Get Started

Basics of Networking

Learn about IP addresses, public/private/dynamic IPs, IPv4 vs IPv6, ports, services, TCP/IP, UDP, OSI model, subnetting, protocols, port forwarding, and how websites and firewalls work.

Nmap

Setup lab for Nmap pentesting, learn how Nmap works, its uses, and how to scan and find vulnerabilities. Exploit FTP, Telnet, HTTP, MySQL, VNC, SMB, Tomcat, and more.

WireShark Packet Analysis

Learn how to use WireShark for analyzing network traffic. Capture and inspect packets in real-time, find vulnerabilities in network communications, and troubleshoot issues. Understand how different protocols work by examining packet data, analyzing it in-depth, and using WireShark’s filtering features to focus on important information

MITM & Wireless Attacks

Understand MITM attacks, client-based and clientless attacks, use tools like Bettercap and Mitmweb, perform DNS spoofing, phishing, and WiFi hacking using ESP32.

WiFi Hacking

Learn various methods to hack WiFi, capture handshake files using Airodump-ng, Fluxion, and Bettercap, and crack them using Aircrack-ng and Hashcat.

DVWA

Setup DVWA lab, perform brute force attacks, command injection, CSRF, file inclusion, SQL injection, XSS, and more.

OWASP Top 10 Vulnerabilities

Understand the most critical security risks as defined by OWASP. Learn about the top 10 vulnerabilities, including Injection, Broken Authentication, Sensitive Data Exposure, and others. Explore real-world examples and how to mitigate these vulnerabilities.

Metasploit Framework

Dive deep into the Metasploit Framework for penetration testing. Learn how to use Metasploit for vulnerability scanning, exploit development, payload creation, and post-exploitation techniques. Gain hands-on experience with real-world exploit scenarios.

Windows Hacking

Hack Windows in private and over WAN, use reverse shells, RATs, ransomware, Redline Stealer, keyloggers, and more.

Android Hacking

Build Android payloads, bypass Play Protect, inject Crax RAT, setup Anubis and COVID19 botnets, and more.

Social Engineering

Learn phishing attacks, develop custom phishing pages, track locations, compromise cameras, perform QRL jacking, and more.

Burp Suite

Introduction to Burp Suite, configure proxy, understand target tab, use decoder, comparer, intruder, repeater, and perform brute force, SQL injection, and command injection attacks.

Hacking Devices Development

Learn about HID devices like Digispark and CJMCU, ESP32/ESP8266 for WiFi jamming, Bluetooth jamming, and portable Linux devices.

Hacking with Artificial Intelligence

Explore the role of Artificial Intelligence in modern hacking. Learn how AI can be used for vulnerability discovery, automating attacks, enhancing social engineering tactics, and detecting anomalies in network traffic. Gain hands-on experience with AI-powered hacking tools and techniques.

Shodan Vulnerability Search

Learn how to use Shodan to search for vulnerable systems and devices. Understand how to identify open ports, weak services, and potential targets for penetration testing. Use advanced filters to locate specific vulnerabilities and perform ethical hacking tests on discovered systems.

What Yo'll learn

Networking Fundamentals
  • What is IP Address and Types of IP Address
  • What is Public, Private and Dynamic IP
  • What is Port and Services
  • How TCP, IP & UDP Works
  • What is OSI Model
  • Basics of Networking
  • Subnetting
  • What are Protocols
Infrastructure & Setup
  • How Websites Work
  • How Firewalls Work
  • Linux Basics Commands
  • What is port forwarding explanation & practical
  • Port forwarding on router, cloud, and other platforms
  • Lab setup and installing Kali Linux
  • Cloud setup - how to setup Kali Linux on cloud SSH
  • Track anyone's location & setup Cloudflare
Web & Mobile Attacks
  • Hacking social media accounts using phishing attack
  • Create own phishing pages using HTML-CSS-JavaScript
  • Hack Mobile camera in private & over the internet using URL
  • What is OSINT track your victim
  • QRL jacking attack hack WhatsApp
  • Man in the middle attack
  • Man in the middle attack through fake access point
  • DNS spoofing attack
WiFi & Browser Attacks
  • Email spoofing
  • Evil-twin attack
  • WiFi jamming device
  • WiFi password cracking
  • WiFi jamming deauthentication flooding attack
  • BITB attack - browser in the browser attack
  • BeEF (browser exploitation framework)
  • HID attack - human interface device attack
Windows Exploitation
  • Bluetooth attack
  • Hack Windows without touching exploiting EternalBlue vulnerability
  • Get Windows initial access with reverse shell practical & explanation
  • Bypass Windows Defender & hack system with reverse shell
  • What is remote access trojan & hack system practical & explanation
  • Bypass Windows Defender create your own spyder using PowerShell & Python
  • PowerShell Empire command and control
  • What is ransomware build + use
Advanced Techniques
  • Android hacking & bypass Play Protect security practical & explanation
  • What is denial of service attack practical & explanation
  • Create your own keylogger using Python & spy on your victim
  • What is HTML smuggling advanced malware delivery method
  • What is steganography practical & explanation
  • How to access dark web

About US

teacher 1

Abdul Ahad

Founder of Just Hacked On.

As an Ethical Hacker with over three years of experience in cybersecurity and exploitation techniques, I am the founder of Just Hacked On. I specialize in red teaming, employing offensive security tactics to simulate real-world attacks. My focus is on exposing vulnerabilities and strengthening defenses to enhance overall cybersecurity resilience in Pakistan

teacher 2

Muhammad Hassan

CEO of Just Hacked On.

Ethical hacker, and skilled social engineer with a strong passion for cybersecurity. Alongside my professional work, I continually learn and stay updated with the latest hacking techniques and cybersecurity trends to enhance my skills and knowledge.

teacher 3

Muhammad Haroon

Security Researcher at Just Hacked On.

Ethical hacker specializing in identifying vulnerabilities and securing systems against cyber threats. I'm dedicated to helping individuals and organizations strengthen their defenses in today's evolving digital landscape.

Ghost ESP Official Merchandise

LIFETIME MENTORSHIP & SUPPORT SYSTEM FOR STUDENTS

Join our exclusive mentorship program for just PKR 15,000 and gain hands-on skills in ethical hacking with lifetime access to resources, tools, and expert support.

Daily Q&A Sessions
Access to Resources and Tools
WhatsApp Support Groups
Enroll Now