-
Introduction and Installation 4
-
Introduction to the course 05 minLecture1.1
-
VirtualBox installation 16 minLecture1.2
-
Kali Linux installation 14 minLecture1.3
-
Enabling full-screen 18 minLecture1.4
-
-
Basic Linux Commands 3
-
Basic commands part 1 10 minLecture2.1
-
Basic commands part 2 21 minLecture2.2
-
Basic commands part 3 13 minLecture2.3
-
-
Creating a Secure Hacking Environment 6
-
Changing IP address and wireless adapter setup 05 minLecture3.1
-
Creating a bootable Kali USB drive 05 minLecture3.2
-
Essential networking terms 10 minLecture3.3
-
Essential hacking terms 18 minLecture3.4
-
Additional Kali tools to install 09 minLecture3.5
-
Changing our MAC address with macchanger 07 minLecture3.6
-
-
Footprinting 6
-
Google hacking 13 minLecture4.1
-
Nikto basics 11 minLecture4.2
-
Whois tool 07 minLecture4.3
-
Email harvesting 06 minLecture4.4
-
Shodan 11 minLecture4.5
-
Zone transfer with Dig 07 minLecture4.6
-
-
Scanning 9
-
Installing Metasploitable 07 minLecture5.1
-
Nmap part 1 16 minLecture5.2
-
Nmap part 2 12 minLecture5.3
-
Nmap part 3 13 minLecture5.4
-
Zenmap 08 minLecture5.5
-
TCP scans 16 minLecture5.6
-
Nmap bypassing defenses 18 minLecture5.7
-
Nmap scripts part 1 10 minLecture5.8
-
Nmap scripts part 2 14 minLecture5.9
-
-
Website Penetration Testing 24
-
Installing OWASP 09 minLecture6.1
-
HTTP request 10 minLecture6.2
-
HTTP response 11 minLecture6.3
-
Burpsuite configuration 13 minLecture6.4
-
Editing packets in Burpsuite 13 minLecture6.5
-
Whatweb and Dirb 10 minLecture6.6
-
Password recovery attack 16 minLecture6.7
-
Burpsuite login bruteforce 11 minLecture6.8
-
Hydra login bruteforce 09 minLecture6.9
-
Session fixation 14 minLecture6.10
-
Injection attacks 06 minLecture6.11
-
Simple command injection 11 minLecture6.12
-
Exploiting command injection vulnerability 08 minLecture6.13
-
Finding blind command injection 14 minLecture6.14
-
SQL basics 11 minLecture6.15
-
Manual SQL injection part 1 13 minLecture6.16
-
Manual SQL injection part 2 21 minLecture6.17
-
SQLmap basics 17 minLecture6.18
-
XML injection 16 minLecture6.19
-
Installing XCAT and preventing injection attacks 06 minLecture6.20
-
Reflected XSS 11 minLecture6.21
-
Stored XSS 12 minLecture6.22
-
Changing HTML code with XSS 08 minLecture6.23
-
XSSer and XSSsniper 14 minLecture6.24
-
-
Wireless Cracking 13
-
Wireless attacking theory 11 minLecture7.1
-
Enabling monitor mode 04 minLecture7.2
-
Capturing handshake with airodump 15 minLecture7.3
-
RockYou.txt 14 minLecture7.4
-
Cracking with Aircrack 16 minLecture7.5
-
Cracking with Hashcat 15 minLecture7.6
-
Creating password lists with Crunch 19 minLecture7.7
-
Creating password lists with Cupp 07 minLecture7.8
-
Rainbow tables part 1 17 minLecture7.9
-
Rainbow tables part 2 06 minLecture7.10
-
Installing Fluxion 06 minLecture7.11
-
Finding and cracking hidden networks 08 minLecture7.12
-
Preventing wireless attacks 08 minLecture7.13
-
-
Man in the Middle Attacks 11
-
ARP protocol basics 11 minLecture8.1
-
Man in the middle attack theory 07 minLecture8.2
-
Installing MITMf 07 minLecture8.3
-
Manual ARP spoofing 13 minLecture8.4
-
Problems while installing MITMf 06 minLecture8.5
-
HTTP traffic sniffing 09 minLecture8.6
-
DNS spoofing and HTTPS password sniffing 21 minLecture8.7
-
Hooking browsers with BEEF 16 minLecture8.8
-
Screenshotting targets browser 11 minLecture8.9
-
Cloning any webpage 09 minLecture8.10
-
Ettercap basics 07 minLecture8.11
-
-
System Hacking with Metasploit 21
-
MSFconsole environment 16 minLecture9.1
-
Metasploit modules explained 12 minLecture9.2
-
Bruteforcing SSH with Metasploit 15 minLecture9.3
-
Attacking Tomcat with Metasploit 09 minLecture9.4
-
Getting Meterpreter with command injection 25 minLecture9.5
-
PHP code injection 06 minLecture9.6
-
2 Metasploitable exploits 07 minLecture9.7
-
Wine installation 12 minLecture9.8
-
Creating Windows payloads with Msfvenom 10 minLecture9.9
-
Encoders and Hex editor 19 minLecture9.10
-
Windows 10 Meterpreter shell 12 minLecture9.11
-
Meterpreter environment 12 minLecture9.12
-
Windows 10 privilege escalation 12 minLecture9.13
-
Preventing privilege escalation 07 minLecture9.14
-
Post exploitation modules 14 minLecture9.15
-
Getting Meterpreter over Internet with port forwarding 11 minLecture9.16
-
Eternalblue exploit 21 minLecture9.17
-
Persistence module 13 minLecture9.18
-
Hacking over the internet with Ngrok 11 minLecture9.19
-
Android device attack with Venom 10 minLecture9.20
-
The real hacking begins now! 03 minLecture9.21
-
-
Python Crash Course 11
-
Variables 14 minLecture10.1
-
Raw input 11 minLecture10.2
-
If-else statements 11 minLecture10.3
-
For loops 07 minLecture10.4
-
While loops 09 minLecture10.5
-
Python lists 08 minLecture10.6
-
Functions 14 minLecture10.7
-
Classes 11 minLecture10.8
-
Importing libraries 07 minLecture10.9
-
Files in Python 12 minLecture10.10
-
Try and except rule 05 minLecture10.11
-
-
Coding an Advanced Backdoor 20
-
Theory behind reverse shells 07 minLecture11.1
-
Simple server code 13 minLecture11.2
-
Connection with reverse shell 07 minLecture11.3
-
Sending and receiving messages 11 minLecture11.4
-
Sending messages with while true loop 08 minLecture11.5
-
Executing commands on target system 10 minLecture11.6
-
Fixing backdoor bugs and adding functions 21 minLecture11.7
-
First test using our backdoor 18 minLecture11.8
-
Trying to connect every 20 seconds 13 minLecture11.9
-
Creating persistence part 1 06 minLecture11.10
-
Creating persistence part 2 17 minLecture11.11
-
Changing directory 12 minLecture11.12
-
Uploading and downloading files 23 minLecture11.13
-
Downloading files from the internet 23 minLecture11.14
-
Starting programs using our backdoor 07 minLecture11.15
-
Capturing screenshot on the target PC 19 minLecture11.16
-
Embedding backdoor in an image part 1 14 minLecture11.17
-
Embedding backdoor in an image part 2 09 minLecture11.18
-
Checking for administrator privileges 12 minLecture11.19
-
Adding help option 09 minLecture11.20
-
-
Creating a Keylogger for the Backdoor 7
-
Importing Pynput 11 minLecture12.1
-
Simple keylogger 10 minLecture12.2
-
Adding report function 11 minLecture12.3
-
Writing keystrokes to a file 14 minLecture12.4
-
Adding the keylogger to our reverse shell part 1 23 minLecture12.5
-
Adding the keylogger to our reverse shell part 2 08 minLecture12.6
-
Final project test 15 minLecture12.7
-
-
Basic Authentication Bruteforcer 7
-
Printing banner 12 minLecture13.1
-
Adding available options 11 minLecture13.2
-
Starting threads for bruteforce 09 minLecture13.3
-
Writing function to run the attack 11 minLecture13.4
-
Bruteforcing router login 10 minLecture13.5
-
Bypassing antivirus with your future programs 14 minLecture13.6
-
Sending malware with spoofed email 14 minLecture13.7
-
-
BONUS-Building a Career in Cyber Security 6
-
What will you learn in this section? 03 minLecture14.1
-
Why is ethical hacking a valuable skill? 23 minLecture14.2
-
What is the best ethical hacking certification? 17 minLecture14.3
-
Tips for getting your first job as an ethical hacker 19 minLecture14.4
-
How I started my career as an ethical hacker 14 minLecture14.5
-
How to price your work 11 minLecture14.6
-
This content is protected, please login and enroll course to view this content!
Prev
XSSer and XSSsniper
