Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Ethical Hacking: Beginner to Advanced!
Introduction and Installation
Introduction to the course (4:40)
VirtualBox installation (15:36)
Kali Linux installation (13:54)
Enabling full-screen (18:16)
Basic Linux Commands
Basic commands part 1 (9:41)
Basic commands part 2 (21:04)
Basic commands part 3 (12:45)
Creating a Secure Hacking Environment
Changing IP addresses and wireless adapter setup (4:51)
Creating a bootable Kali USB drive (4:54)
Essential networking terms (10:15)
Essential hacking terms (17:58)
Additional Kali tools to install (8:30)
Changing our MAC address with macchanger (6:24)
Footprinting
Google hacking (13:08)
Whois tool (6:39)
Nikto basics (10:55)
Email harvesting (6:07)
Shodan (10:24)
Zone transfer with Dig (7:08)
Scanning
Installing Metasploitable (6:58)
Nmap part 1 (15:32)
Nmap part 2 (11:43)
Nmap part 3 (12:24)
Zenmap (7:52)
TCP scans (15:50)
Nmap bypassing defenses (17:23)
Nmap scripts part 1 (9:28)
Nmap scripts part 2 (13:59)
Website Penetration Testing
Installing OWASP (8:26)
HTTP request (9:57)
HTTP response (10:27)
Burpsuite configuration (12:49)
Editing packets in Burpsuite (12:20)
Whatweb and Dirb (10:10)
Password recovery attack (15:32)
Burpsuite login bruteforce (11:01)
Hydra login bruteforce (8:44)
Session fixation (13:51)
Injection attacks (5:31)
Simple command injection (11:04)
Exploiting command injection vulnerability (7:38)
Finding blind command injection (13:39)
SQL basics (10:21)
Manual SQL injection part 1 (13:12)
Manual SQL injection part 2 (20:49)
SQLmap basics (16:34)
XML injection (15:54)
Installing XCAT and preventing injection attacks (5:50)
Reflected XSS (10:46)
Stored XSS (11:56)
Changing HTML code with XSS (7:28)
XSSer and XSSsniper (13:32)
WPA2 Wireless Cracking
Wireless attack theory (10:49)
Putting network card in monitor mode (4:39)
Capturing handshake with airodump (14:35)
RockYou.txt (13:53)
Cracking with Aircrack (15:32)
Cracking with Hashcat (14:55)
Making password lists with Crunch (18:20)
Making password lists with Cupp (7:10)
Rainbow tables part 1 (16:34)
Rainbow tables part 2 (5:38)
Installing Fluxion (6:17)
Finding and cracking hidden networks (8:18)
Preventing wireless attacks (7:57)
Man in the Middle Attacks
ARP protocol basics (10:28)
Man in the middle attack theory (7:18)
Installing MITMf (6:36)
Manual ARP spoofing (12:47)
Problems while installing MITMf (6:18)
HTTP traffic sniffing (8:29)
DNS spoofing and HTTPS password sniffing (24:18)
Hooking browsers with BEEF (16:01)
Screenshotting targets browser (11:00)
Cloning any webpage (8:53)
Ettercap basics (6:57)
System Hacking
MSFconsole environment (16:05)
Metasploit modules explained (12:11)
Bruteforcing SSH with Metasploit (15:17)
Attacking Tomcat with Metasploit (8:49)
Getting Meterpreter with command injection (25:05)
PHP code injection (5:43)
2 Metasploitable injections (6:57)
Wine installation (12:02)
Creating Windows payloads with Msfvenom (10:00)
Encoders and Hex editor (18:42)
Windows 10 Meterpreter shell (11:57)
Meterpreter environment (11:25)
Windows 10 privilege escalation (11:28)
Preventing privilege escalation (6:21)
Post exploitation modules (14:10)
Getting Meterpreter over internet with port forwarding (10:39)
Eternalblue exploit (20:15)
Persistence module (13:14)
Hacking over the internet with Ngrok (10:24)
Android device attack with Venom (9:54)
The real hacking begins now! (2:25)
Python Crash Course
Variables (13:40)
Raw input (10:46)
If-else statements (10:17)
For loops (6:30)
While loops (8:23)
Python lists (8:03)
Functions (14:33)
Classes (10:20)
Importing libraries (6:59)
Files in Python (11:43)
Try and except rule (5:11)
Coding an Advanced Backdoor
Theory behind reverse shells (6:47)
Simple server code (12:40)
Connection with reverse shell (7:07)
Sending and receiving messages (10:46)
Sending messages with while true loop (7:52)
Executing commands on target system (9:37)
Fixing backdoor bugs and adding functions (20:08)
First test using our backdoor (17:59)
Trying to connect every 20 seconds (12:23)
Creating persistence part 1 (6:09)
Creating persistence part 2 (16:45)
Changing directory (11:51)
Uploading and downloading files (22:29)
Downloading files from the internet (22:42)
Starting programs using our backdoor (6:44)
Capturing screenshot on targets PC (18:43)
Embedding backdoor in an image part 1 (13:27)
Embedding backdoor in an image part 2 (8:37)
Checking for administrator privileges (12:10)
Adding help option (8:51)
Creating a Keylogger for the Backdoor
Importing Pynput (10:20)
Simple keylogger (9:55)
Adding report function (10:32)
Writing keystrokes to a file (13:59)
Adding the keylogger to our reverse shell part 1 (22:59)
Adding the keylogger to our reverse shell part 2 (7:39)
Final project test (14:24)
Basic Authentication Bruteforcer
Printing banner (11:19)
Adding available options (11:12)
Starting threads for bruteforce (8:23)
Writing function to run the attack (11:02)
Bruteforcing router login (9:37)
Bypassing antivirus with your future programs (13:41)
Sending malware with spoofed email (15:13)
BONUS - Building a Career in Cyber Security
What will you learn in this section? (2:33)
Why is ethical hacking a valuable skill? (23:00)
What is the best ethical hacking certification? (16:31)
Tips for getting your first job as an ethical hacker (18:24)
How I started my career as an ethical hacker (14:11)
How to price your work (10:47)
Changing IP addresses and wireless adapter setup
Download
Complete and Continue