
Learn Ethical Hacking and Reverse Engineering
Learn Ethical Hacking and Reverse Engineering
Intermediate
5( 24 Reviews )
9 hrs 12 mins
Vulnerability Assessment and Pentesting
Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe's
Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe's
Upgrade to Pro +
Gain hands-on experience, enhance your expertise, and achieve mastery in cybersecurity with our Pro plans.
Master New Skills with 700+ Courses
Advance Your Career with Learning Paths
Gain Practical Experience with 800+ Practice Labs
Tackle Real-World Challenges with CTFs
Achieve Recognition with Essential Certifications
A Shareable Certificate of Achievement After Completing Each Course
Overview
This course is an extensive guide designed for individuals interested in mastering the skills of ethical hacking and reverse engineering. The course begins with an introduction to the fundamental concepts of ethical hacking, followed by practical guidance on registering for an account with defendtheweb.net, and an overview of how to use the provided materials effectively. This structured approach ensures that learners can follow along smoothly and grasp the intricate details of both ethical hacking and reverse engineering.
The course covers a wide range of topics, starting with introductory levels that address various vulnerabilities and information leaks, such as client code modification, path traversal, and MD5 decryption. It then progresses to more complex exploits like file extension manipulation, browser spoofing, and steganography analysis. Participants will also delve into reverse encryption techniques, HTTP POST exploits, cookie tampering, and SQL injection attacks. Additionally, the course includes hands-on modules on port scanning, directory traversal, website defacement, log injection, XML injection, and CAPTCHA hacking using OCR, Node.js, and Python. Towards the end, learners are introduced to software cracking with tools like x64dbg and Detect It Easy (DIE), covering essential topics such as debugger stepping, breakpoints, reversing jumps, and patching programs.
By the end of the course, viewers will have acquired a comprehensive understanding of ethical hacking and reverse engineering.
The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Learn-Ethical-Hacking-Reverse-Engineering
What You Will Learn
Detect and exploit JavaScript code information leaks.
Modify client-side code to exploit vulnerabilities.
Expose and decrypt hidden JavaScript code.
Navigate and exploit file redirection vulnerabilities.
Execute file extension manipulation exploits.
Retrieve valuable information through dumpster diving.
Understand secure agent browser spoofing tactics.
Crack steganography to extract hidden data.
Convert trial software to fully functional versions.
Prerequisites
- Basic knowledge of HTML, JavaScript, and SQL
- Basic understanding of GET and POST requests
- A PC, Linux not required
- Basic knowledge in C, Assembly Language, and Win32 API would be helpful but not mandatory
Course Content
Chapter 1: Introduction
2 Videos | 0 hrs 5 mins
Registering for an Account with defendtheweb.net How to Use this Guide?
More Details
Chapter 2: Intro Levels
12 Videos | 0 hrs 53 mins
Intro 1 (Client Code Information Leak) Intro 2 (HTML Tag Information Leak) Intro 3 (JavaScript Code Information Leak) Intro 4 (Path Traversal Vulnerability) Intro 5 (JavaScript prompt() Function Information Leak) Intro 6 (Client Code Modification Vulnerability) Intro 7 (robots.txt Data Leak Vulnerability) Intro 8 (Path Traversal Vulnerability) Intro 9 (Client Code Modification Vulnerability) Intro 10 (JavaScript Code Exposure and Decryption) Intro 11 (File Redirection Vulnerability) Intro 12 (MD5 Decryption) Chapter 2 Quiz
More Details
Chapter 3: 24-bit (File Extension Manipulation Exploit)
1 Videos | 0 hrs 3 mins
24-bit (File Extension Manipulation Exploit)
More Details
Chapter 4: World of Peacecraft/Realistic (Dumpster Diving for Emails)
1 Videos | 0 hrs 4 mins
World of Peacecraft/Realistic (Dumpster Diving for Emails)
More Details
Chapter 5: Secure Agent (Browser Spoofing)
1 Videos | 0 hrs 2 mins
Secure Agent (Browser Spoofing)
More Details
Chapter 6: Crypt1/Crypt (Reverse Encryption)
1 Videos | 0 hrs 2 mins
Crypt1/Crypt (Reverse Encryption)
More Details
Chapter 7: Beach (Steganography Analysis)
1 Videos | 0 hrs 3 mins
Beach (Steganography Analysis)
More Details
Chapter 8: Squashed Image/Stego (Cracking Steganography)
1 Videos | 0 hrs 2 mins
Squashed Image/Stego (Cracking Steganography)
More Details
Chapter 9: HTTP Method/Intro (HTTP POST Exploit & Bypass CSRF-token Protection)
2 Videos | 0 hrs 13 mins
HTTP Method/Intro (HTTP POST Exploit & Bypassing CSRF-token Protection) Update HTTP Method/Intro (HTTP POST Exploit & Bypassing CSRF-token Protection)
More Details
Chapter 10: Library Gateway/Realistic (JavaScript Code Exposure Vulnerability)
1 Videos | 0 hrs 4 mins
Library Gateway/Realistic (JavaScript Code Exposure Vulnerability)
More Details
Chapter 11: Sid/Intro (Cookie Tampering to Bypass Login)
1 Videos | 0 hrs 2 mins
Sid/Intro (Cookie Tampering to Bypass Login)
More Details
Chapter 12: Crypt2/Crypt (Cracking Caeser Cipher Encryption)
1 Videos | 0 hrs 3 mins
Crypt2/Crypt (Cracking Caeser Cipher Encryption)
More Details
Chapter 13: Crypt3/Crypt (Decoding Morse Code)
1 Videos | 0 hrs 5 mins
Crypt3/Crypt (Decoding Morse Code)
More Details
Chapter 14: SQLi1/SQLi (Bypassing Login Page Password using SQL Injection Attack)
1 Videos | 0 hrs 8 mins
SQLi1/SQLi (Bypassing Login Page Password using SQL Injection Attack)
More Details
Chapter 15: Recon (Information Gathering Skills, Including B6-Key)
1 Videos | 0 hrs 4 mins
Recon (Information Gathering Skills, Including B6-Keys)
More Details
Chapter 16: Crypt4/Crypt (Decrypting Ciphertext using Online Decryptors)
1 Videos | 0 hrs 2 mins
Crypt4/Crypt (Decrypting Ciphertext using Online Decryptors)
More Details
Chapter 17: Map It (Port Scanning and Gaining Remote Access)
1 Videos | 0 hrs 5 mins
Map It (Port Scanning and Gaining Remote Access)
More Details
Chapter 18: Crypt5/Crypt (Reverse & Decrypt Ciphertext using Online Decryptor)
1 Videos | 0 hrs 3 mins
Crypt5/Crypt (Reversing & Decrypting Ciphertext using Online Decryptors)
More Details
Chapter 19: SQLi (Hacking Admin Username & Password using SQL Injection Attack)
1 Videos | 0 hrs 10 mins
SQLi2/SQLi (Hacking Admin Username & Password using SQL Injection Attack)
More Details
Chapter 20: Princess Slag/Realistic (Directory Traversal & Null Byte Attacks)
1 Videos | 0 hrs 7 mins
Princess Slag/Realistic (Directory Traversal Attack & Null Byte Attacks)
More Details
Chapter 21: Xmas '08/Realistic (Website Defacement Attacks)
1 Videos | 0 hrs 10 mins
Xmas '08/Realistic (Website Defacement Attacks)
More Details
Chapter 22: Planet Bid/Realistic (Password Reminder Exploits)
1 Videos | 0 hrs 16 mins
Planet Bid/Realistic (Password Reminder Exploits)
More Details
Chapter 23: Access Logs (Log Injection Attack)
1 Videos | 0 hrs 4 mins
Access Logs (Log Injection Attack)
More Details
Chapter 24: Sandra Murphy (XML Injection Attack)
1 Videos | 0 hrs 4 mins
Sandra Murphy (XML Injection Attack)
More Details
Chapter 25: Alphabetize/Coding (Using JavaScript to Defeat Countdown Timer)
1 Videos | 0 hrs 10 mins
Alphabetize/Coding (Using JavaScript Coding to Defeat Countdown Timer)
More Details
Chapter 26: Aliens/Stego (Decoding wav Files to Extract Passwords)
1 Videos | 0 hrs 7 mins
Aliens/Stego (Decoding wav Files to Extract Passwords)
More Details
Chapter 27: Custom Encoding/Coding (Decryption & Hacking Website Countdown Timer)
1 Videos | 0 hrs 13 mins
Custom Encoding/Coding (Decryption & Hacking Website Countdown Timer)
More Details
Chapter 28: Missile Codes/Forensics (Analyze & Extract Data from Disk Images)
1 Videos | 0 hrs 20 mins
Missile Codes/Forensics (Analyzing and Extracting Data from Disk Images)
More Details
Chapter 29: Captcha1/CAPTCHA (Hacking Captcha using OCR and AutoIt)
5 Videos | 0 hrs 32 mins
Introduction to Captcha1 Challenge Downloading and Installing an OCR Software Using Abby (OCR Tool) to Convert Image to Text Download and Install AutoIt (Automation Tool) Using AutoIt Chapter 29 Quiz
More Details
Chapter 30: Captcha2/CAPTCHA (Hack Captcha with Node.js, imagemagick & AutoIt)
7 Videos | 0 hrs 52 mins
Intro to Captcha2 Challenge Collecting Key Images Splitting the Captcha Image into 15 Sample Files Installing Node.js Intro to Node.js Using node.js to Decode Captcha Image Using AutoIt to Defeat Countdown Timer Chapter 30 Quiz
More Details
Chapter 31: Captcha3/CAPTCHA (Using Python to hack Captcha)
7 Videos | 0 hrs 52 mins
Introduction to the Captcha3 Challenge Installing and Using Python Installing Pillow Library for Python Image Manipulation Collecting Key Images Splitting the Captcha3 Sample using Python Creating nodejs Script to Decode Captcha Sample Images Using AutoIt to Automate Tasks and Defeat Timer Limitation Chapter 31 Quiz
More Details
Chapter 32: Introduction to Software Cracking with crackme's
1 Videos | 0 hrs 2 mins
Introduction to crackme's
More Details
Chapter 33: Introduction to x64dbg and Detect it Easy (DIE)
1 Videos | 0 hrs 5 mins
Downloading and Installing x64dbg and Detect It Easy (DIE)
More Details
Chapter 34: Setting up Your Cracking Workspace and Workflow
1 Videos | 0 hrs 11 mins
Setting up Your Cracking Workspace and Workflow
More Details
Chapter 35: Debugger Stepping Basics
1 Videos | 0 hrs 26 mins
Debugger Stepping Basics
More Details
Chapter 36: Stepping Into Calls
1 Videos | 0 hrs 19 mins
Stepping Into Calls
More Details
Chapter 37: Breakpoints
2 Videos | 0 hrs 17 mins
Breakpoints Setting Breakpoints on Strings Chapter 37 Quiz
More Details
Chapter 38: Reversing Jumps
1 Videos | 0 hrs 9 mins
Reversing Jumps
More Details
Chapter 39: How to Patch a Program?
2 Videos | 0 hrs 20 mins
How to Patch a Program? Patching with Jumps Chapter 39 Quiz
More Details
Chapter 40: Summary of Cracking Software Workflow
1 Videos | 0 hrs 5 mins
The 5 Steps of Cracking Software
More Details
Chapter 41: Introduction to Cracking gui-based Programs
1 Videos | 0 hrs 4 mins
Introduction to Cracking gui-based Programs
More Details
Chapter 42: Analyzing the PE for a gui-based Program
1 Videos | 0 hrs 4 mins
Analyzing the PE for a gui-based Program
More Details
Chapter 43: Crack the Serial Key using BP on Strings
2 Videos | 0 hrs 10 mins
Setting up x64dbg Crack the Serial Key using BP on Strings
More Details
Chapter 44: Windows API Functions & the Stack
2 Videos | 0 hrs 14 mins
Window API Functions Pushing Parameters to the Stack Chapter 44 Quiz
More Details
Chapter 45: Patching to Bypass Wrong Serial Key Message
2 Videos | 0 hrs 22 mins
Patching to Bypass Wrong Serial Key Message Bypassing using XOR Assembly Chapter 45 Quiz
More Details
Chapter 46: Bonus Lecture
1 Videos | 0 hrs 2 mins
Bonus Lecture
More Details
Instructor

Paul
Upgrade to Pro+
Master New Skills with 700+ Courses
Advance Your Career with Learning Paths
Gain Practical Experience with 800+ Practice Labs
Tackle Real-World Challenges with CTFs
Achieve Recognition with Essential Certifications
A Shareable Certificate of Achievement After Completing Each Course
Looking to train your team?
Get reporting and analytics for your users and much more with our enterprise features
Learn moreReviews
5
24 reviews
Average Course Rating
5 stars
4 stars
3 stars
2 stars
1 stars
Related Courses
Short Course

CCNA - Understanding Routers and Switches
Security Architecture and Operations
A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.
Short Course

CISSP Certification Domains 5, 6, 7, and 8 Video Training
Cybersecurity
This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.
Short Course

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish
Cybersecurity
Domina Metasploit y técnicas de hacking ético: vulnerabilidades, explotación y creacion de malware ¡Desde 0 a experto!
Short Course

Cybersecurity Strategies for Banks and NBFCs
Cybersecurity
Essential Strategies to Protect Banks and NBFCs from Hackers, Data Breaches, and Cybercrime