Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Ethical Hacking Bootcamp 2023: Zero to Mastery
Introduction
Complete Ethical Hacking Bootcamp: Zero to Mastery (2:43)
Course Outline (6:37)
Exercise: Meet Your Classmates and Instructor
What is Ethical Hacking? (8:09)
Course Resources + Guide
Understanding Your Video Player (notes, video speed, subtitles + more)
Set Your Learning Streak Goal
Setting Up Our Hacking Lab
What is a Virtual Machine? (6:03)
Why Linux? (3:13)
Downloading Virtual Box & Kali Linux (5:59)
Important - New Kali Linux Categories (1:25)
Note: Kali Linux Updates All The Time!
Creating Our First Virtual Machine (8:45)
Installing Kali Linux Operating System (11:57)
Update 1 - New & Old Versions of Kali Linux (3:29)
Networking Basics
Full Screen Mode & Network Settings (12:05)
Troubleshooting Network Connecting in Kali Linux (6:34)
Note: Getting Familiar With Kali Linux!
Let's Have Some Fun (+ Free Resources)
5 Stages Of A Penetration Test (7:35)
Linux Operating System
Navigating Through Linux System (11:26)
Creating Files & Managing Directories (12:40)
Network Commands & Sudo Privileges In Kali (11:21)
Note: Linux File System & Additional Commands
Reconnaissance & Information Gathering
What is Information Gathering? (4:40)
Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Whatweb Stealthy Scan (8:21)
Aggressive Website Technology Discovering on IP Range (9:50)
Note: Same Tools Different Results!
Gathering Emails Using theHarvester & Hunter.io (9:59)
How To Download Tools Online (10:34)
Finding Usernames With Sherlock (7:49)
Bonus - Email Scraper Tool In Python 3 (6:35)
Unlimited Updates
Scanning
Theory Behind Scanning (7:19)
TCP & UDP (4:21)
Installing Vulnerable Virtual Machine (6:01)
Netdiscover (6:01)
Performing First Nmap Scan (8:52)
Different Nmap Scan Types (10:41)
ZTM Nmap Cheatsheet
Discovering Target Operating System (6:00)
Detecting Version Of Service Running On An Open Port (7:13)
Filtering Port Range & Output Of Scan Results (11:54)
What is a Firewall/IDS? (2:29)
Using Decoys and Packet Fragmentation (12:25)
Security Evasion Nmap Options (5:28)
Note: Time To Switch Things Up!
Course Check-In
Python Coding Project #1 - Portscanner
The 2 Paths
Note: Do We Need To Learn Programming To Be An Ethical Hacker?
Coding a Portscanner in Python 3 (25:03)
Vulnerability Analysis
Finding First Vulnerability With Nmap Scripts (16:58)
Manual Vulnerability Analysis & Searchsploit (7:42)
Nessus Installation (5:35)
Discovering Vulnerabilities With Nessus (14:56)
Scanning Windows 7 Machine With Nessus (4:13)
Let's Cool Down For A Bit! (1:14)
Implement a New Life System
Exploitation & Gaining Access
What is Exploitation? (7:08)
What is a Vulnerability? (5:24)
Reverse Shells, Bind Shells ... (2:42)
Metasploit Framework Structure (13:53)
Msfconsole Basic Commands (16:53)
Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Misconfigurations Happen - Bindshell Exploitation (4:41)
Information Disclosure - Telnet Exploit (4:06)
Software Vulnerability - Samba Exploitation (9:22)
Attacking SSH - Bruteforce Attack (11:56)
Exploitation Challenge - 5 Different Exploits (17:52)
Explaining Windows 7 Setup (8:46)
Eternal Blue Attack - Windows 7 Exploitation (12:33)
DoublePulsar Attack - Windows Exploit (15:04)
BlueKeep Vulnerability - Windows Exploit (9:35)
Note: We Can Also Target Routers!
Update 2 - Routersploit (6:25)
Update 3 - Router Default Credentials (7:02)
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
Note: Not Everything Will Work Smooth!
Setting Up Vulnerable Windows 10 (7:52)
Crashing Windows 10 Machine Remotely (6:52)
Exploiting Windows 10 Machine Remotely (13:59)
Gaining Access (Viruses, Trojans, Payloads ...)
Generating Basic Payload With Msfvenom (11:30)
Advance Msfvenom Usage Part 1 (9:48)
Advance Msfvenom Usage Part 2 (7:30)
Generating Powershell Payload Using Veil (14:36)
TheFatRat Payload Creation (7:43)
Note: My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses (7:09)
Making Our Payload Open An Image (8:10)
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Post Exploitation Theory (4:26)
Meterpreter Basic Commands Part 1 (11:03)
Meterpreter Basic Commands Part 2 (10:21)
Elevating Privileges With Different Modules (8:55)
Creating Persistence On The Target System (7:57)
Post Exploitation Modules (8:05)
Exploitation Recap (4:00)
Python Coding Project #2 - Backdoor
What Are We Creating? (2:47)
Connecting Server And Backdoor (10:22)
Processing Instructional Commands (6:27)
Sending and Receiving Data (6:23)
Executing Commands And Compiling The Program (12:08)
Changing Directory Inside Of Our Backdoor (6:02)
Uploading & Downloading Files (10:59)
Testing All The Commands (8:55)
Note: You Can Continue Building Onto This Project!
Exercise: Imposter Syndrome (2:55)
Website Application Penetration Testing
Website Penetration Testing Theory (11:37)
HTTP Request & Response (4:03)
Information Gathering & Dirb Tool (8:10)
Burpsuite Configuration (7:57)
ShellShock Exploitation (15:51)
Command Injection Exploitation (11:55)
Getting Meterpreter Shell With Command Execution (9:18)
Reflected XSS & Cookie Stealing (16:16)
Stored XSS (9:06)
HTML Injection (7:12)
SQL Injection (21:32)
CSRF Vulnerability (12:49)
Hydra Bruteforce Attack Example 1 (10:56)
Hydra Bruteforce Attack Example 2 (7:06)
Burpsuite Intruder (7:34)
Python Coding Project #3 - Login Bruteforce, Directory Discovery
Creating 2 Programs (1:46)
Bruteforcer In Python (27:09)
Hidden Directory Discovery (12:10)
Man In The Middle - MITM
Theory - Man In The Middle Attack (8:03)
Bettercap ARP Spoofing (11:29)
Ettercap Password Sniffing (8:58)
Manually Poisoning Targets ARP Cache With Scapy (12:21)
Bonus - Wireless Access Point Cracking
Wireless Cracking Theory (5:48)
Putting Wireless Card In Monitor Mode (3:42)
Deauthenticating Devices & Grabbing Password (11:24)
Aircrack Password Cracking (7:35)
Hashcat Password Cracking (9:42)
Bonus: Gaining Access To An Android Device
Android Hacking Theory (3:31)
Android VM Install (5:50)
Gaining Access With Android Meterpreter (10:15)
Evil Droid (7:52)
Is it Flappy Bird or Malware (12:49)
Hack Any Device On Any Network With Ngrok (11:47)
Bonus: Introduction To Anonymity
Anonymity Theory (4:22)
Tor Browser (8:47)
Proxychains With Nmap (7:31)
Installing VPN in Kali Linux (5:54)
Whoami Anonymity Tool (8:41)
Bonus: Hacking Active Directory
Enumerating Active Directory (19:22)
Exploiting Active Directory (14:03)
Escalating Privileges on the Domain (13:12)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Endorsements On LinkedIn
What's Next? (2:34)
Learning Guideline
Practice
Bug Bounty
Coding For Hackers
Exploit Development
Python Monthly
Learn Python Basics
What is a Programming Language? (6:24)
Python Interpreter (14:08)
How To Run Python Code (9:46)
Our First Python Program (7:43)
Latest Version Of Python (3:40)
Python 2 vs Python 3 (13:21)
Exercise: How Does Python Work? (2:09)
Learn Python Intermediate
Learning Python (2:05)
Python Data Types (4:46)
How To Succeed
Numbers (11:09)
Math Functions (4:29)
DEVELOPER FUNDAMENTALS: I (4:07)
Operator Precedence (3:10)
Exercise: Operator Precedence
Optional: bin() and complex (4:02)
Variables (13:12)
Expressions vs Statements (1:36)
Augmented Assignment Operator (2:49)
Strings (5:29)
String Concatenation (1:16)
Type Conversion (3:03)
Escape Sequences (4:23)
Formatted Strings (8:23)
String Indexes (8:57)
Immutability (3:13)
Built-In Functions + Methods (10:03)
Booleans (3:21)
Exercise: Type Conversion (8:22)
DEVELOPER FUNDAMENTALS: II (4:42)
Exercise: Password Checker (7:21)
Lists (5:01)
List Slicing (7:48)
Matrix (4:11)
List Methods (10:28)
List Methods 2 (4:24)
List Methods 3 (4:52)
Common List Patterns (5:57)
List Unpacking (2:40)
None (1:51)
Dictionaries (6:20)
DEVELOPER FUNDAMENTALS: III (2:40)
Dictionary Keys (3:37)
Dictionary Methods (4:37)
Dictionary Methods 2 (7:04)
Tuples (4:46)
Tuples 2 (3:14)
Sets (7:24)
Sets 2 (8:45)
Breaking The Flow (2:34)
Conditional Logic (13:17)
Indentation In Python (4:38)
Truthy vs Falsey (5:17)
Ternary Operator (4:14)
Short Circuiting (4:02)
Logical Operators (6:56)
Exercise: Logical Operators (7:47)
is vs == (7:36)
For Loops (7:01)
Iterables (6:43)
Exercise: Tricky Counter (3:23)
range() (5:38)
enumerate() (4:37)
While Loops (6:28)
While Loops 2 (5:49)
break, continue, pass (4:15)
Our First GUI (8:48)
DEVELOPER FUNDAMENTALS: IV (6:34)
Exercise: Find Duplicates (3:54)
Functions (7:41)
Parameters and Arguments (4:24)
Default Parameters and Keyword Arguments (5:40)
return (13:11)
Methods vs Functions (4:33)
Docstrings (3:47)
Clean Code (4:38)
*args and **kwargs (7:56)
Exercise: Functions (4:18)
Scope (3:37)
Scope Rules (6:55)
global Keyword (6:13)
nonlocal Keyword (3:21)
Why Do We Need Scope? (3:38)
Modules in Python (11:47)
Quick Note: Upcoming Videos
Optional: PyCharm (8:19)
Packages in Python (10:45)
Different Ways To Import (7:03)
Learn Python 3: Error Handling
Errors in Python (6:11)
Error Handling (8:31)
Error Handling 2 (6:01)
Exercises: Error Handling (4:57)
Error Handling 3 (3:06)
Learn Python 4: File I/O
Working With Files In Python (8:32)
Read, Write, Append (7:23)
File Paths (6:53)
File IO Errors (2:23)
Exercise: Translator (9:55)
Next Steps
TheFatRat Payload Creation
Lecture content locked. Exclusive for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures