Users Online

· Guests Online: 43

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Hacking 101 - Creating a Hacking Lab (CISA, CEH, CISSP)

Hacking 101 - Creating a Hacking Lab (CISA, CEH, CISSP)

 

 

Set up a Safe and Controlled Environment For You to Practice Ethical Hacking - Kali Linux, DVWA, WebGoat


What Will I Learn?
The students will be able to utilize "virtualization" to install all the hacking tools in Kali Linux, and then set up two different vulnerable applications on which they can try to use the Kali Linux tools.

Requirements
This is made for beginners that are looking to set up a controlled hacking environment at home
No previous knowledge is necessary - just the want to learn ethical hacking
Tools: A PC with at least 40 gigs of hard drive space and a decent power on your computer processor

Description
This course is designed to help you create a safe and controlled environment on your local machine to practice ethical hacking methods. The course will cover the following: 

- Discussion on "virtualization" and demo of a virtualized environment installation process

- Discussion on Kali Linux (your hacking tools) and a demo of the installation process. We will also be talking, post installation, about the types of tools you can find on this application and how you will utilize some of them. 

- Discussion on Damn Vulnerable Web Application (DVWA) and a demo of the installation process. We will also be talking, post installation, about some of the vulnerabilities you can expect to find in this environment and some of the Kali Linux tools you will be using to exploit those vulnerabilities

- Discussion on WebGoat and a demo of the installation process. We will also be talking, post installation, about some of the vulnerabilities you can expect to find in this environment and some of the Kali Linux tools you will be using to exploit those vulnerabilities

- Discussion of other, third party open vulnerable websites which you can look into after you've started building your skill-set within your controlled hacking lab

Who is the target audience?
Anyone looking to learn ethical hacking
Anyone who wants to learn how to create a controlled environment for their ethical hacking learning exercises

 

 

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.69 seconds
10,820,700 unique visits