You are NOT signed in as a student! Your progress will not be saved and you won't see milestones on your ZTM Passport.
Make sure you are logged into
Academy
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Ethical Hacking Bootcamp 2025: Zero to Mastery
Introduction
Complete Ethical Hacking Bootcamp: Zero to Mastery (2:43)
Course Outline (6:37)
Exercise: Meet Your Classmates and Instructor
What is Ethical Hacking? (8:09)
Course Resources + Guide
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Setting Up Our Hacking Lab
What is a Virtual Machine? (6:03)
Why Linux? (3:13)
Downloading Virtual Box & Kali Linux (5:57)
Important - New Kali Linux Categories (1:25)
Note: Kali Linux Updates All The Time!
Creating Our First Virtual Machine (7:09)
Note: Common Errors With Your First VM
Installing Kali Linux Operating System (12:08)
Update 1 - New & Old Versions of Kali Linux (2:21)
Networking Basics
Full Screen Mode & Network Settings (12:05)
Troubleshooting Network Connecting in Kali Linux (6:34)
Note: Getting Familiar With Kali Linux!
5 Stages Of A Penetration Test (7:35)
Let's Have Some Fun (+ Free Resources)
Linux Operating System
Navigating Through Linux System (11:26)
Creating Files & Managing Directories (12:40)
Network Commands & Sudo Privileges In Kali (11:21)
Note: Linux File System & Additional Commands
Reconnaissance & Information Gathering
What is Information Gathering? (4:40)
Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Whatweb Stealthy Scan (8:21)
Aggressive Website Technology Discovering on IP Range (9:50)
Note: Same Tools Different Results!
Gathering Emails Using theHarvester & Hunter.io (9:59)
How To Download Tools Online (10:34)
Finding Usernames With Sherlock (7:49)
Bonus - Email Scraper Tool In Python 3 (6:35)
Unlimited Updates
Scanning
Theory Behind Scanning (7:19)
TCP & UDP (4:21)
Installing Vulnerable Virtual Machine (6:01)
Netdiscover (6:01)
Performing First Nmap Scan (8:52)
Different Nmap Scan Types (10:41)
ZTM Nmap Cheatsheet
Discovering Target Operating System (6:00)
Detecting Version of Service Running on an Open Port (7:18)
Filtering Port Range & Output Of Scan Results (11:54)
What is a Firewall/IDS? (2:29)
Using Decoys and Packet Fragmentation (12:25)
Security Evasion Nmap Options (5:28)
Note: Time To Switch Things Up!
Course Check-In
Python Coding Project #1 - Portscanner
The 2 Paths
Note: Do We Need To Learn Programming To Be An Ethical Hacker?
Coding a Portscanner in Python 3 (25:03)
Vulnerability Analysis
Finding First Vulnerability With Nmap Scripts (16:58)
Manual Vulnerability Analysis & Searchsploit (7:42)
Nessus Installation (5:35)
Discovering Vulnerabilities With Nessus (14:56)
Scanning Windows 7 Machine With Nessus (4:13)
Let's Cool Down For A Bit! (1:14)
Implement a New Life System
Exploitation & Gaining Access
What is Exploitation? (7:08)
What is a Vulnerability? (5:24)
Reverse Shells, Bind Shells ... (2:42)
Metasploit Framework Structure (13:53)
Msfconsole Basic Commands (16:53)
Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Misconfigurations Happen - Bindshell Exploitation (4:41)
Information Disclosure - Telnet Exploit (4:06)
Software Vulnerability - Samba Exploitation (9:22)
Attacking SSH - Bruteforce Attack (11:56)
Exploitation Challenge - 5 Different Exploits (17:52)
Explaining Windows 7 Setup (8:46)
Eternal Blue Attack - Windows 7 Exploitation (12:33)
DoublePulsar Attack - Windows Exploit (15:04)
BlueKeep Vulnerability - Windows Exploit (9:35)
Note: We Can Also Target Routers!
Update 2 - Routersploit (6:25)
Update 3 - Router Default Credentials (7:02)
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
Note: Not Everything Will Work Smooth!
Setting Up Vulnerable Windows 10 (7:52)
Crashing Windows 10 Machine Remotely (6:52)
Exploiting Windows 10 Machine Remotely (13:59)
Gaining Access (Viruses, Trojans, Payloads ...)
Generating Basic Payload With Msfvenom (11:30)
Advance Msfvenom Usage Part 1 (9:48)
Advance Msfvenom Usage Part 2 (7:30)
Generating Powershell Payload Using Veil (14:36)
TheFatRat Payload Creation (7:43)
Note: My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses (7:09)
Making Our Payload Open An Image (8:10)
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Post Exploitation Theory (4:26)
Meterpreter Basic Commands Part 1 (11:03)
Meterpreter Basic Commands Part 2 (10:21)
Elevating Privileges With Different Modules (8:55)
Creating Persistence On The Target System (7:57)
Post Exploitation Modules (8:05)
Exploitation Recap (4:00)
Python Coding Project #2 - Backdoor
What Are We Creating? (2:47)
Connecting Server And Backdoor (10:22)
Processing Instructional Commands (6:27)
Sending and Receiving Data (6:23)
Executing Commands And Compiling The Program (12:08)
Changing Directory Inside Of Our Backdoor (6:02)
Uploading & Downloading Files (10:59)
Testing All The Commands (8:55)
Note: You Can Continue Building Onto This Project!
Exercise: Imposter Syndrome (2:55)
Website Application Penetration Testing
Website Penetration Testing Theory (11:37)
HTTP Request & Response (4:03)
Information Gathering & Dirb Tool (8:10)
Burpsuite Configuration (7:57)
ShellShock Exploitation (15:51)
Command Injection Exploitation (11:55)
Getting Meterpreter Shell With Command Execution (9:18)
Reflected XSS & Cookie Stealing (16:16)
Stored XSS (9:06)
HTML Injection (7:12)
SQL Injection (21:32)
CSRF Vulnerability (12:49)
Hydra Bruteforce Attack Example 1 (10:56)
Hydra Bruteforce Attack Example 2 (7:06)
Burpsuite Intruder (7:34)
Python Coding Project #3 - Login Bruteforce, Directory Discovery
Creating 2 Programs (1:46)
Bruteforcer In Python (27:09)
Hidden Directory Discovery (12:10)
Man In The Middle - MITM
Theory - Man In The Middle Attack (8:03)
Bettercap ARP Spoofing (11:29)
Ettercap Password Sniffing (8:58)
Manually Poisoning Targets ARP Cache With Scapy (12:21)
Bonus - Wireless Access Point Cracking
Wireless Cracking Theory (5:48)
Putting Wireless Card In Monitor Mode (3:43)
Deauthenticating Devices & Grabbing Password (11:24)
Aircrack Password Cracking (7:35)
Hashcat Password Cracking (9:42)
Bonus: Gaining Access To An Android Device
Android Hacking Theory (3:31)
Android VM Install (5:50)
Gaining Access With Android Meterpreter (10:15)
Evil Droid (7:52)
Is it Flappy Bird or Malware (12:49)
Hack Any Device On Any Network With Ngrok (11:47)
Bonus: Introduction To Anonymity
Anonymity Theory (4:22)
Tor Browser (8:47)
Proxychains With Nmap (7:31)
Installing VPN in Kali Linux (5:54)
Whoami Anonymity Tool (8:41)
Bonus: Hacking Active Directory
Enumerating Active Directory (19:22)
Exploiting Active Directory (14:03)
Escalating Privileges on the Domain (13:12)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
What's Next? (2:34)
Practice
Bug Bounty
Coding For Hackers
Exploit Development
Learn Python Basics
Watch Python Intro Section
Learn Python Intermediate
Watch Python Fundamentals Sections
Modules in Python (11:47)
Quick Note: Upcoming Videos
Optional: PyCharm (8:19)
Packages in Python (10:45)
Different Ways To Import (7:03)
Learn Python 3: Error Handling
Watch Error Handling Section
Learn Python 4: File I/O
Watch Python File I/O Section
Next Steps
Modules in Python
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures