Skip to content

zeroSlick/Ethical-Hacking-Projects-for-beginners

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ethical Hacking Projects for Beginners

Overview

This repository contains seven beginner-level projects focused on ethical hacking and cybersecurity. Each project provides hands-on experience with essential techniques for network scanning, web application testing, password cracking, honeypot deployment, Wi-Fi auditing, phishing attack simulation, and SQL injection exploitation.

Projects

Learn how to use Nmap to discover devices and services running on a local network. This project covers basic network scans, identifying open ports, and gathering information about network devices.

  • Key Topics: Network Scanning, Enumeration, Nmap
  • Tools: Kali Linux, Nmap

Use various tools to perform penetration testing on OWASP Juice Shop, a deliberately insecure web application. This project covers identifying and exploiting web vulnerabilities.

  • Key Topics: Web Application Testing, OWASP Juice Shop, Vulnerability Exploitation
  • Tools: Kali Linux, OWASP Juice Shop, Burp Suite

Learn how to use John the Ripper to crack password hashes. This project covers basic password cracking, using custom wordlists, and cracking shadow file hashes.

  • Key Topics: Password Cracking, John the Ripper, Hash Analysis
  • Tools: Kali Linux, John the Ripper

Deploy and monitor a honeypot using Cowrie. This project covers setting up Cowrie, simulating attacks, monitoring logs, and analyzing captured data.

  • Key Topics: Honeypot Deployment, Intrusion Monitoring, Cowrie
  • Tools: Kali Linux, Cowrie, Docker, Splunk

Learn how to audit and attack Wi-Fi networks using Aircrack-ng. This project covers setting up a Wi-Fi adapter in monitor mode, capturing handshake packets, and cracking Wi-Fi passwords.

  • Key Topics: Wi-Fi Auditing, Packet Capture, Password Cracking
  • Tools: Kali Linux, Aircrack-ng, Wi-Fi Adapter

Simulate phishing attacks and learn how to defend against them. This project covers crafting phishing emails, launching phishing campaigns, and implementing anti-phishing measures.

  • Key Topics: Phishing Simulation, Social Engineering, Defense Strategies
  • Tools: Kali Linux, Gophish

Identify and exploit SQL injection vulnerabilities using DVWA. This project covers SQL injection techniques, using SQLMap for automated exploitation, and securing databases.

  • Key Topics: SQL Injection, Database Security, DVWA
  • Tools: Kali Linux, DVWA, SQLMap

Getting Started

  1. Clone the Repository:

    git clone https://github.com/yourusername/ethical-hacking-projects-for-beginners.git
    cd ethical-hacking-projects-for-beginners
  2. Navigate to Each Project Directory: Each project has its own markdown file with detailed instructions. For example:

    cd project-1-scanning-and-enumerating-a-local-network-with-nmap
  3. Follow the Instructions: Open the corresponding markdown file and follow the step-by-step instructions to complete the exercises.

About Me

📚 Currently learning Cybersecurity Fundamentals, Linux, and Networking Basics 💻 Comfortable with Python, C++, HTML/CSS, and GitHub 🚀 Leading Null Community BVDU and organizing workshops/events ✨ Goal: Build a strong foundation in cybersecurity & practical skills

Connect with Me

Thank you for visiting my GitHub page!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published