Course Overview

This course is an extensive guide designed for individuals interested in mastering the skills of ethical hacking and reverse engineering. The course begins with an introduction to the fundamental concepts of ethical hacking, followed by practical guidance on registering for an account with defendtheweb.net, and an overview of how to use the provided materials effectively. This structured approach ensures that learners can follow along smoothly and grasp the intricate details of both ethical hacking and reverse engineering.

The course covers a wide range of topics, starting with introductory levels that address various vulnerabilities and information leaks, such as client code modification, path traversal, and MD5 decryption. It then progresses to more complex exploits like file extension manipulation, browser spoofing, and steganography analysis. Participants will also delve into reverse encryption techniques, HTTP POST exploits, cookie tampering, and SQL injection attacks. Additionally, the course includes hands-on modules on port scanning, directory traversal, website defacement, log injection, XML injection, and CAPTCHA hacking using OCR, Node.js, and Python. Towards the end, learners are introduced to software cracking with tools like x64dbg and Detect It Easy (DIE), covering essential topics such as debugger stepping, breakpoints, reversing jumps, and patching programs.

By the end of the course, viewers will have acquired a comprehensive understanding of ethical hacking and reverse engineering.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Learn-Ethical-Hacking-Reverse-Engineering

What You Will Learn

  • Detect and exploit JavaScript code information leaks.
  • Modify client-side code to exploit vulnerabilities.
  • Expose and decrypt hidden JavaScript code.
  • Navigate and exploit file redirection vulnerabilities.
  • Execute file extension manipulation exploits.
  • Retrieve valuable information through dumpster diving.
  • Understand secure agent browser spoofing tactics.
  • Crack steganography to extract hidden data.
  • Convert trial software to fully functional versions.

Program Curriculum

  • Registering for an Account with defendtheweb.net
  • How to Use this Guide?

  • Intro 1 (Client Code Information Leak)
  • Intro 2 (HTML Tag Information Leak)
  • Intro 3 (JavaScript Code Information Leak)
  • Intro 4 (Path Traversal Vulnerability)
  • Intro 5 (JavaScript prompt() Function Information Leak)
  • Intro 6 (Client Code Modification Vulnerability)
  • Intro 7 (robots.txt Data Leak Vulnerability)
  • Intro 8 (Path Traversal Vulnerability)
  • Intro 9 (Client Code Modification Vulnerability)
  • Intro 10 (JavaScript Code Exposure and Decryption)
  • Intro 11 (File Redirection Vulnerability)
  • Intro 12 (MD5 Decryption)
  • Chapter 2 Quiz

24-bit (File Extension Manipulation Exploit)

World of Peacecraft/Realistic (Dumpster Diving for Emails)

Secure Agent (Browser Spoofing)

Crypt1/Crypt (Reverse Encryption)

Beach (Steganography Analysis)

Squashed Image/Stego (Cracking Steganography)

  • HTTP Method/Intro (HTTP POST Exploit & Bypassing CSRF-token Protection)
  • Update HTTP Method/Intro (HTTP POST Exploit & Bypassing CSRF-token Protection)

Library Gateway/Realistic (JavaScript Code Exposure Vulnerability)

Sid/Intro (Cookie Tampering to Bypass Login)

Crypt2/Crypt (Cracking Caeser Cipher Encryption)

Crypt3/Crypt (Decoding Morse Code)

SQLi1/SQLi (Bypassing Login Page Password using SQL Injection Attack)

Recon (Information Gathering Skills, Including B6-Keys)

Crypt4/Crypt (Decrypting Ciphertext using Online Decryptors)

Map It (Port Scanning and Gaining Remote Access)

Crypt5/Crypt (Reversing & Decrypting Ciphertext using Online Decryptors)

SQLi2/SQLi (Hacking Admin Username & Password using SQL Injection Attack)

Princess Slag/Realistic (Directory Traversal Attack & Null Byte Attacks)

Xmas '08/Realistic (Website Defacement Attacks)

Planet Bid/Realistic (Password Reminder Exploits)

Access Logs (Log Injection Attack)

Sandra Murphy (XML Injection Attack)

Alphabetize/Coding (Using JavaScript Coding to Defeat Countdown Timer)

Aliens/Stego (Decoding wav Files to Extract Passwords)

Custom Encoding/Coding (Decryption & Hacking Website Countdown Timer)

Missile Codes/Forensics (Analyzing and Extracting Data from Disk Images)

  • Introduction to Captcha1 Challenge
  • Downloading and Installing an OCR Software
  • Using Abby (OCR Tool) to Convert Image to Text
  • Download and Install AutoIt (Automation Tool)
  • Using AutoIt
  • Chapter 29 Quiz

  • Intro to Captcha2 Challenge
  • Collecting Key Images
  • Splitting the Captcha Image into 15 Sample Files
  • Installing Node.js
  • Intro to Node.js
  • Using node.js to Decode Captcha Image
  • Using AutoIt to Defeat Countdown Timer
  • Chapter 30 Quiz

  • Introduction to the Captcha3 Challenge
  • Installing and Using Python
  • Installing Pillow Library for Python Image Manipulation
  • Collecting Key Images
  • Splitting the Captcha3 Sample using Python
  • Creating nodejs Script to Decode Captcha Sample Images
  • Using AutoIt to Automate Tasks and Defeat Timer Limitation
  • Chapter 31 Quiz

Introduction to crackme's

Downloading and Installing x64dbg and Detect It Easy (DIE)

Setting up Your Cracking Workspace and Workflow

Debugger Stepping Basics

Stepping Into Calls

  • Breakpoints
  • Setting Breakpoints on Strings
  • Chapter 37 Quiz

Reversing Jumps

  • How to Patch a Program?
  • Patching with Jumps
  • Chapter 39 Quiz

The 5 Steps of Cracking Software

Introduction to Cracking gui-based Programs

Analyzing the PE for a gui-based Program

  • Setting up x64dbg
  • Crack the Serial Key using BP on Strings

  • Window API Functions
  • Pushing Parameters to the Stack
  • Chapter 44 Quiz

  • Patching to Bypass Wrong Serial Key Message
  • Bypassing using XOR Assembly
  • Chapter 45 Quiz

Bonus Lecture

Load more modules

Instructor

Paul Chin

Paul Chin is a semi-retired college lecturer with more than 20 years’ experience in teaching computing and information technology. His interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality, and well-being. In his spare time, he also plays the piano and keyboard. He enjoys teaching face-to-face and online and also loves educating and inspiring others to succeed and live the life of their dreams.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8