Course Curriculum
- 16 sections
- 150 lectures
- 00:00:00 total length
-
Introduction to the course
00:05:00 -
Virtual box installation
00:16:00 -
Kali linux installation
00:14:00 -
Enabling full screen
00:18:00
-
Basic commands part 1
00:10:00 -
Basic commands part 2
00:21:00 -
Basic commands part 3
00:13:00
-
Changing ip address and wireless adapter setup
00:05:00 -
Creating a bootable Kali USB drive
00:05:00 -
Essential networking terms
00:10:00 -
Essential hacking terms
00:18:00 -
Additional kali tools to install
00:09:00 -
Changing our MAC address with mac changer
00:06:00
-
Google hacking
00:13:00 -
Nikto basics
00:11:00 -
Whois tools
00:07:00 -
Email harvesting
00:06:00 -
Shodan
00:10:00 -
Zone transfer with Dig
00:08:00
-
Installing Metasploitable
00:07:00 -
Nmap part 1
00:16:00 -
Nmap part 2
00:12:00 -
Nmap part 3
00:12:00 -
Zen map
00:08:00 -
TCP scans
00:16:00 -
Nmap by passing defenses
00:17:00 -
Nmap scripts part 1
00:09:00 -
Nmap scripts part 2
00:14:00
-
Installing OWASP
00:08:00 -
HTTP request
00:10:00 -
HTTP response
00:10:00 -
Burpsuite configuration
00:13:00 -
Editing packets in Burpsuite
00:12:00 -
Whatweb and Dirb
00:10:00 -
Password recovery attack
00:16:00 -
Burpsuite login bruteforce
00:11:00 -
Hydra login bruteforce
00:09:00 -
Session fixation
00:14:00 -
Injection attacks
00:06:00 -
Simple command injection
00:11:00 -
Exploiting command injection vulnerability
00:08:00 -
Finding blind command injection
00:14:00 -
SQL basics
00:10:00 -
Manual SQL injection part 1
00:13:00 -
Manual SQL injection part 2
00:21:00 -
SQL map basics
00:17:00 -
XML injection
00:16:00 -
Installing XCAT and preventing injection attacks
00:06:00 -
Reflected XSS
00:11:00 -
Stored XSS
00:13:00 -
Changing HTML code with XSS
00:07:00 -
XSSer and XSS sniper
00:14:00
-
Wireless attacking theory
00:11:00 -
Enabling monitor mode
00:05:00 -
Capturing handshake with airodump
00:15:00 -
Rockyou.txt
00:14:00 -
Cracking with aircrack
00:16:00 -
Cracking with hashcat
00:15:00 -
Creating password lists with crunch
00:18:00 -
Creating password lists with cup
00:07:00 -
Rainbow tables part 1
00:17:00 -
Rainbow tables part 2
00:06:00 -
Installing fluxion
00:06:00 -
Finding and cracking hidden networks
00:08:00 -
Preventing wireless attacks
00:08:00
-
ARP protocol basics
00:10:00 -
Man in the middle attack theory
00:07:00 -
Installing MITMf
00:07:00 -
Manual ARP spoofing
00:13:00 -
Problems while installing MITMf
00:06:00 -
HTTP traffic sniffing
00:08:00 -
DNS spoofing and HTTPS password sniffing
00:24:00 -
Hooking browser with BEEF
00:16:00 -
Screenshotting targets browser
00:11:00 -
Cloning any webpage
00:09:00 -
Ettercap basics
00:07:00
-
MFS console environment
00:16:00 -
Metasploit modules explained
00:12:00 -
Bruteforcing SSH with Metasploit
00:15:00 -
Attacking tomcat with metasploit
00:09:00 -
Getting meterpreter with command injection
00:25:00 -
PHP code injection
00:06:00 -
Metasploitable exploits
00:07:00 -
Wine installation
00:12:00 -
Creating windows payloads with Msfvenom
00:10:00 -
Encoders and Hex editors
00:19:00 -
Windows 10 meterpreter shell
00:12:00 -
Meterpreter environment
00:11:00 -
Windows 10 privilege escalation
00:11:00 -
Preventing privilege escalation
00:06:00 -
Post exploitation modules
00:14:00 -
Getting Meterpreter over Internet with port forwarding
00:11:00 -
Eternalblue exploit
00:20:00 -
Persistence module
00:13:00 -
Hacking over the internet with Ngrok
00:10:00 -
Android device hacking with venom
00:10:00 -
The real hacking begins now!
00:02:00
-
Variables
00:14:00 -
Raw input
00:11:00 -
If else statements
00:10:00 -
For loops
00:07:00 -
While loops
00:08:00 -
Python lists
00:08:00 -
Functions
00:15:00 -
Classes
00:10:00 -
Importing libraries
00:07:00 -
Files in python
00:12:00 -
Try and except the rule
00:05:00
-
Theory behind reverse shells
00:07:00 -
Simple server code
00:13:00 -
Connection with reverse shell
00:07:00 -
Sending and receiving messages
00:11:00 -
Sending messages with while true loop
00:08:00 -
Executing commands on target system
00:10:00 -
Fixing backdoor bugs and adding functions
00:20:00 -
First test using our backdoor
00:18:00 -
Trying to connect every 20 seconds
00:12:00 -
Creating persistence part 1
00:06:00 -
Creating persistence part 2
00:17:00 -
Changing directory
00:12:00 -
Uploading and downloading files
00:22:00 -
Downloading files from the internet
00:23:00 -
Starting programs using our backdoor
00:07:00 -
Capturing screenshots on the target PC
00:19:00 -
Embedding backdoor in an image part 1
00:13:00 -
Embedding backdoor in an image part 2
00:09:00 -
Checking for administrator privileges
00:12:00 -
Adding help option
00:09:00
-
Importing Pynput
00:10:00 -
Simple keylogger
00:10:00 -
Adding report function
00:11:00 -
Writing key strokes to a file
00:14:00 -
Adding the keylogger to our reverse shell part 1
00:23:00 -
Adding the keylogger to our reverse shell part 2
00:08:00 -
Final project test
00:14:00
-
Printing banner
00:11:00 -
Adding available options
00:11:00 -
Starting threads for bruteforce
00:08:00 -
Writing function to run the attack
00:11:00 -
Bruteforcing router login
00:10:00 -
Bypassing antivirus with your future programs
00:14:00 -
Sending malware with spoofed email
00:15:00
-
What will you learn in this section?
00:03:00 -
Why is ethical hacking a valuable skill?
00:23:00 -
What is the best ethical hacking certification?
00:17:00 -
Tips for getting your first job as an ethical hacker
00:18:00 -
How I started my career as an ethical hacker
00:14:00 -
How to price your work
00:11:00
-
Bonuses. Enjoy the Benefits
01:05:00
-
Assignment – Ethical Hacking with Kali Linux
00:00:00