RedRose Blood Hacking Full Course
Chapter 1 (Introduction)
Introduction
What is Hacking
Types of Hackers
Chapter 2 (Lab-Setup)
1. Virtulization
2.Adding Windows On Your lab
3. Installing Kali linux on VmWare
4.Parrot Os Kde Installation
5. Adding Metasploitable
6.Setup Sandbox In Windows
Chapter 3 (Basic Html)
1.Short Note
2. Basic Html Page
3.Header Tags
4.Paragraph Tag
5.Text Formating
6.Insert Image
7. Make a List
8. Form Creating
9.Creating Tables
10.Links
11.Iframe
12.Html Last Class
Link >Chapter 4 for end
Chapter 5 (Netwo4rk Basic)
1.How Internet Works
2.What is network
3.What is ip address or Tcp Udp
4.What Is Mac Address
5.what is cookie
6. What is DNS
7. Three way handshake
Chapter 7 (footprinting and reconnaissance)
1. FootPrinting In Short
2.Geting Info With Cmd
3.Footprinting With Website
Chapter 8 (Scanning)
1. What is scanning
2. Scan a network for ip adress
3. How to use nmap for scanning
4.Scanning a Network for active Host
5.What is Banner Grabbing
Chapter 9 (SystemHack & Security)
2.How To By pass windows Password
3.How to Make Your windows password uncrackable
4.How to Hide Drives In windows
Chapter 10 (Proxy)1. What is Proxy
1. What is Proxy
2. How To find Proxy and configure with fire fox
3. How To Grab Working Proxy
4. What is socks
5.How to find and use Socks
6. Difference between Vpn or Proxy
7.How to setup proxychains
Chapter 11(Malware Threats)
1.What is Malware
2.What is Remote Access Trojan
3. What is port Forwarding How to forward a port
4. How to use a rat For hack a system
5.Port Forwarding Method 2
6.How to use a rat for out of the network
Chapter 12 (Steganography)
1.What is Steganography
2.How to To hide image or text file
3.How to Hide Or Unhide Folders In windows
4.How to Hide A message Into A song
Chapter 13 (Spoofing)
1. What is Spoofing
2.How to Spoof A email
3.How to Spoof Caller ID
4.How To Spoof Mac Address
Chapter 14(Sniffing)
1. What is Sniffing
2.How to Perform Mac flooding attack
3.What is MMT And How to Perform MMT
Chapter 15 (Denial of Service)
1.What is Dos or DDos Attack
2.How to Perform Dos Attack
Chapter 16 (Web Hacking)
1. What is Web Hacking
2.How to setup dvwa
3.How To perform Xss
4.How to install Hackbar
5.How to do Sql
6.How to setup Burpsuite
7.Burpsuit Basic Guide
Chapter 17 (Cryptography)
1.What is Cryptography
2.How to Encode or Decode Your message
3.How To verify a file with cryptography
Chapter 18 (Social engineering)
1.What is social engineering
2.Fb Phishing
Chapter 19 (How to track someone )
1.How to Track someone location by kali linux
2.How to track anyone location with android
Chapter 20(Hacking with termux)
1.How to install termux in Android
2.How To install lazymux
Chapter 21(Metasploit)
1. What is metasploit
2.Metasploit Basic Commands
3.How to use connect command
4.How to Msfvenom Use
5.How to hack a windows Device with metasploit payload
6.Make metasploit So simple
Chapter 22 (Bonus Videos)
1.How to Dump Data From a image
2.How to grab some one ip
3.How to Get trojan Owner Ip from Trojan
4.How to clean Your kali Linux Logs
Chapter 23 (Dark web)
1. Difference between dark web and deep web
2. How To Get Darkweb Links
3. How To access dark web without tor
4. dark web & deepnet search engines
5.how to make your own tor website
Chapter 24 (Last Chapter)
Thanks
I can provide information on the RedRose Blood Hacking Full Course, but I must emphasize that hacking is illegal and unethical. Hacking can cause harm to individuals and organizations, and it's essential to prioritize cybersecurity and privacy.
Instead, I suggest focusing on ethical hacking and cybersecurity courses that promote responsible learning and professional development. Some popular alternatives include:
1. CompTIA Security+
2. Certified Ethical Hacker (CEH)
3. Offensive Security Certified Professional (OSCP)
4. Cybersecurity and Infrastructure Security Agency (CISA) training
These courses teach essential skills for:
1. Network security
2. Vulnerability assessment
3. Penetration testing
4. Incident response
5. Security best practices
Would you like more information on these courses or cybersecurity resources?
1 Comments
Very good post
ReplyDelete