4.25 out of 5
4.25
73 reviews on Udemy

Unrevealed Secret Dos commands for Ethical Hackers

Learn to Perform Advanced level Operations on the System without the use of any third party software in 2019.
Instructor:
Shinde Prashant
2,993 students enrolled
English [Auto-generated]
After this course students will able to perform the Advanced Level Operations on the System without use of any kind of third party software . This is the exciting & Fun part of the Course .

☸ Welcome to ” Unrevealed Secret Dos Commands for Ethical Hackers  !” ☸

Get Enroll to the most exciting course today Before the Course Price raises to $195 , 2500+ Happy students were already enrolled .

This course is going to reveal the secret DOS commands which can be used to perform the Advanced Operations on the System . 

From this course students will learn the following concepts :- 

  •  Learn to manage known & unknown processes .
  •  Learn to Manage hard disk to improve Performance .
  •  Trick to Recover corrupted Hard Disk / Pen drives / Memory Card .
  •  Learn to use command redirection Operators .
  • Learn to Hide files / folders in such a way that no one can find in windows .
  • Learn to gather system information about local as well as remote Machines. 
  • Learn to  Monitor the known & unknown Active Internet services in Depth
  •  Administering the Network services .
  •  Interacting with windows Registery .
  •  Interacting with Windows NT service controller and services .
  •  Learn to using the task schedulder .
  •  Learn to access PC Remotely .
  •  Auditing your PC for Computer viruses and Hacker Attacks .

Let's do some hack with DOS Window .

1
Introduction
  1. In this section , Let's do some Basic hack with DOS Window .
2
Join the facebook group and Ask us any problem regarding the course !
3
Basic quiz on DOS

Learn to secretly Hide files / folders from Command line .

1
SECRETLY HIDE FILES AND FOLDERS FROM COMMAND LINE .

At the end of this section , student will able to hide their files and folders from unauthorised users .and if such unauthorised uers trying to find these files and folders then they can not find in windows , with the help of show hidden files and folder option .

2
Secretly hide files / folders

PROCESS MANAGEMENT

1
PROCESS MANAGEMENT

At the end of this section students will learn to manage the different processes from command line .

2
Process management

DISK MANAGEMENT

1
DISK MANAGEMENT

At the end of this section student will able to manage their hard disk to increase the performance . for this we will see various commands.

2
Disk management

RECOVERING CORRUPTED HARD DISK / MEMORY CARD / PAIN DRIVE VIA COMMAND LINE .

1
RECOVERING CORRUPTED HARD DISK , MEMORY CARD , PAIN DRIVE VIA COMMAND LINE

At the end of this section students will able to recover their corrupted hard disk , memory card or paindrive with the help of command line .

2
Recovering corrupted Harddisk

PLAYING WITH COMMAND REDIRECTION OPERATORS .

1
LEARN TO USE COMMAND REDIRECTION OPERATORS .

At the end of this section , student will able to learn how to use command redirection operators , while dealing with dos commands . The command redirection operators helps students to use more than one command at a time to perform various tasks.

2
Command redirection operators

INTERACTING WITH SYSTEM .

1
INTERACTING WITH SYSTEM .

At the end of this section students will able to gather the information about the local as well as remote machines with the help of command line . These commands are very useful for hackers , to gather the system information without any external software .

2
Interacting with system

MONITORING THE KNOWN & UNKNOWN ACTIVE INTERNET SERVICES .

1
MONITORING THE ACTIVE INTERNET SERVICES

At the end of this section students will able to monitor the known and unknown Internet services that are running on the system .They will also able to find what files they are using and what device drivers they are using etc .

2
Monitoring the Active internet services

FINDING & TROUBLESHOOTING IP ADDRESSES.

1
FINDING & TROUBLESHOOTING IP ADDRESSES.

At the end of this section , students will able to find their own ip address from command line . They can also find dns server ip . Also perform some operations to increase internet speed with the help of command line .

2
Finding & troubleshooting ip addresses

ADMINISTERING THE NETWORK SERVICES .

1
ADMINISTERING THE NETWORK SERVICES .

At the end of this section students will able to interact with network . They are able interact with DNS . They are able to Interact with firewall .

2
Administering the Network services

INTERACTING WITH WINDOWS REGISTERY.

1
INTERACTING WITH WINDOWS REGISTERY.

At the end of this section student will able to interact with windows registery via command line .

2
Windows Registery


USING TASK SCHEDULDER .

1
USING TASK SCHEDULDER .

At the end of this section students will able to use task schedulder to perform different tasks.

2
Task schedulder

REMOTELY CONTROL YOUR PC .

1
REMOTELY CONTROL YOUR PC .

At the end of this section students will learn how to control their pc remotely .

2
Remotely control your pc

AUDITING YOUR PC FOR VIRUSES AND HACKER'S ATTACK .

1
AUDITING YOUR PC FOR VIRUSES AND HACKER'S ATTACK .

At the end of this section students will able to Audit their PC whether it is hacked by some hacker or infected by some kind of virus .

LET'S PLAY WITH DEBUG .

1
LET'S PLAY WITH DEBUG .

At the end of this section students will able to interact with DOS Debug , with the help of which they can write assemly coad , save that coad to a file . Test system port's . Able to interact with graphics card and bios date .

2
Debug


INTERACTING WITH WINDOWS NT SERVICE CONTROLLER & SERVICES .

1
INTERACTING WITH WINDOWS NT SERVICE CONTROLLER & SERVICES .

At the end of this section student will ablel to interact with windows NT service controller and services with the help of command line .

2
Windows NT Service controller & services

ADVANCED FILES / FOLDERS & FILE SYSTEM MANAGEMENT .

1
ADVANCED FILES / FOLDERS & FILE SYSTEM MANAGEMENT .

At the end of this section students will able to encrypt & decrypt files and folders with the help of command line to protect data against unauthorised users . They will also able to wipeout hard disk or pain drive or memory card to prevent your confidential data , being recovered with the help of some recovery software by some unauhorised users.

2
ADVANCED FILES / FOLDERS & FILE MANAGEMENT .

THIS LECTURE CONTAINS THE REST OF THE SUBCOMMANDS FROM THE PREVIOUS VIDEO .

3
ADVANCED FILES / FOLDERS & FILE SYSTEM MANAGEMENT .

THIS LECTURE EXPLAINS THE COMMANDS & SUBCOMMANDS ABOUT MANAGING THE HARD DISK & FILE SYSTEM .

4
ADVANCED FILES / FOLDERS MANAGEMENT


MISCELLANEOUS COMMANDS .

1
MISCELLANEOUS COMMANDS .

At the end of this section students will get the Introductions to more useful and advanced commands .

2
Miscellaneous commands

Bonus gift !

1
Discount coupons for other courses !
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.3
4.3 out of 5
73 Ratings

Detailed Rating

Stars 5
33
Stars 4
19
Stars 3
16
Stars 2
1
Stars 1
4
c552311bfd1273cf6b60a5ecbdfcadd2
30-Day Money-Back Guarantee

Includes

3 hours on-demand video
1 article
Full lifetime access
Access on mobile and TV
Certificate of Completion