Ethical password hacking and protecting Premium class

Amit Huddar, Scientist, Engineer, Developer, Trainer and CEO

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
73 Videos (4h 4m)
    • Ethical password hacking and protecting

      0:27
    • Disclaimer

      0:40
    • How to take this course

      1:29
    • Keylogger

      0:41
    • Process

      3:07
    • Software for keylogger

      1:39
    • Whatsapp hacking

      2:36
    • Whatsapp hacking hands on

      9:28
    • Whatsapp hacking hands on result

      1:21
    • Whatsapp hacking hands on - cancel subscription

      1:49
    • Rooting android device to install mspy app

      3:58
    • Counter measures for keylogger

      1:09
    • Finding keylogger in android

      2:44
    • Finding keylogger in mac OS

      1:55
    • 2)Guessing -Introduction

      0:28
    • Guessing password

      2:07
    • Software for brute force

      1:53
    • Introduction to Kali Linux

      6:39
    • Brute force with help of guessing

      1:27
    • Counter measures for guessing

      0:59
    • 3)BruteForce - Introduction

      0:32
    • what you need for brute force

      1:53
    • Why not to use virtual box

      1:54
    • Wifi password hacking through brute force

      2:28
    • Wifi password hacking through brute force in depth with explanation

      6:18
    • Hacking through brute force and guessing

      1:27
    • Setting up kali linux in virtual box

      8:41
    • Setting up DVWA-1

      3:45
    • Setting up DVWA 2

      5:33
    • Introduction to Hydra

      2:53
    • Hydra collecting information

      15:10
    • Using hydra to brute force

      4:49
    • List of password

      2:20
    • Brute force WiFi using smart phone

      2:39
    • L0pht crack download and install

      3:52
    • L0pht crack wizard

      10:16
    • Counter measures for brute force

      2:23
    • 4)Phishing - Introduction

      0:29
    • What you need for phishing

      1:53
    • Password hacking through phishing

      3:50
    • Things to keep in mind while cloning login page

      2:18
    • Login page of any website can be cloned

      1:24
    • Using domain name for phishing 1/2

      2:56
    • Using domain name for phishing 2/2

      1:14
    • Developing facebook phishing page(optional but recommended way)

      3:05
    • Hosting Facebook phishing page

      2:54
    • Phishing page in depth with explanation

      2:34
    • Attaching phishing page to domain

      2:41
    • Using Google AdWords for phishing -1/10- Plan

      1:34
    • Using Google AdWords for phishing -2/10 - Setting up AdWord account

      2:47
    • Using Google AdWords for phishing -3/10- AdWord account in brief

      2:12
    • Using Google AdWords for phishing -4/10- Keyword

      1:25
    • Using Google AdWords for phishing -5/10- Keyword match

      2:16
    • Using Google AdWords for phishing -6/10- Keyword planner

      2:29
    • Using Google AdWords for phishing -7/10- Creating campaign

      4:08
    • Using Google AdWords for phishing -8/10- Results

      1:41
    • Using Google AdWords for phishing-9/10 -Budget

      2:56
    • Using Google AdWords for phishing -10/10- Summary

      3:49
    • Phishing through email in depth- custom email

      6:44
    • Counter measures for phishing

      0:37
    • 5)SocialEngineering - Introduction

      1:20
    • Social engineering through human method

      5:56
    • Social engineering through computer method

      4:56
    • Counter measures for social engineering engineering

      1:39
    • SQL Injection

      9:32
    • Hack Windows 7 with Metasploit using Kali Linux

      6:42
    • Accessing file inside password protected windows system

      1:45
    • crack into password protected windows 7 system

      3:44
    • Crack User Password in a Linux System

      3:44
    • Hacking password through browser

      1:49
    • Pass Phrase

      11:46
    • How to create stronger passwords

      5:02
    • Facts on password hacking

      4:50

About This Class

"Course is great, in the guessing section, you almost knew my password, immediately changed it to 23 letters, I am very careful now with it, thanks!" - Ziad Ahmed Amer

"I have taken this course twice because there is so much valuable information. I was not aware that hacking software is available by Googling it. I found this to be very disturbing, however, I am grateful that this course is available to educate us on the software that is available to anyone. My gratefulness is extended due to the counter measures that are provided. Numerous scams are exposed for unsuspecting victims of phishing and hacking. Take advantage of this course so that you can be better prepared and secure. The content is informative, and the quality of the production met my expectations." - Matt Hayes

"This course is packed with great information. Very clear and easy to understand, and all directly to the point, no filler or fluff! Job well Done!" - Don Nir

Ethical Password hacking and protecting is an video tutorial which helps you to learn different password hacks and protecting methods. Videos in this course demonstrate hacking and protecting WiFi and many other password protected accounts using keylogger, guessing, brute force, phishing, social engineering methods and counter measure for each of them.

It's a beneficial course to learn different password hacking methods and to protect your password protected accounts from hackers. All methods are pretty well explained and demonstrated step by step in all videos. It's crash course in ethical hacking. It's a very delightful course to hacking enthusiast's.

How to use:

Watch all videos in full screen and land slide view. Internet connection more than 30kbps is necessary to stream all videos properly. If any technical difficulty appears report to instructor through message option. Any doubts, clarification or suggestion on improvement of course message instructor or post in discussion before giving any bad review.

Disclaimer :

This course is meant for education purpose only, we aren't responsible of implementation of any hack learnt in it, this course is made with vision to create awareness on hacks. As most of the people are suffering from lack of awareness.

34

Students

--

Projects

Amit Huddar

Scientist, Engineer, Developer, Trainer and CEO

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust", which develops products using new technology such as Android Wear (smartwatch and Google Glass). He believes wearable gadgets are the future of personal computing.

He believe 2016 to 2025 is meant for app developers

Many made millions out of app development, yet he believe it's just beginning.

He is CEO of Softdust  (software firm).

Amit opted to study Computer Science Engineering in 2013 at SSIT. He started his software company in his first year of Engineering and it became successful, so he dropped out in September, 2014.

He has worked on non-conventional forms of energy.

Amit demonstrated his design of a tidal energy power plant model at a national level and won awards from prestigious institutes including the ISRO (Indian Space Research Institute of technology) and NITK (National Institute of Technology Karnataka).

He is quantum physicist too.

Amit worked on practical application of quantum leap with fellow scientists at IISc (Indian Institute of Science), India’s leading research institute and also ranked as 23rd best in the world.

He applies and believes in the law of attraction.

Whilst the basic principles of reasoning from physics are important to him, so equally is the law of attraction also important. This plays a very important role in his life.

Skills: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, building custom Linux OS, cloud computing, penetration testing, Kali Linux and Hacking.
Languages spoken: English, Hindi, Kannada.