This course is divided into 6 modules, each module is divided according to their level of difficulty and subject.
Module 1 starts with the basic introduction of this course, Raspberry pi, and its applications, Basic Hardware setup, and Kali Linux configuration.
Module 2 is focused on network s...niffing and spoofing, It covers basic network scanning methods, common scanning tools like Nmap, Wireshark, and TCP dump.
it also covers how warding works and how to make one. some basic vulnerability assessments with Nikto and NSE scripts are also covered.
Module 3 focuses on gaining access to target machines via the network. you'll learn how to perform attacks like DNS Spoofing, Common vulnerability exploitation, and advanced concepts like Network pivoting. New tools like Powershell empire are also covered which is mostly used in Red Team Operations for creating undetectable backdoors.
Module 4 Wireless networks are always the main target for attackers as it is usually open to all. It starts with setting up raspberry pi for wireless attacks,
Capturing Wi-Fi handshakes, Cracking passwords, Rogue access points, Deauthentication attacks, and Hacking FM radio.
Module 5 This module is all about persistence on a target machine so that the attacker can come in and go out of the target's machine anytime. It starts with the use case scenarios of Raspberry pi Zero W, Creating own network backdoors, using P4wnP1 ALOA tool, HID attacks, Stealing credentials, and Injecting Metasploit payloads. These attacks are done with the help of physical backdoors which help to bypass network security very easily.
Module 5 After hacking it is always good to clear all logs and cover all tracks, in this module we have talked about how to destroy data from raspberry pi properly, using tools like Tor and proxychains for anonymous surfing, and little handy portable yet cheater tools for wireless attacks like network jamming. we also talk about Pi-Hole which is a great tool to get rid of unwanted contents like ads completely.
Pay One Time - Access Lifetime.
You can find here the full syllabus of course: Raspberry pi for Ethical Hackers
Presenting Combo Offers with high discounts.