UrbanPro
true
Shahid Khan Kali Linux trainer in Bhopal/>

Shahid Khan

Talaiya Chowki Talaiya, Bhopal, India - 462001.

Contact
Referral Discount: Get ₹ 500 off when you make a payment to start classes. Get started by Booking a Demo.

Details verified of Shahid Khan

Identity

Education

Know how UrbanPro verifies Tutor details

Identity is verified based on matching the details uploaded by the Tutor with government databases.

Overview

I am an ethical hacker, working in this domain since last 4 years. I can teach your system exploitation, Web app exploitation, Exploit development. If you are planning to do OSCP I can teach you every thing to pass the exam.

Languages Spoken

Hindi Mother Tongue (Native)

English Proficient

Education

Rani Durgavati Vishwavidyalaya Pursuing

Master of Science (M.Sc.)

Address

Talaiya Chowki Talaiya, Bhopal, India - 462001

Verified Info

Phone Verified

Email Verified

Report this Profile

Is this listing inaccurate or duplicate? Any other problem?

Please tell us about the problem and we will fix it.

Please describe the problem that you see in this page.

Type the letters as shown below *

Please enter the letters as show below

Teaches

Kali Linux Training

Class Location

Online (video chat via skype, google hangout etc)

I am Willing to Travel

Tutor's Home

Years of Experience in Kali Linux Training

4

Kali Linux Training

Penetration Testing Training with Kali Linux, Advance penetration testing with Kali Linux, Ethical Hacking Using Kali Linux, Kali Linux Certified Professional

Teaching Experience in detail in Kali Linux Training

-------------------- 1. System Hacking | -------------------- --> windows password cracking --> Cracking windows10 password --> hacking basics --> msfvenom and metasploit basics --> hacking windows --> meterpreter basics --> changing the MACE --> keylogging --> bypassing host based firewall --> privilege escalation --> enabling rdp remotely --> getting windows password (phishing) --> getting windows password [winlogon.exe(excellent)] --> add an administrator user to victim pc --> getting the windows Hashes --> viewing each step of victim in gui --> injecting vnc server --> recovering deleted files from victim's pc --> recording victim's sound/voice --> pretending to be other user --> phishing --> Hosts based Phishing --> Persistence --> Resource File --> Railgun (Playing with windows dll's) --> clearing logs --> Finding Open Ports & Services --> exploit software based vulnerabilities --> upgrading shell with meterpreter --> automatic outbound port --> port forwarding --> pivoting --> reverse connect trough pivoting --> post exploitation with wevutil --> getting saved passwords from cache memory --> creating trojan (dropper) --> empire basics --> creating malicious docs --> armitage --> Hacking linux --> embedding malware code into linux package --> hacking android --> badooring original android application --> using beef --> Creating ransomeware --> Creating our custom malware ------------------ 1.A. Hash Attacks | ------------------ --> Identifying Hashes --> cracking the LM Hashes --> gaining access with the NTLM hashes --> accessing rdp with NTLM hashes <=============================================================> ------------------- 2. Network hacking | ------------------- --> live host discovery --> mac address changer --> mac filter bypass --> monitor mode --> airodump-ng --> Deauthentication attack --> arp poisioning --> Viewing Captured Graphics with Driftnet --> file extraction from http traffic --> bypass https --> session hijacking --> DNS Spoofing --> screen capture & injecting keyloggers --> injecting javascript html code --> Hooking cients to beef & Stealing passwords --> capture victim's packets remotely --> creating a fake update --> wpa cracking --> wpa2 hacking <=============================================================> ----------------------- WebApplication hacking | ----------------------- --> 5 Phase of Hacking --> Information gathering -> Robots.txt -> Google Dorks -> IDS/IPS Detection -> Using firebug addon -> DirBuster -> Recon-NG -> Dmitry -> Shodan -> Shodan with metaspoit -> Password Profiling -> Cleaning Password files -> Making dictionary from our Password files -> Generating dictionary with john --> scanning -> OpenVas -> Nessus -> Vega -> Owasp-zap -> Wpscan -> Nikto -> joomscan --> exploiting -> Web parameter tampering -> Path and Information disclosure -> HTML injection -> lfi -> rfi -> file upload -> Public Web shells -> Private Web shells -> nc reverse connect -> reverse connection using python -> code execution -> Input Validation -> sqli -> xss -> exploit xss with beef -> insecure session managment -> bruteforce -> post exploitation  

Reviews

No Reviews yet!

FAQs

1. Which classes do you teach?

I teach Kali Linux Class.

2. Do you provide a demo class?

Yes, I provide a free demo class.

3. How many years of experience do you have?

I have been teaching for 4 years.

Teaches

Kali Linux Training

Class Location

Online (video chat via skype, google hangout etc)

I am Willing to Travel

Tutor's Home

Years of Experience in Kali Linux Training

4

Kali Linux Training

Penetration Testing Training with Kali Linux, Advance penetration testing with Kali Linux, Ethical Hacking Using Kali Linux, Kali Linux Certified Professional

Teaching Experience in detail in Kali Linux Training

-------------------- 1. System Hacking | -------------------- --> windows password cracking --> Cracking windows10 password --> hacking basics --> msfvenom and metasploit basics --> hacking windows --> meterpreter basics --> changing the MACE --> keylogging --> bypassing host based firewall --> privilege escalation --> enabling rdp remotely --> getting windows password (phishing) --> getting windows password [winlogon.exe(excellent)] --> add an administrator user to victim pc --> getting the windows Hashes --> viewing each step of victim in gui --> injecting vnc server --> recovering deleted files from victim's pc --> recording victim's sound/voice --> pretending to be other user --> phishing --> Hosts based Phishing --> Persistence --> Resource File --> Railgun (Playing with windows dll's) --> clearing logs --> Finding Open Ports & Services --> exploit software based vulnerabilities --> upgrading shell with meterpreter --> automatic outbound port --> port forwarding --> pivoting --> reverse connect trough pivoting --> post exploitation with wevutil --> getting saved passwords from cache memory --> creating trojan (dropper) --> empire basics --> creating malicious docs --> armitage --> Hacking linux --> embedding malware code into linux package --> hacking android --> badooring original android application --> using beef --> Creating ransomeware --> Creating our custom malware ------------------ 1.A. Hash Attacks | ------------------ --> Identifying Hashes --> cracking the LM Hashes --> gaining access with the NTLM hashes --> accessing rdp with NTLM hashes <=============================================================> ------------------- 2. Network hacking | ------------------- --> live host discovery --> mac address changer --> mac filter bypass --> monitor mode --> airodump-ng --> Deauthentication attack --> arp poisioning --> Viewing Captured Graphics with Driftnet --> file extraction from http traffic --> bypass https --> session hijacking --> DNS Spoofing --> screen capture & injecting keyloggers --> injecting javascript html code --> Hooking cients to beef & Stealing passwords --> capture victim's packets remotely --> creating a fake update --> wpa cracking --> wpa2 hacking <=============================================================> ----------------------- WebApplication hacking | ----------------------- --> 5 Phase of Hacking --> Information gathering -> Robots.txt -> Google Dorks -> IDS/IPS Detection -> Using firebug addon -> DirBuster -> Recon-NG -> Dmitry -> Shodan -> Shodan with metaspoit -> Password Profiling -> Cleaning Password files -> Making dictionary from our Password files -> Generating dictionary with john --> scanning -> OpenVas -> Nessus -> Vega -> Owasp-zap -> Wpscan -> Nikto -> joomscan --> exploiting -> Web parameter tampering -> Path and Information disclosure -> HTML injection -> lfi -> rfi -> file upload -> Public Web shells -> Private Web shells -> nc reverse connect -> reverse connection using python -> code execution -> Input Validation -> sqli -> xss -> exploit xss with beef -> insecure session managment -> bruteforce -> post exploitation  

No Reviews yet!

Shahid Khan conducts classes in Kali Linux. Shahid is located in Talaiya Chowki Talaiya, Bhopal. Shahid takes Online Classes- via online medium. He has 4 years of teaching experience . Shahid is pursuing Master of Science (M.Sc.) from Rani Durgavati Vishwavidyalaya. He is well versed in Hindi and English.

X

Share this Profile

Recommended Profiles

Kshitij Tripathi

Kshitij Tripathi photo Hastsal Shiva Enclave, Delhi

Rahul Sain

Rahul Sain photo Shyam Nagar, Jaipur

Satya

Satya photo Meerut Road, Ghaziabad

Manika

Manika photo Marathahalli, Bangalore

Devil Raj

Devil Raj photo Hasmathpet, Hyderabad

Reply to 's review

Enter your reply*

1500/1500

Please enter your reply

Your reply should contain a minimum of 10 characters

Your reply has been successfully submitted.

Certified

The Certified badge indicates that the Tutor has received good amount of positive feedback from Students.

Different batches available for this Course

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more