Course Curriculum
- 16 sections
- 150 lectures
- 1 day, 5 hours total length
-
Introduction to the course00:05:00
-
Virtual box installation00:16:00
-
Kali linux installation00:14:00
-
Enabling full screen00:18:00
-
Basic commands part 100:10:00
-
Basic commands part 200:21:00
-
Basic commands part 300:13:00
-
Changing ip address and wireless adapter setup00:05:00
-
Creating a bootable Kali USB drive00:05:00
-
Essential networking terms00:10:00
-
Essential hacking terms00:18:00
-
Additional kali tools to install00:09:00
-
Changing our MAC address with mac changer00:06:00
-
Google hacking00:13:00
-
Nikto basics00:11:00
-
Whois tools00:07:00
-
Email harvesting00:06:00
-
Shodan00:10:00
-
Zone transfer with Dig00:08:00
-
Installing Metasploitable00:07:00
-
Nmap part 100:16:00
-
Nmap part 200:12:00
-
Nmap part 300:12:00
-
Zen map00:08:00
-
TCP scans00:16:00
-
Nmap by passing defenses00:17:00
-
Nmap scripts part 100:09:00
-
Nmap scripts part 200:14:00
-
Installing OWASP00:08:00
-
HTTP request00:10:00
-
HTTP response00:10:00
-
Burpsuite configuration00:13:00
-
Editing packets in Burpsuite00:12:00
-
Whatweb and Dirb00:10:00
-
Password recovery attack00:16:00
-
Burpsuite login bruteforce00:11:00
-
Hydra login bruteforce00:09:00
-
Session fixation00:14:00
-
Injection attacks00:06:00
-
Simple command injection00:11:00
-
Exploiting command injection vulnerability00:08:00
-
Finding blind command injection00:14:00
-
SQL basics00:10:00
-
Manual SQL injection part 100:13:00
-
Manual SQL injection part 200:21:00
-
SQL map basics00:17:00
-
XML injection00:16:00
-
Installing XCAT and preventing injection attacks00:06:00
-
Reflected XSS00:11:00
-
Stored XSS00:13:00
-
Changing HTML code with XSS00:07:00
-
XSSer and XSS sniper00:14:00
-
Wireless attacking theory00:11:00
-
Enabling monitor mode00:05:00
-
Capturing handshake with airodump00:15:00
-
Rockyou.txt00:14:00
-
Cracking with aircrack00:16:00
-
Cracking with hashcat00:15:00
-
Creating password lists with crunch00:18:00
-
Creating password lists with cup00:07:00
-
Rainbow tables part 100:17:00
-
Rainbow tables part 200:06:00
-
Installing fluxion00:06:00
-
Finding and cracking hidden networks00:08:00
-
Preventing wireless attacks00:08:00
-
ARP protocol basics00:10:00
-
Man in the middle attack theory00:07:00
-
Installing MITMf00:07:00
-
Manual ARP spoofing00:13:00
-
Problems while installing MITMf00:06:00
-
HTTP traffic sniffing00:08:00
-
DNS spoofing and HTTPS password sniffing00:24:00
-
Hooking browser with BEEF00:16:00
-
Screenshotting targets browser00:11:00
-
Cloning any webpage00:09:00
-
Ettercap basics00:07:00
-
MFS console environment00:16:00
-
Metasploit modules explained00:12:00
-
Bruteforcing SSH with Metasploit00:15:00
-
Attacking tomcat with metasploit00:09:00
-
Getting meterpreter with command injection00:25:00
-
PHP code injection00:06:00
-
Metasploitable exploits00:07:00
-
Wine installation00:12:00
-
Creating windows payloads with Msfvenom00:10:00
-
Encoders and Hex editors00:19:00
-
Windows 10 meterpreter shell00:12:00
-
Meterpreter environment00:11:00
-
Windows 10 privilege escalation00:11:00
-
Preventing privilege escalation00:06:00
-
Post exploitation modules00:14:00
-
Getting Meterpreter over Internet with port forwarding00:11:00
-
Eternalblue exploit00:20:00
-
Persistence module00:13:00
-
Hacking over the internet with Ngrok00:10:00
-
Android device hacking with venom00:10:00
-
The real hacking begins now!00:02:00
-
Variables00:14:00
-
Raw input00:11:00
-
If else statements00:10:00
-
For loops00:07:00
-
While loops00:08:00
-
Python lists00:08:00
-
Functions00:15:00
-
Classes00:10:00
-
Importing libraries00:07:00
-
Files in python00:12:00
-
Try and except the rule00:05:00
-
Theory behind reverse shells00:07:00
-
Simple server code00:13:00
-
Connection with reverse shell00:07:00
-
Sending and receiving messages00:11:00
-
Sending messages with while true loop00:08:00
-
Executing commands on target system00:10:00
-
Fixing backdoor bugs and adding functions00:20:00
-
First test using our backdoor00:18:00
-
Trying to connect every 20 seconds00:12:00
-
Creating persistence part 100:06:00
-
Creating persistence part 200:17:00
-
Changing directory00:12:00
-
Uploading and downloading files00:22:00
-
Downloading files from the internet00:23:00
-
Starting programs using our backdoor00:07:00
-
Capturing screenshots on the target PC00:19:00
-
Embedding backdoor in an image part 100:13:00
-
Embedding backdoor in an image part 200:09:00
-
Checking for administrator privileges00:12:00
-
Adding help option00:09:00
-
Importing Pynput00:10:00
-
Simple keylogger00:10:00
-
Adding report function00:11:00
-
Writing key strokes to a file00:14:00
-
Adding the keylogger to our reverse shell part 100:23:00
-
Adding the keylogger to our reverse shell part 200:08:00
-
Final project test00:14:00
-
Printing banner00:11:00
-
Adding available options00:11:00
-
Starting threads for bruteforce00:08:00
-
Writing function to run the attack00:11:00
-
Bruteforcing router login00:10:00
-
Bypassing antivirus with your future programs00:14:00
-
Sending malware with spoofed email00:15:00
-
What will you learn in this section?00:03:00
-
Why is ethical hacking a valuable skill?00:23:00
-
What is the best ethical hacking certification?00:17:00
-
Tips for getting your first job as an ethical hacker00:18:00
-
How I started my career as an ethical hacker00:14:00
-
How to price your work00:11:00
-
Bonuses. Enjoy the Benefits01:05:00
-
Assignment – Ethical Hacking with Kali Linux