Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing
Lab Preparation
Developing a Network Environment (2:17)
How to Install Oracle VirtualBox (3:02)
How to Install VMware Playervideo1_3 (3:06)
How to Install Kali Linux (3:52)
Increasing Network Attack Surface (3:51)
Information Gathering and Reconnaissance
Passive Reconnaissance (4:11)
Google Hacking (4:25)
Subdomain Enumeration with Google Hacking (3:40)
Reconnaissance Tools (Dmitry & Goofile) (3:12)
Network Enumeration with Maltego (3:31)
Target Discovery
Layer 2 Discovery (3:42)
Layer 3 Discovery (5:22)
Host Discovery with nmap (4:36)
Network Discovery with Scapy (4:30)
Fingerprinting Operating Systems (2:55)
Scanning and Enumeration
Scanning with nmap (3:22)
Scanning with Zenmap (4:32)
Nmap Scripting (4:53)
Zombie Scanning (3:35)
Service Identification (4:02)
Vulnerability Mapping
Metasploit Auxilliary Scans (3:13)
Installing Nessus (4:40)
Nessus Scanning (4:03)
Nessus Policies (3:40)
Nessus Result Analysis (3:55)
Exploitation with Metasploit
Metasploit Framework (4:45)
Meterpreter Basics (4:14)
Meterpreter - Advanced Exploitation (3:45)
Installing Metasploit Pro (2:07)
Exploitation with Metasploit Pro (4:55)
Hands-on Exploitation
Exploit Database (5:29)
Social Engineering Toolkit - Credential Harvester (5:11)
Burp Suite Intruder (5:22)
Web Application Exploitation (6:01)
Maintaining Access (5:25)
Privilege Escalation
Ettercap (4:11)
Hash Identifier / Find-My-Hash (3:39)
Hydra (3:58)
John the Ripper (4:11)
Johnny / xHydra (4:10)
Developing a Network Environment
Complete and Continue