- Notifications
You must be signed in to change notification settings - Fork98
0xrajneesh/Ethical-Hacking-Projects-for-beginners
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
This repository contains seven beginner-level projects focused on ethical hacking and cybersecurity. Each project provides hands-on experience with essential techniques for network scanning, web application testing, password cracking, honeypot deployment, Wi-Fi auditing, phishing attack simulation, and SQL injection exploitation.
Learn how to use Nmap to discover devices and services running on a local network. This project covers basic network scans, identifying open ports, and gathering information about network devices.
- Key Topics: Network Scanning, Enumeration, Nmap
- Tools: Kali Linux, Nmap
Use various tools to perform penetration testing on OWASP Juice Shop, a deliberately insecure web application. This project covers identifying and exploiting web vulnerabilities.
- Key Topics: Web Application Testing, OWASP Juice Shop, Vulnerability Exploitation
- Tools: Kali Linux, OWASP Juice Shop, Burp Suite
Learn how to use John the Ripper to crack password hashes. This project covers basic password cracking, using custom wordlists, and cracking shadow file hashes.
- Key Topics: Password Cracking, John the Ripper, Hash Analysis
- Tools: Kali Linux, John the Ripper
Deploy and monitor a honeypot using Cowrie. This project covers setting up Cowrie, simulating attacks, monitoring logs, and analyzing captured data.
- Key Topics: Honeypot Deployment, Intrusion Monitoring, Cowrie
- Tools: Kali Linux, Cowrie, Docker, Splunk
Learn how to audit and attack Wi-Fi networks using Aircrack-ng. This project covers setting up a Wi-Fi adapter in monitor mode, capturing handshake packets, and cracking Wi-Fi passwords.
- Key Topics: Wi-Fi Auditing, Packet Capture, Password Cracking
- Tools: Kali Linux, Aircrack-ng, Wi-Fi Adapter
Simulate phishing attacks and learn how to defend against them. This project covers crafting phishing emails, launching phishing campaigns, and implementing anti-phishing measures.
- Key Topics: Phishing Simulation, Social Engineering, Defense Strategies
- Tools: Kali Linux, Gophish
Identify and exploit SQL injection vulnerabilities using DVWA. This project covers SQL injection techniques, using SQLMap for automated exploitation, and securing databases.
- Key Topics: SQL Injection, Database Security, DVWA
- Tools: Kali Linux, DVWA, SQLMap
Clone the Repository:
git clone https://github.com/yourusername/ethical-hacking-projects-for-beginners.gitcd ethical-hacking-projects-for-beginnersNavigate to Each Project Directory:Each project has its own markdown file with detailed instructions. For example:
cd project-1-scanning-and-enumerating-a-local-network-with-nmapFollow the Instructions:Open the corresponding markdown file and follow the step-by-step instructions to complete the exercises.
Hi, I'm Rajneesh Gupta, security consultant, coach, and two-times best-selling author. I share security projects to help people excel in the security domain.
- LinkedIn:Rajneesh Gupta
- Twitter:@rajneeshcyber
- YouTube Channel:Rajneesh Gupta
Feel free to connect with me on any of these platforms!
For professional services and consultations, please visit my company website atHax Security.
Thank you for visiting my GitHub page!
About
Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing, phishing, and SQL injection.
Topics
Resources
Uh oh!
There was an error while loading.Please reload this page.