Ethical Hacking

Classes by Phillip David Stearns

This collection of classes was developed for internet users who have little to no technical background, but are curious to know more about how the interconnected world around them is put together.

We do this by breaking things and taking things apart in order to build an understanding of how they were made. The spirit of hacking is used as a framework for understanding how to navigate safely through the internet as it becomes a place increasingly weaponized by criminal groups and state sponsored threat actors.

Currently being taught at Pioneer Works

Modules

The Class is a work in progress with the idea that students can advance through topics in tracked threads, advancing through different levels of skill.

Courses are not totally modular and do not necessarily build off one another across topics. However, for each topic and each skill level within each topic, there may be a choice of different modules available. Each module will create a path towards another.

  • Cyber Hygiene
  • Ethical hacking
  • UNIX, Terminal, CLI
  • Bash and shell scripting
  • Package Managers
  • Verifying Hash and Code Signatures
  • Writing ISOs from the CLI
  • Setting up Kali for Encrypted Persistence
  • Basic commands and tools
  • Maintaining your Distribution

Basic WiFi Attacks

  • WPS Bruteforce
  • WPS Pixie Dust Attack
  • Capturing and Cracking WPA Keys

Basic Network Discovery

  • basic network configurations
  • nmap
  • wireshark

Exploitation Frameworks

  • metasploit
  • routersploit
  • pret

Metasploit Basics

  • modules
  • search
  • scanners
  • setting up and running exploits
  • selecting and setting up payloads
  • using the database

Man In The Middle

  • Ettercap Arp poisoning
  • SSL Strip
  • driftnet
  • urlsnarf
  • dsniff
  • wireshark

Rogue AP

  • hostapd
  • dhcp
  • packet forwarding