You are on page 1of 33

Advanced Hacking Training

The most Advanced and complete Ethical Hacking and Penetration


Testing Training

21 Modules and 1 bonus module The Best Certification


Beginner to Advanced More Advanced than
CEH/OSCP/OSWE/OSCE/OSEE/OSWP
LIFETIME ACCESS together

CTF and LABS

PDF BOOKS
Advanced Hacking Training
Who is this training for?

➢ Anybody who want be a Penetration ➢ Server and Network Administrators


Tester and Ethical Hacker. that need build secure systems.

➢ Security professionals who want ➢ Anybody interested in Bug Bounty


improve skills with a Advanced Training. campaigns to earn money with Hacking
Learn with the bests
The Creators of new world technologies

ANDRAX Hacker’s Platform M.A.R.I.N.A AI For Hacking

The most Advanced Platform for Hacking, Advanced Artificial Intelligence for Network
Cracking and Penetration Testing Attacks and Hacking
Why the low price?
Our course is the best ever made… so why the low price?

The training is in LIVE PRODUCTION ATTENTION!!!

What this mean? LIFETIME ACCESS

This mean that we are recording and building the This training is your for your entire life and we ever
lessons, you will see new lessons every week in your will keep it and your certification updated, you are
student dashboard. investing in your future!
How to pay?
We have simplified payment options

PayPal Payoneer
The Best way to pay online, receive your Global Payments Made Easy with just your
access in a some hours and have a money credit or debit card, receive your access in 3
back guarantee within 4 months of purchase commercial days.

Our team will select the best option


to your country!
How to pay?
Simple way to join

Invoice Generation

Our team will generate a invoice to you, we only


need:

➢ Your full name


➢ Your country

We will send your invoice and a payment link with


the best option to you.

You will receive a TEMPORALLY


access until the payment is
complete
The teacher
Weidsom Nascimento

Security Researcher, Security consultant and Penetration Creator of the Penetration Testing platform for Android
Tester at The Cracker Technology and PayBack Security smartphones: ANDRAX

22 years old Creator of M.A.R.I.N.A. the first Advanced AI for Penetration


Testing
Started in Hacking at 8 years old, at 10 started working as
Penetration Tester Network and Security system administrator expert

Developer in: C, C++, Go, Ruby, Perl, Java, PHP, Lua, Python,
Assembly x86, Assembly x86_64, Assembly ARM, Assembly
MIPS and many others...
What did Weidsom hacked

➢ Claro Mobile CellPhone Operator (HLR/HSS, eNodeB, ➢ Mikrotik RouterOS


NodeB, free internet data, SIM Swap, Clone number) ➢ PLC’s, SCADA and others Industrial Control Systems
➢ VIVO Mobile CellPhone Operator (HLR/HSS, eNodeB, ➢ WebSites
NodeB, free internet data) ➢ Cars
➢ Hostinger host provider ➢ Satellites
➢ Windows Desktop’s
➢ Windows Server’s And much more...
➢ Linux and *NIX Machines
➢ Routers around the world
➢ Fillnet ISP
➢ Mconect ISP
What will you learn?
22 modules about Hacking and Penetration
Testing:

➢ 01 Networking ➢ 13 Linux Hacking


➢ 02 *NIX Basics ➢ 14 Android Hacking
➢ 03 Programming for Hacking ➢ 15 IOS Hacking
➢ 04 Information Gathering ➢ 16 Advanced Phishing
➢ 05 Scanning ➢ 17 IoT Hacking
➢ 06 Password Hacking ➢ 18 ICS Hacking
➢ 07 WebSite Hacking ➢ 19 Mobile Network Hacking
➢ 08 Wireless ➢ 20 Hardware Hacking
➢ 09 SDR Hacking ➢ 21 Car Hacking
➢ 10 Exploitation ➢ 22 Artificial Intelligence for Hacking
➢ 11 Windows Hacking
➢ 12 MacOS Hacking
Modules Details
01 Networking
Learn networking is essential for everyone who want to become a professional hacker!

➢ Network Basics ➢ ISP (Internet Service Provider)


➢ IPv4 ➢ Routers
➢ IPv6 ➢ Switchs
➢ OSI vs TCP Models ➢ VLAN's
➢ UDP ➢ Cisco
➢ SCTP ➢ Ubiquiti
➢ FTP ➢ Mikrotik
➢ SSH
➢ HTTP
Modules Details
02 *NIX Basics
You need to know how the operating system works to hack it… more than 80% of the entire internet is
Linux and if you don’t know about it… sorry you are not a hacker!

➢ Linux Structure ➢ Shell

➢ Linux users ➢ Limited shell

➢ Linux groups ➢ Basic commands

➢ Linux permissions ➢ Shell Scripting

➢ Linux passwords ➢ Important files


Modules Details
03 Programming for Hacking
Know how to code in the major languages is a thing that a professional need to know, don't trust in
anyone who says the opposite!

➢C ➢ PHP

➢ C++ ➢ Java

➢ Python ➢ Kotlin

➢ Go ➢ Perl

➢ Ruby ➢ JavaScript
Modules Details
04 Information Gathering
Information Gathering is the first and one of the most important phase in the Penetration Testing, you
need be a expert in this phase to get better options to conclude your hack!

➢ OSINT ➢ Active Information Gathering


➢ Passive Information Gathering ➢ DNS brute force
➢ Whois ➢ Subdomain bruteforce
➢ DNS Recon ➢ Amass
➢ Subdomain enumeration ➢ ReconDOG
➢ Theharvester ➢ Raccoon
➢ Shodan ➢ X-RAY
Modules Details
05 Scanning
Scanning allow us discover daemons and services running in the targets machines. Is a crucial phase to
perform a good test.

➢ Passive Scanning ➢ Active Scan


➢ Shodan scan ➢ Nmap TCP scan
➢ Syn Stealth scan ➢ Nmap UDP Scan
➢ Nmap evasion ➢ Nmap NSE (Nmap Script Engine)
➢ 0trace ➢ Masscan for big network
➢ Smtp scan ➢ NBTScan
➢ Snmp scan
➢ Ssh Scan
Modules Details
06 Password Hacking
Learn how to break passwords and bypass authentication methods using mixed attacks

➢ Wordlists

➢ Rainbow Tables

➢ Authentication Protocols

➢ How to avoid brute force protections

➢ How to bypass 2fa


Modules Details
07 Web Site Hacking
In this module you will learn more about Web Site Hacking the most good paid type of test and one of the
best to hijack a company

➢ Information Disclosure ➢ XFS


➢ Insecure Admin Access ➢ XSS
➢ Directory Listing ➢ XXE
➢ Directory Traversal ➢ Xpath Injection
➢ Abuse Of Functionality ➢ Crlf Injection
➢ Arbitrary File Creation ➢ Ldap Injection
➢ File Inclusion ➢ Sql Injection
➢ Unauthenticated File Upload ➢ Code Execution
➢ Authentication Bypass ➢ Configuration
➢ Default Credentials ➢ Error Handling
➢ Dev Files ➢ Session Fixation
➢ Http Parameter Pollution ➢ Source Code Disclosure
➢ Http Response Splitting ➢ Url Redirection
➢ CSRF ➢ W3 Total Cache
➢ SSRF ➢ Weak Credentials
Modules Details
08 Wireless
Learn how to Hacking Wireless technologies, nowadays wireless things are in everywhere and we can use
this to improve our success rates!

➢ Enable monitor mode on non-native devices


➢ Create EVIL-TWIN AP
➢ Hack WEP
➢ Hack WPA2
➢ Hack WPA3
➢ Hack WPA Enterprise Edition (All versions)
➢ Hack routers users
➢ BlueZ Bluetooth Stack Hacking
Modules Details
09 SDR Hacking
SDR (Software Defined Radio) is pretty good when used by a professional, with SDR we can make a lot of
connections type and we can hack practically everything who use Radio signals.

➢ How to setup Kernel Drivers


➢ Cables
➢ SDR Basic
➢ HackRF
Modules Details
10 Exploitation
Exploitation is more than just run metasploit, pro hackers don't use metasploit, in this module you will
learn how to make exploits by hands using your own tools!

➢ Assembly x86
➢ Assembly x86_64
➢ Assembly ARM
➢ Assembly MIPS
➢ Shellcoding
➢ Buffer Overflow
➢ Format String Bugs
➢ Fuzzing
Modules Details
11 Windows Hacking
Learn how to hack Windows motherfucker machines by many ways, dumbs use Windows and 90% of
people in the earth are dumb so we need know how to hack this!

➢ Bypass windows security systems


➢ How to exploit SMB
➢ How to make 100% undetectable malwares
➢ Write malicious patchs
➢ Hack via Windows OTA like
➢ Bypass Windows defender
➢ Break Windows firewall
➢ Elevate privileges
Modules Details
12 MacOS Hacking
MacOS is the operating system used by dumbs who think they are smart, many business guy use it so is
useful know how to hack it!

➢ Exploit MacOS Updates


➢ Exploit Safari
➢ Bypass MacOS encryption
➢ Write malwares for MacOS
➢ Hook functions in MacOS Kernel
➢ Pivoting
➢ Privilege Escalation
Modules Details
13 Linux Hacking
Nowadays everything is Linux, if you know how to hack Linux machines you are able to hack anything like:
Servers, Routers, Desktop, Mobile...

➢ Bypass Firewalls
➢ Bypass IDS
➢ Bypass IPS
➢ Try break distro packages repository
➢ Write malwares for Linux
➢ Privilege Escalation
➢ Pivoting
Modules Details
14 Android Hacking
Android is the most used Operating System on smartphones, is extremely essential to us know how to
hack Android devices!

➢ How to exploit Android WebView


➢ Hijack users applications
➢ Exploit Apps API
➢ Build Android malwares
➢ RAT on Android
➢ Bypass Android permissions!
Modules Details
15 IOS Hacking
IOS is the Apple Operating System for they smartphones, dumbs think that Iphone is secure but this is a
big mistake!

➢ Hack IOS by SWIFT


➢ Write malwares for IOS
➢ Remote control IOS devices
➢ (The same things who work for MacOS Hacking work for IOS too)
Modules Details
16 Advanced Phishing
In this module you will learn the next level of phishing campaigns, many dumbs on youtube think that
shellphish and hiddeneye is "advanced" phishing tool... come on... only others dumbs will caught in this!

➢ Create and manage phishing campaign in Gophish


➢ Bypass 2FA using EvilGINX2
➢ How to make EvilGINX2 phishlet
➢ Advanced reverse proxy to hack HTTPS and 2FA using modlishka
➢ Write modlishka configuration files
Modules Details
17 IOT Hacking
IoT (Internet of Things) grow up every single day with more "smart" devices in the market, cultures like
"maker" culture create a false perspective of the IoT, we are downgrading our security every day,
nowadays a lot of homes are 100% automated by IoT... so, know how to hack it is more than a need!

➢ Determine the device


➢ Hack IoT protocols
➢ Exploit IoT credentials
➢ Find vulnerabilities in devices
➢ Hijack connections
Modules Details
18 ICS Hacking
ICS (Industrial Control System) Hacking is a topic less widespread in the Penetration Testing but is so
important to Advanced Hackers, ICS are in everywhere, if you can hack industrial machines you can hack
anything, this is the last door to open!

➢ Find PLC devices


➢ Exploit PLC flows
➢ Hack LLC
➢ Hack TCP/IP S7comm
➢ Hack by modbus
➢ Exploit SIXNET RTU's
➢ Hijack PLC sessions
➢ Lateral write
Modules Details
19 Mobile Network Hacking
Mobile network technologies is essential in our world nowadays, mobile networks are pretty hard to hack
but when you do that, you get a big power in your hands. In this module we will learn about mobile
network Penetration Testing.
➢ Build a femtocell
➢ Hack 3G from Android
➢ Hack 4G LTE from Android
➢ Bypass HSS/HLR
➢ Build a NodeB
➢ Build a E-NodeB
➢ Setup your own Cell Phone Operator
➢ Free CALLS
➢ Free SMS
➢ Free Internet
➢ Intercept calls
➢ Clone cellphone ID
➢ Clone cellphone number
Modules Details
20 Hardware Hacking
In this module you will learn how to build your own hardware tools and how to hack non-managed devices
to improve features or bypass something.

➢ Analog eletronic
➢ Digital eletronic
➢ Protocol for hardware communication
➢ EPROM Hacking
➢ EEPROM Hacking
Modules Details
21 Car Hacking
Learn how to hack Cars with advanced techniques and cracking the best auto technologies

➢ Hardwares for hacking Car's


➢ Cables
➢ BUS Protocols
➢ OBD-II Hacking
➢ CAN Hacking
➢ ECU Hacking
➢ Hacking Car by Bluetooth (BlueZ STACK)
Modules Details
22 Artificial Intelligence for Hacking
In Ethical Hacking Artificial Intelligence systems are used by professionals to work together with your
skills and perform ways to hack that a human can't do very well. In this module you will learn about AI for
Penetration Testing.
➢ Supervised Learning
➢ Unsupervised Learning
➢ AI controller from C
➢ AI controller from Python
➢ Classification of data
➢ Attack result learning
➢ Attack result classification
➢ Action by data
Why our Training is better?
Our training is the most advanced training in the market, with our training you not
will learn how to use tools. You will learn how to make your own tools!

You will see the real hacking attacks in real world, you will get a advanced certificate,
learning with us you don’t need learn more nothing because our training is updated
every month.

You only pay one time and can access the training for you entire life with free
updates.

At the end of the training you can work with us, earning money in our Penetration
Testing campaigns
JOIN RIGHT NOW
Become a Advanced Hacker now!

CLICK to JOIN

Advanced Hacking
Training

You might also like