🔰Red Rose Blood Hacking Course By Neeraj Chandra 🔰 Red Rose Blood Hacking Course Beginner To Intermediate By Neeraj Chandra Course...
🔰Red Rose Blood Hacking Course By Neeraj Chandra 🔰
Topics:-
Chapter 1 (Introduction):-
1.1 Introduction.
1.2 What is Hacking.
1.3 Types of Hackers.
Chapter 2 (Lab-Setup):-
2.1 Virtualization.
2.2 Adding Windows on Lab.
2.3 Adding Kali Linux on Lab.
2.4 Adding Parrot os on Lab.
2.5 Adding Metasploitable2 on Lab.
2.6 Setup Sandbox in Windows.
Chapter 3 (Basic Html)
3.1 Short Note.
3.2 Basic Html.
3.3 Header Tag.
3.4 Paragraph Tag.
3.5 Text Formatting.
3.6 Insert Image.
3.7 Make a List.
3.8 Form Creating.
3.9 Creating Tables.
3.10 Links.
3.11 Iframe.
3.12 Html Last Class.
Chapter 4 (for end):-
Chapter 5 (Network Basic):-
5.1 How Internet Works.
5.2 What is network.
5.3 What is ip address or Tcp Udp.
5.4 What Is Mac Address.
5.5 what is cookie.
5.6 What is DNS.
5.7 Three way handshake.
Chapter 6 (Windows And Linux Basic Commands):-
6.1 Windows basic commands.
6.2 inux Basic commands.
Chapter 7 (footprinting and reconnaissance):-
7.1 FootPrinting In Short.
7.2 Geting Info With Cmd.
7.3 Footprinting With Website.
7.4 web time machine.
Chapter 8 (Scanning):-
8.1 What is scanning.
8.2 Scan a network for ip adress.
8.3 How to use nmap for scanning.
8.4 Scanning a Network for active Host.
8.5 What is Banner Grabbing.
8.6 Best Web scanner with many tools.
Chapter 9 (SystemHack & Security):-
9.1 How To Crack windows Password.
9.2 How To By pass windows Password.
9.3 How to Make Your windows password uncrackable.
9.4 How to Hide Drives In windows.
Chapter 10 (Proxy):-
10.1 What is Proxy.
10.2 How To find Proxy and configure with fire fox.
10.3 How To Grab Working Proxy.
10.4 What is socks.
10.5 How to find and use Socks.
10.6 Difference between Vpn or Proxy.
10.7 How to setup proxychains.
Chapter 11(Malware Threats):-
11.1 What is Malware.
11.2 What is Remote Access Trojan.
11.3 What is port Forwarding How to forward a port.
11.4 How to use a rat For hack a system.
11.5 Port Forwarding Method 2 .
11.6 How to use a rat for out of the network.
Chapter 12 (Steganography):-
12.1 What is Steganography.
12.2 How to To hide image or text file.
12.3 How to Hide Or Unhide Folders In windows.
12.4 How to Hide A message Into A song.
Chapter 13 (Spoofing):-
13.1 What is Spoofing.
13.2 How to Spoof A email.
13.3 How to Spoof Caller ID.
13.4 How To Spoof Mac Address.
Chapter 14(Sniffing):-
14.1 What is Sniffing.
14.2 How to Perform Mac flooding attack.
14.3 What is MMT And How to Perform MMT.
Chapter 15 (Denial of Service):-
15.1 What is Dos or DDos Attack.
15.2 How to Perform Dos Attack.
Chapter 16 (Web Hacking):-
16.1 What is Web Hacking.
16.2 How to setup dvwa.
16.3 How To perform Xss.
16.4 How to install Hackbar.
16.5 How to do Sql.
16.7 How to setup Burpsuite.
16.8 Burpsuit Basic Guide.
17.1 What is Cryptography.
17.2.How to Encode or Decode Your message.
17.3.How To verify a file with cryptography.
Chapter 18 (Social engineering):-
18.1.What is social engineering.
18.2.Fb Phishing.
Chapter 19 (How to track someone):-
19.1.How to Track someone location by kali linux.
19.2.How to track anyone location with android.
Chapter 20(Hacking with termux):-
20.1.How to install termux in Android.
20.2.How To install lazymux.
Chapter 21(Metasploit):-
21.1. What is metasploit.
21.2.Metasploit Basic Commands.
21.3.How to use connect command.
21.4.How to MSF venom Use.
21.5.How to hack a windows Device with Metasploit payload.
21.6.Make Metasploit So simple.
Chapter 22 (Bonus Videos):-
22.1.How to Dump Data From a image.
22.2.How to grab some one ip.
22.3.How to Get trojan Owner Ip from Trojan.
22.4.How to clean Your kali Linux Logs.
Chapter 23 (Dark web):-
23.1 Difference between dark web and deep web.
23.2 How To Get Darkweb Links.
23.3 How To access dark web without tor.
23.4 dark web & deepnet search engines.
23.5 how to make your own tor website.
Chapter 24 (Last Chapter):-
23.1 Thanks.
Download := https://drive.google.com/file/d/1auTzM30jpWiFJ7XL4TecJPqGfuJflnxx/view?usp=sharing
No comments