This repository contains seven beginner-level projects focused on ethical hacking and cybersecurity. Each project provides hands-on experience with essential techniques for network scanning, web application testing, password cracking, honeypot deployment, Wi-Fi auditing, phishing attack simulation, and SQL injection exploitation.
Learn how to use Nmap to discover devices and services running on a local network. This project covers basic network scans, identifying open ports, and gathering information about network devices.
- Key Topics: Network Scanning, Enumeration, Nmap
- Tools: Kali Linux, Nmap
Use various tools to perform penetration testing on OWASP Juice Shop, a deliberately insecure web application. This project covers identifying and exploiting web vulnerabilities.
- Key Topics: Web Application Testing, OWASP Juice Shop, Vulnerability Exploitation
- Tools: Kali Linux, OWASP Juice Shop, Burp Suite
Learn how to use John the Ripper to crack password hashes. This project covers basic password cracking, using custom wordlists, and cracking shadow file hashes.
- Key Topics: Password Cracking, John the Ripper, Hash Analysis
- Tools: Kali Linux, John the Ripper
Deploy and monitor a honeypot using Cowrie. This project covers setting up Cowrie, simulating attacks, monitoring logs, and analyzing captured data.
- Key Topics: Honeypot Deployment, Intrusion Monitoring, Cowrie
- Tools: Kali Linux, Cowrie, Docker, Splunk
Learn how to audit and attack Wi-Fi networks using Aircrack-ng. This project covers setting up a Wi-Fi adapter in monitor mode, capturing handshake packets, and cracking Wi-Fi passwords.
- Key Topics: Wi-Fi Auditing, Packet Capture, Password Cracking
- Tools: Kali Linux, Aircrack-ng, Wi-Fi Adapter
Simulate phishing attacks and learn how to defend against them. This project covers crafting phishing emails, launching phishing campaigns, and implementing anti-phishing measures.
- Key Topics: Phishing Simulation, Social Engineering, Defense Strategies
- Tools: Kali Linux, Gophish
Identify and exploit SQL injection vulnerabilities using DVWA. This project covers SQL injection techniques, using SQLMap for automated exploitation, and securing databases.
- Key Topics: SQL Injection, Database Security, DVWA
- Tools: Kali Linux, DVWA, SQLMap
-
Clone the Repository:
git clone https://github.com/yourusername/ethical-hacking-projects-for-beginners.git cd ethical-hacking-projects-for-beginners
-
Navigate to Each Project Directory: Each project has its own markdown file with detailed instructions. For example:
cd project-1-scanning-and-enumerating-a-local-network-with-nmap
-
Follow the Instructions: Open the corresponding markdown file and follow the step-by-step instructions to complete the exercises.
Hi, I'm Rajneesh Gupta, security consultant, coach, and two-times best-selling author. I share security projects to help people excel in the security domain.
- LinkedIn: Rajneesh Gupta
- Twitter: @rajneeshcyber
- YouTube Channel: Rajneesh Gupta
Feel free to connect with me on any of these platforms!
For professional services and consultations, please visit my company website at Hax Security.
Thank you for visiting my GitHub page!