Unit 01: Introduction and Installation | |||
Introduction to the course | 00:05:00 | ||
Virtual box installation | 00:16:00 | ||
Kali linux installation | 00:14:00 | ||
Enabling full screen | 00:18:00 | ||
Unit 02: Basic Linux Commands | |||
Basic commands part 1 | 00:10:00 | ||
Basic commands part 2 | 00:21:00 | ||
Basic commands part 3 | 00:13:00 | ||
Unit 03: Creating a Secure Hacking Environment | |||
Changing ip address and wireless adapter setup | 00:05:00 | ||
Creating a bootable Kali USB drive | 00:05:00 | ||
Essential networking terms | 00:10:00 | ||
Essential hacking terms | 00:18:00 | ||
Additional kali tools to install | 00:09:00 | ||
Changing our MAC address with mac changer | 00:06:00 | ||
Unit 04: Footprinting | |||
Google hacking | 00:13:00 | ||
Nikto basics | 00:11:00 | ||
Whois tools | 00:07:00 | ||
Email harvesting | 00:06:00 | ||
Shodan | 00:10:00 | ||
Zone transfer with Dig | 00:07:00 | ||
Unit 05: Scanning | |||
Installing Metasploitable | 00:07:00 | ||
Nmap part 1 | 00:16:00 | ||
Nmap part 2 | 00:12:00 | ||
Nmap part 3 | 00:12:00 | ||
Zen map | 00:08:00 | ||
TCP scans | 00:16:00 | ||
Nmap by passing defenses | 00:17:00 | ||
Nmap scripts part 1 | 00:09:00 | ||
Nmap scripts part 2 | 00:14:00 | ||
Unit 06: Website Penetration Testing | |||
Installing OWASP | 00:08:00 | ||
HTTP request | 00:10:00 | ||
HTTP response | 00:10:00 | ||
Burpsuite configuration | 00:13:00 | ||
Editing packets in Burpsuite | 00:12:00 | ||
Whatweb and Dirb | 00:10:00 | ||
Password recovery attack | 00:16:00 | ||
Burpsuite login bruteforce | 00:11:00 | ||
Hydra login bruteforce | 00:09:00 | ||
Session fixation | 00:14:00 | ||
Injection attacks | 00:06:00 | ||
Simple command injection | 00:11:00 | ||
Exploiting command injection vulnerability | 00:08:00 | ||
Finding blind command injection | 00:14:00 | ||
SQL basics | 00:10:00 | ||
Manual SQL injection part 1 | 00:13:00 | ||
Manual SQL injection part 2 | 00:21:00 | ||
SQL map basics | 00:17:00 | ||
XML injection | 00:16:00 | ||
Installing XCAT and preventing injection attacks | 00:06:00 | ||
Reflected XSS | 00:11:00 | ||
Stored XSS | 00:12:00 | ||
Changing HTML code with XSS | 00:07:00 | ||
XSSer and XSS sniper | 00:14:00 | ||
Unit 07: Wireless Cracking | |||
Wireless attacking theory | 00:11:00 | ||
Enabling monitor mode | 00:05:00 | ||
Capturing handshake with airodump | 00:15:00 | ||
Rockyou.txt | 00:14:00 | ||
Cracking with aircrack | 00:16:00 | ||
Cracking with hashcat | 00:15:00 | ||
Creating password lists with crunch | 00:18:00 | ||
Creating password lists with cup | 00:07:00 | ||
Rainbow tables part 1 | 00:17:00 | ||
Rainbow tables part 2 | 00:06:00 | ||
Installing fluxion | 00:06:00 | ||
Finding and cracking hidden networks | 00:08:00 | ||
Preventing wireless attacks | 00:08:00 | ||
Unit 08: Man in the Middle Attacks | |||
ARP protocol basics | 00:10:00 | ||
Man in the middle attack theory | 00:07:00 | ||
Installing MITMf | 00:07:00 | ||
Manual ARP spoofing | 00:13:00 | ||
Problems while installing MITMf | 00:06:00 | ||
HTTP traffic sniffing | 00:08:00 | ||
DNS spoofing and HTTPS password sniffing | 00:24:00 | ||
Hooking browser with BEEF | 00:16:00 | ||
Screenshotting targets browser | 00:11:00 | ||
Cloning any webpage | 00:09:00 | ||
Ettercap basics | 00:07:00 | ||
Unit 09: System Hacking with Metasploit | |||
MFS console environment | 00:16:00 | ||
Metasploit modules explained | 00:12:00 | ||
Bruteforcing SSH with Metasploit | 00:15:00 | ||
Attacking tomcat with metasploit | 00:09:00 | ||
Getting meterpreter with command injection | 00:25:00 | ||
PHP code injection | 00:06:00 | ||
Metasploitable exploits | 00:07:00 | ||
Wine installation | 00:12:00 | ||
Creating windows payloads with Msfvenom | 00:10:00 | ||
Encoders and Hex editors | 00:19:00 | ||
Windows 10 meterpreter shell | 00:12:00 | ||
Meterpreter environment | 00:11:00 | ||
Windows 10 privilege escalation | 00:11:00 | ||
Preventing privilege escalation | 00:06:00 | ||
Post exploitation modules | 00:14:00 | ||
Getting Meterpreter over Internet with port forwarding | 00:11:00 | ||
Eternalblue exploit | 00:20:00 | ||
Persistence module | 00:13:00 | ||
Hacking over the internet with Ngrok | 00:10:00 | ||
Android device hacking with venom | 00:10:00 | ||
The real hacking begins now! | 00:02:00 | ||
Unit 10: Python Crash Course | |||
Variables | 00:14:00 | ||
Raw input | 00:11:00 | ||
If else statements | 00:10:00 | ||
For loops | 00:07:00 | ||
While loops | 00:08:00 | ||
Python lists | 00:08:00 | ||
Functions | 00:15:00 | ||
Classes | 00:10:00 | ||
Importing libraries | 00:07:00 | ||
Files in python | 00:12:00 | ||
Try and except the rule | 00:05:00 | ||
Unit 11: Coding an Advanced Backdoor | |||
Theory behind reverse shells | 00:07:00 | ||
Simple server code | 00:13:00 | ||
Connection with reverse shell | 00:07:00 | ||
Sending and receiving messages | 00:11:00 | ||
Sending messages with while true loop | 00:08:00 | ||
Executing commands on target system | 00:10:00 | ||
Fixing backdoor bugs and adding functions | 00:20:00 | ||
First test using our backdoor | 00:18:00 | ||
Trying to connect every 20 seconds | 00:12:00 | ||
Creating persistence part 1 | 00:06:00 | ||
Creating persistence part 2 | 00:17:00 | ||
Changing directory | 00:12:00 | ||
Uploading and downloading files | 00:22:00 | ||
Downloading files from the internet | 00:23:00 | ||
Starting programs using our backdoor | 00:07:00 | ||
Capturing screenshots on the target PC | 00:19:00 | ||
Embedding backdoor in an image part 1 | 00:13:00 | ||
Embedding backdoor in an image part 2 | 00:09:00 | ||
Checking for administrator privileges | 00:12:00 | ||
Adding help option | 00:09:00 | ||
Unit 12: Creating a Key logger for the Backdoor | |||
Importing Pynput | 00:10:00 | ||
Simple keylogger | 00:10:00 | ||
Adding report function | 00:11:00 | ||
Writing key strokes to a file | 00:14:00 | ||
Adding the keylogger to our reverse shell part 1 | 00:23:00 | ||
Adding the keylogger to our reverse shell part 2 | 00:08:00 | ||
Final project test | 00:14:00 | ||
Unit 13: Basic Authentication Bruteforcer | |||
Printing banner | 00:11:00 | ||
Adding available options | 00:11:00 | ||
Starting threads for bruteforce | 00:08:00 | ||
Writing function to run the attack | 00:11:00 | ||
Bruteforcing router login | 00:10:00 | ||
Bypassing antivirus with your future programs | 00:14:00 | ||
Sending malware with spoofed email | 00:15:00 | ||
Unit 14: BONUS - Building a Career in Cyber Security | |||
What will you learn in this section? | 00:03:00 | ||
Why is ethical hacking a valuable skill? | 00:23:00 | ||
What is the best ethical hacking certification? | 00:17:00 | ||
Tips for getting your first job as an ethical hacker | 00:18:00 | ||
How I started my career as an ethical hacker | 00:14:00 | ||
How to price your work | 00:11:00 | ||
Unit 15: Additional Content: Grand Finale | |||
Bonuses. Enjoy the Benefits | 01:05:00 | ||
Assignment | |||
Assignment -Ethical Hacking with Kali Linux | 3 weeks, 2 days | ||
Order Your Certificate | |||
Order Your Certificate QLS | 00:00:00 |
Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year
Claim Offer & UpgradeMembership renews after 12 months. You can cancel anytime from your account.