Talaiya Chowki Talaiya, Bhopal, India - 462001.
Details verified of Shahid Khan✕
Identity
Education
Know how UrbanPro verifies Tutor details
Identity is verified based on matching the details uploaded by the Tutor with government databases.
Hindi Mother Tongue (Native)
English Proficient
Rani Durgavati Vishwavidyalaya Pursuing
Master of Science (M.Sc.)
Talaiya Chowki Talaiya, Bhopal, India - 462001
Phone Verified
Email Verified
Report this Profile
Is this listing inaccurate or duplicate? Any other problem?
Please tell us about the problem and we will fix it.
Class Location
Online (video chat via skype, google hangout etc)
I am Willing to Travel
Tutor's Home
Years of Experience in Kali Linux Training
4
Kali Linux Training
Advance penetration testing with Kali Linux, Penetration Testing Training with Kali Linux, Kali Linux Certified Professional , Ethical Hacking Using Kali Linux
Teaching Experience in detail in Kali Linux Training
-------------------- 1. System Hacking | -------------------- --> windows password cracking --> Cracking windows10 password --> hacking basics --> msfvenom and metasploit basics --> hacking windows --> meterpreter basics --> changing the MACE --> keylogging --> bypassing host based firewall --> privilege escalation --> enabling rdp remotely --> getting windows password (phishing) --> getting windows password [winlogon.exe(excellent)] --> add an administrator user to victim pc --> getting the windows Hashes --> viewing each step of victim in gui --> injecting vnc server --> recovering deleted files from victim's pc --> recording victim's sound/voice --> pretending to be other user --> phishing --> Hosts based Phishing --> Persistence --> Resource File --> Railgun (Playing with windows dll's) --> clearing logs --> Finding Open Ports & Services --> exploit software based vulnerabilities --> upgrading shell with meterpreter --> automatic outbound port --> port forwarding --> pivoting --> reverse connect trough pivoting --> post exploitation with wevutil --> getting saved passwords from cache memory --> creating trojan (dropper) --> empire basics --> creating malicious docs --> armitage --> Hacking linux --> embedding malware code into linux package --> hacking android --> badooring original android application --> using beef --> Creating ransomeware --> Creating our custom malware ------------------ 1.A. Hash Attacks | ------------------ --> Identifying Hashes --> cracking the LM Hashes --> gaining access with the NTLM hashes --> accessing rdp with NTLM hashes <=============================================================> ------------------- 2. Network hacking | ------------------- --> live host discovery --> mac address changer --> mac filter bypass --> monitor mode --> airodump-ng --> Deauthentication attack --> arp poisioning --> Viewing Captured Graphics with Driftnet --> file extraction from http traffic --> bypass https --> session hijacking --> DNS Spoofing --> screen capture & injecting keyloggers --> injecting javascript html code --> Hooking cients to beef & Stealing passwords --> capture victim's packets remotely --> creating a fake update --> wpa cracking --> wpa2 hacking <=============================================================> ----------------------- WebApplication hacking | ----------------------- --> 5 Phase of Hacking --> Information gathering -> Robots.txt -> Google Dorks -> IDS/IPS Detection -> Using firebug addon -> DirBuster -> Recon-NG -> Dmitry -> Shodan -> Shodan with metaspoit -> Password Profiling -> Cleaning Password files -> Making dictionary from our Password files -> Generating dictionary with john --> scanning -> OpenVas -> Nessus -> Vega -> Owasp-zap -> Wpscan -> Nikto -> joomscan --> exploiting -> Web parameter tampering -> Path and Information disclosure -> HTML injection -> lfi -> rfi -> file upload -> Public Web shells -> Private Web shells -> nc reverse connect -> reverse connection using python -> code execution -> Input Validation -> sqli -> xss -> exploit xss with beef -> insecure session managment -> bruteforce -> post exploitation
1. Which classes do you teach?
I teach Kali Linux Class.
2. Do you provide a demo class?
Yes, I provide a free demo class.
3. How many years of experience do you have?
I have been teaching for 4 years.
Class Location
Online (video chat via skype, google hangout etc)
I am Willing to Travel
Tutor's Home
Years of Experience in Kali Linux Training
4
Kali Linux Training
Advance penetration testing with Kali Linux, Penetration Testing Training with Kali Linux, Kali Linux Certified Professional , Ethical Hacking Using Kali Linux
Teaching Experience in detail in Kali Linux Training
-------------------- 1. System Hacking | -------------------- --> windows password cracking --> Cracking windows10 password --> hacking basics --> msfvenom and metasploit basics --> hacking windows --> meterpreter basics --> changing the MACE --> keylogging --> bypassing host based firewall --> privilege escalation --> enabling rdp remotely --> getting windows password (phishing) --> getting windows password [winlogon.exe(excellent)] --> add an administrator user to victim pc --> getting the windows Hashes --> viewing each step of victim in gui --> injecting vnc server --> recovering deleted files from victim's pc --> recording victim's sound/voice --> pretending to be other user --> phishing --> Hosts based Phishing --> Persistence --> Resource File --> Railgun (Playing with windows dll's) --> clearing logs --> Finding Open Ports & Services --> exploit software based vulnerabilities --> upgrading shell with meterpreter --> automatic outbound port --> port forwarding --> pivoting --> reverse connect trough pivoting --> post exploitation with wevutil --> getting saved passwords from cache memory --> creating trojan (dropper) --> empire basics --> creating malicious docs --> armitage --> Hacking linux --> embedding malware code into linux package --> hacking android --> badooring original android application --> using beef --> Creating ransomeware --> Creating our custom malware ------------------ 1.A. Hash Attacks | ------------------ --> Identifying Hashes --> cracking the LM Hashes --> gaining access with the NTLM hashes --> accessing rdp with NTLM hashes <=============================================================> ------------------- 2. Network hacking | ------------------- --> live host discovery --> mac address changer --> mac filter bypass --> monitor mode --> airodump-ng --> Deauthentication attack --> arp poisioning --> Viewing Captured Graphics with Driftnet --> file extraction from http traffic --> bypass https --> session hijacking --> DNS Spoofing --> screen capture & injecting keyloggers --> injecting javascript html code --> Hooking cients to beef & Stealing passwords --> capture victim's packets remotely --> creating a fake update --> wpa cracking --> wpa2 hacking <=============================================================> ----------------------- WebApplication hacking | ----------------------- --> 5 Phase of Hacking --> Information gathering -> Robots.txt -> Google Dorks -> IDS/IPS Detection -> Using firebug addon -> DirBuster -> Recon-NG -> Dmitry -> Shodan -> Shodan with metaspoit -> Password Profiling -> Cleaning Password files -> Making dictionary from our Password files -> Generating dictionary with john --> scanning -> OpenVas -> Nessus -> Vega -> Owasp-zap -> Wpscan -> Nikto -> joomscan --> exploiting -> Web parameter tampering -> Path and Information disclosure -> HTML injection -> lfi -> rfi -> file upload -> Public Web shells -> Private Web shells -> nc reverse connect -> reverse connection using python -> code execution -> Input Validation -> sqli -> xss -> exploit xss with beef -> insecure session managment -> bruteforce -> post exploitation
Share this Profile
Also have a look at
Reply to 's review
Enter your reply*
Your reply has been successfully submitted.
Certified
The Certified badge indicates that the Tutor has received good amount of positive feedback from Students.