  • [new] Crypt1/Crypt (Reverse encryption)
    • Crypt1/Crypt (Reverse encryption)
  • [new] Beach (Steganography analyis)
    • Beach (Steganography analyis)
  • [new] Squashed image/Stego (Cracking steganography)
    • Squashed image/Stego (Cracking steganography)
  • [new] HTTP Method/Intro (HTTP POST exploit & Bypass CSRF-token protection)
    • HTTP Method/Intro (HTTP POST exploit & Bypassing CSRF-token protection)
  • [new] Library Gateway/Realistic (Javascript code exposure vulnerability)
    • Library Gateway/Realistic (Javascript code exposure vulnerability)
  • [new] Sid/Intro (Cookie tampering to bypass login)
    • Sid/Intro (Cookie tampering to bypass login)
  • [new] Crypt2/Crypt (Cracking Caeser Cipher encryption)
    • Crypt2/Crypt (Cracking Caeser Cipher encryption)
  • [new] Crypt3/Crypt (Decoding Morse Code)
    • [NEW] Crypt3/Crypt (Decoding Morse Code)
  • [new] SQLi1/SQLi (Bypassing login page password using SQL Injection Attack)
    • SQLi1/SQLi (Bypassing login page password using SQL Injection Attack)
  • [new] Recon (Information gathering skills, including B6-Key)
    • Recon (Information gathering skills, including B6-Keys)
  • [new] Crypt4/Crypt (Decrypting ciphertext using online decryptors)
    • Crypt4/Crypt (Decrypting ciphertext using online decryptors)
  • [new] Map It (Portscanning and gaining remote access)
    • Map It (Portscanning and gaining remote access)
  • [new] Crypt5/Crypt (Reverse & Decrypt ciphertext using online decryptor)
    • Crypt5/Crypt (Reversing & Decrypting ciphertext using online decryptors)
  • [new] SQLi (Hacking admin username & password using SQL Injection Attack)
    • [NEW] SQLi2/SQLi (Hacking admin username & password using SQL Injection Attack)
  • [new] Princess Slag/Realistic (Directory traversal & null byte attacks)
    • [NEW] Princess Slag/Realistic (Directory traversal attack & null byte attacks)
  • [new] Xmas ’08/Realistic (Website defacement attacks)
    • Xmas ’08/Realistic (Website defacement attacks)
  • [new] Planet Bid/Realistic (Password reminder exploits)
    • Planet Bid/Realistic (Password reminder exploits)
  • [new] Access Logs (Log Injection Attack)
    • Access Logs (Log Injection Attack)
  • [new] Sandra Murphy (XML Injection Attack)
    • Sandra Murphy (XML Injection Attack)
  • [new] Alphabetize/Coding (Using Javascript to defeat countdown timer)
    • Alphabetize/Coding (Using Javascript coding to defeat countdown timer)
  • [new] Aliens/Stego (Decoding wav files to extract passwords)
    • Aliens/Stego (Decoding wav files to extract passwords)
  • [new] Custom Encoding/Coding (Decryption & hacking website countdown timer)
    • Custom Encoding/Coding (Decryption & hacking website countdown timer)
  • [new] Missile codes/Forensics (Analyze & extract data from disk images)
    • Missile codes/Forensics (Analyzing and extracting data from disk images)
  • [new] Captcha1/CAPTCHA (Hacking Captcha using OCR and AutoIt)
    • Introduction to Captcha1 challenge
    • Downloading and Installing an OCR software
    • Using Abby (OCR tool) to convert image to text
    • Download and install AutoIt (Automation tool)
    • Using AutoIt
  • [new] Captcha2/CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
    • Intro to Captcha2 challenge
    • Collecting key images
    • Splitting the captcha image into 15 sample files
    • Installing node.js
    • Intro to Node.js
    • Using node.js to decode captcha image
    • Using AutoIt to defeat countdown timer
  • [new] Captcha3/CAPTCHA (Using Python to hack Captcha )
    • Introduction to the Captcha3 challenge
    • Installing and Using Python
    • Installing Pillow library for Python Image Manipulation
    • Collecting key images
    • Splitting the captcha3 sample using python
    • Creating nodejs script to decode captcha sample images
    • Using AutoIt to automate tasks and defeat timer limitation
  • Introduction to Software Cracking with crackme’s
    • Introduction to crackme’s
  • Introduction to x64dbg and Detect it Easy (DIE)
    • Downloading and installing x64dbg and Detect It Easy (DIE)
  • Setting up your cracking workspace and workflow
    • Setting up your cracking workspace and workflow
  • Debugger Stepping Basics
    • Debugger Stepping Basics
  • Stepping Into Calls
    • Stepping Into Calls
  • Breakpoints
    • Breakpoints
    • Setting Breakpoints on Strings
  • Reversing Jumps
    • Reversing Jumps
  • How to patch a program
    • How to patch a program
    • Patching with Jumps
  • Summary of Cracking Software Workflow
    • The 5 steps of cracking software
  • Introduction to cracking gui-based programs
    • Introduction to cracking gui-based programs
  • Analyzing the PE for a gui-based program
    • Analyzing the PE for a gui-based program
  • Crack the Serial Key using BP on strings
    • Setting up x64dbg
    • Crack the Serial Key using BP on strings
  • Windows api functions & the stack
    • Window api functions
    • Pushing parameters to the stack
  • Patching to bypass wrong serial key message
    • Patching to bypass wrong serial key message
    • Bypassing using xor assembly
  • Bonus Lecture
    • Bonus Lecture

 


Time remaining or 956 enrolls left

 

Don’t miss any coupons by joining our Telegram group 

Udemy Coupon Code 100% off | Udemy Free Course | Udemy offer | Course with certificate