| Unit 01: Introduction and Installation | |||
| Introduction to the course | 00:05:00 | ||
| Virtual box installation | 00:16:00 | ||
| Kali linux installation | 00:14:00 | ||
| Enabling full screen | 00:18:00 | ||
| Unit 02: Basic Linux Commands | |||
| Basic commands part 1 | 00:10:00 | ||
| Basic commands part 2 | 00:21:00 | ||
| Basic commands part 3 | 00:13:00 | ||
| Unit 03: Creating a Secure Hacking Environment | |||
| Changing ip address and wireless adapter setup | 00:05:00 | ||
| Creating a bootable Kali USB drive | 00:05:00 | ||
| Essential networking terms | 00:10:00 | ||
| Essential hacking terms | 00:18:00 | ||
| Additional kali tools to install | 00:09:00 | ||
| Changing our MAC address with mac changer | 00:06:00 | ||
| Unit 04: Footprinting | |||
| Google hacking | 00:13:00 | ||
| Nikto basics | 00:11:00 | ||
| Whois tools | 00:07:00 | ||
| Email harvesting | 00:06:00 | ||
| Shodan | 00:10:00 | ||
| Zone transfer with Dig | 00:07:00 | ||
| Unit 05: Scanning | |||
| Installing Metasploitable | 00:07:00 | ||
| Nmap part 1 | 00:16:00 | ||
| Nmap part 2 | 00:12:00 | ||
| Nmap part 3 | 00:12:00 | ||
| Zen map | 00:08:00 | ||
| TCP scans | 00:16:00 | ||
| Nmap by passing defenses | 00:17:00 | ||
| Nmap scripts part 1 | 00:09:00 | ||
| Nmap scripts part 2 | 00:14:00 | ||
| Unit 06: Website Penetration Testing | |||
| Installing OWASP | 00:08:00 | ||
| HTTP request | 00:10:00 | ||
| HTTP response | 00:10:00 | ||
| Burpsuite configuration | 00:13:00 | ||
| Editing packets in Burpsuite | 00:12:00 | ||
| Whatweb and Dirb | 00:10:00 | ||
| Password recovery attack | 00:16:00 | ||
| Burpsuite login bruteforce | 00:11:00 | ||
| Hydra login bruteforce | 00:09:00 | ||
| Session fixation | 00:14:00 | ||
| Injection attacks | 00:06:00 | ||
| Simple command injection | 00:11:00 | ||
| Exploiting command injection vulnerability | 00:08:00 | ||
| Finding blind command injection | 00:14:00 | ||
| SQL basics | 00:10:00 | ||
| Manual SQL injection part 1 | 00:13:00 | ||
| Manual SQL injection part 2 | 00:21:00 | ||
| SQL map basics | 00:17:00 | ||
| XML injection | 00:16:00 | ||
| Installing XCAT and preventing injection attacks | 00:06:00 | ||
| Reflected XSS | 00:11:00 | ||
| Stored XSS | 00:12:00 | ||
| Changing HTML code with XSS | 00:07:00 | ||
| XSSer and XSS sniper | 00:14:00 | ||
| Unit 07: Wireless Cracking | |||
| Wireless attacking theory | 00:11:00 | ||
| Enabling monitor mode | 00:05:00 | ||
| Capturing handshake with airodump | 00:15:00 | ||
| Rockyou.txt | 00:14:00 | ||
| Cracking with aircrack | 00:16:00 | ||
| Cracking with hashcat | 00:15:00 | ||
| Creating password lists with crunch | 00:18:00 | ||
| Creating password lists with cup | 00:07:00 | ||
| Rainbow tables part 1 | 00:17:00 | ||
| Rainbow tables part 2 | 00:06:00 | ||
| Installing fluxion | 00:06:00 | ||
| Finding and cracking hidden networks | 00:08:00 | ||
| Preventing wireless attacks | 00:08:00 | ||
| Unit 08: Man in the Middle Attacks | |||
| ARP protocol basics | 00:10:00 | ||
| Man in the middle attack theory | 00:07:00 | ||
| Installing MITMf | 00:07:00 | ||
| Manual ARP spoofing | 00:13:00 | ||
| Problems while installing MITMf | 00:06:00 | ||
| HTTP traffic sniffing | 00:08:00 | ||
| DNS spoofing and HTTPS password sniffing | 00:24:00 | ||
| Hooking browser with BEEF | 00:16:00 | ||
| Screenshotting targets browser | 00:11:00 | ||
| Cloning any webpage | 00:09:00 | ||
| Ettercap basics | 00:07:00 | ||
| Unit 09: System Hacking with Metasploit | |||
| MFS console environment | 00:16:00 | ||
| Metasploit modules explained | 00:12:00 | ||
| Bruteforcing SSH with Metasploit | 00:15:00 | ||
| Attacking tomcat with metasploit | 00:09:00 | ||
| Getting meterpreter with command injection | 00:25:00 | ||
| PHP code injection | 00:06:00 | ||
| Metasploitable exploits | 00:07:00 | ||
| Wine installation | 00:12:00 | ||
| Creating windows payloads with Msfvenom | 00:10:00 | ||
| Encoders and Hex editors | 00:19:00 | ||
| Windows 10 meterpreter shell | 00:12:00 | ||
| Meterpreter environment | 00:11:00 | ||
| Windows 10 privilege escalation | 00:11:00 | ||
| Preventing privilege escalation | 00:06:00 | ||
| Post exploitation modules | 00:14:00 | ||
| Getting Meterpreter over Internet with port forwarding | 00:11:00 | ||
| Eternalblue exploit | 00:20:00 | ||
| Persistence module | 00:13:00 | ||
| Hacking over the internet with Ngrok | 00:10:00 | ||
| Android device hacking with venom | 00:10:00 | ||
| The real hacking begins now! | 00:02:00 | ||
| Unit 10: Python Crash Course | |||
| Variables | 00:14:00 | ||
| Raw input | 00:11:00 | ||
| If else statements | 00:10:00 | ||
| For loops | 00:07:00 | ||
| While loops | 00:08:00 | ||
| Python lists | 00:08:00 | ||
| Functions | 00:15:00 | ||
| Classes | 00:10:00 | ||
| Importing libraries | 00:07:00 | ||
| Files in python | 00:12:00 | ||
| Try and except the rule | 00:05:00 | ||
| Unit 11: Coding an Advanced Backdoor | |||
| Theory behind reverse shells | 00:07:00 | ||
| Simple server code | 00:13:00 | ||
| Connection with reverse shell | 00:07:00 | ||
| Sending and receiving messages | 00:11:00 | ||
| Sending messages with while true loop | 00:08:00 | ||
| Executing commands on target system | 00:10:00 | ||
| Fixing backdoor bugs and adding functions | 00:20:00 | ||
| First test using our backdoor | 00:18:00 | ||
| Trying to connect every 20 seconds | 00:12:00 | ||
| Creating persistence part 1 | 00:06:00 | ||
| Creating persistence part 2 | 00:17:00 | ||
| Changing directory | 00:12:00 | ||
| Uploading and downloading files | 00:22:00 | ||
| Downloading files from the internet | 00:23:00 | ||
| Starting programs using our backdoor | 00:07:00 | ||
| Capturing screenshots on the target PC | 00:19:00 | ||
| Embedding backdoor in an image part 1 | 00:13:00 | ||
| Embedding backdoor in an image part 2 | 00:09:00 | ||
| Checking for administrator privileges | 00:12:00 | ||
| Adding help option | 00:09:00 | ||
| Unit 12: Creating a Key logger for the Backdoor | |||
| Importing Pynput | 00:10:00 | ||
| Simple keylogger | 00:10:00 | ||
| Adding report function | 00:11:00 | ||
| Writing key strokes to a file | 00:14:00 | ||
| Adding the keylogger to our reverse shell part 1 | 00:23:00 | ||
| Adding the keylogger to our reverse shell part 2 | 00:08:00 | ||
| Final project test | 00:14:00 | ||
| Unit 13: Basic Authentication Bruteforcer | |||
| Printing banner | 00:11:00 | ||
| Adding available options | 00:11:00 | ||
| Starting threads for bruteforce | 00:08:00 | ||
| Writing function to run the attack | 00:11:00 | ||
| Bruteforcing router login | 00:10:00 | ||
| Bypassing antivirus with your future programs | 00:14:00 | ||
| Sending malware with spoofed email | 00:15:00 | ||
| Unit 14: BONUS - Building a Career in Cyber Security | |||
| What will you learn in this section? | 00:03:00 | ||
| Why is ethical hacking a valuable skill? | 00:23:00 | ||
| What is the best ethical hacking certification? | 00:17:00 | ||
| Tips for getting your first job as an ethical hacker | 00:18:00 | ||
| How I started my career as an ethical hacker | 00:14:00 | ||
| How to price your work | 00:11:00 | ||
| Unit 15: Additional Content: Grand Finale | |||
| Bonuses. Enjoy the Benefits | 01:05:00 | ||
| Assignment | |||
| Assignment -Ethical Hacking with Kali Linux | 3 weeks, 2 days | ||
| Order Your Certificate | |||
| Order Your Certificate QLS | 00:00:00 | ||