Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Ethical Hacking Bootcamp 2025: Zero to Mastery
Introduction
Complete Ethical Hacking Bootcamp: Zero to Mastery (2:43)
Course Outline (6:37)
Exercise: Meet Your Classmates and Instructor
What is Ethical Hacking? (8:09)
Course Resources + Guide
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Setting Up Our Hacking Lab
What is a Virtual Machine? (6:03)
Why Linux? (3:13)
Downloading Virtual Box & Kali Linux (5:57)
Important - New Kali Linux Categories (1:25)
Note: Kali Linux Updates All The Time!
Creating Our First Virtual Machine (7:09)
Note: Common Errors With Your First VM
Installing Kali Linux Operating System (12:08)
Update 1 - New & Old Versions of Kali Linux (2:21)
Networking Basics
Full Screen Mode & Network Settings (12:05)
Troubleshooting Network Connecting in Kali Linux (6:34)
Note: Getting Familiar With Kali Linux!
5 Stages Of A Penetration Test (7:35)
Let's Have Some Fun (+ Free Resources)
Linux Operating System
Navigating Through Linux System (11:26)
Creating Files & Managing Directories (12:40)
Network Commands & Sudo Privileges In Kali (11:21)
Note: Linux File System & Additional Commands
Reconnaissance & Information Gathering
What is Information Gathering? (4:40)
Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Whatweb Stealthy Scan (8:21)
Aggressive Website Technology Discovering on IP Range (9:50)
Note: Same Tools Different Results!
Gathering Emails Using theHarvester & Hunter.io (9:59)
How To Download Tools Online (10:34)
Finding Usernames With Sherlock (7:49)
Bonus - Email Scraper Tool In Python 3 (6:35)
Unlimited Updates
Scanning
Theory Behind Scanning (7:19)
TCP & UDP (4:21)
Installing Vulnerable Virtual Machine (6:01)
Netdiscover (6:01)
Performing First Nmap Scan (8:52)
Different Nmap Scan Types (10:41)
ZTM Nmap Cheatsheet
Discovering Target Operating System (6:00)
Detecting Version of Service Running on an Open Port (7:18)
Filtering Port Range & Output Of Scan Results (11:54)
What is a Firewall/IDS? (2:29)
Using Decoys and Packet Fragmentation (12:25)
Security Evasion Nmap Options (5:28)
Note: Time To Switch Things Up!
Course Check-In
Python Coding Project #1 - Portscanner
The 2 Paths
Note: Do We Need To Learn Programming To Be An Ethical Hacker?
Coding a Portscanner in Python 3 (25:03)
Vulnerability Analysis
Finding First Vulnerability With Nmap Scripts (16:58)
Manual Vulnerability Analysis & Searchsploit (7:42)
Nessus Installation (5:35)
Discovering Vulnerabilities With Nessus (14:56)
Scanning Windows 7 Machine With Nessus (4:13)
Let's Cool Down For A Bit! (1:14)
Implement a New Life System
Exploitation & Gaining Access
What is Exploitation? (7:08)
What is a Vulnerability? (5:24)
Reverse Shells, Bind Shells ... (2:42)
Metasploit Framework Structure (13:53)
Msfconsole Basic Commands (16:53)
Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Misconfigurations Happen - Bindshell Exploitation (4:41)
Information Disclosure - Telnet Exploit (4:06)
Software Vulnerability - Samba Exploitation (9:22)
Attacking SSH - Bruteforce Attack (11:56)
Exploitation Challenge - 5 Different Exploits (17:52)
Explaining Windows 7 Setup (8:46)
Eternal Blue Attack - Windows 7 Exploitation (12:33)
DoublePulsar Attack - Windows Exploit (15:04)
BlueKeep Vulnerability - Windows Exploit (9:35)
Note: We Can Also Target Routers!
Update 2 - Routersploit (6:25)
Update 3 - Router Default Credentials (7:02)
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
Note: Not Everything Will Work Smooth!
Setting Up Vulnerable Windows 10 (7:52)
Crashing Windows 10 Machine Remotely (6:52)
Exploiting Windows 10 Machine Remotely (13:59)
Gaining Access (Viruses, Trojans, Payloads ...)
Generating Basic Payload With Msfvenom (11:30)
Advance Msfvenom Usage Part 1 (9:48)
Advance Msfvenom Usage Part 2 (7:30)
Generating Powershell Payload Using Veil (14:36)
TheFatRat Payload Creation (7:43)
Note: My Payloads Are Getting Detected By An Antivirus!
Hexeditor & Antiviruses (7:09)
Making Our Payload Open An Image (8:10)
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Post Exploitation Theory (4:26)
Meterpreter Basic Commands Part 1 (11:03)
Meterpreter Basic Commands Part 2 (10:21)
Elevating Privileges With Different Modules (8:55)
Creating Persistence On The Target System (7:57)
Post Exploitation Modules (8:05)
Exploitation Recap (4:00)
Python Coding Project #2 - Backdoor
What Are We Creating? (2:47)
Connecting Server And Backdoor (10:22)
Processing Instructional Commands (6:27)
Sending and Receiving Data (6:23)
Executing Commands And Compiling The Program (12:08)
Changing Directory Inside Of Our Backdoor (6:02)
Uploading & Downloading Files (10:59)
Testing All The Commands (8:55)
Note: You Can Continue Building Onto This Project!
Exercise: Imposter Syndrome (2:55)
Website Application Penetration Testing
Website Penetration Testing Theory (11:37)
HTTP Request & Response (4:03)
Information Gathering & Dirb Tool (8:10)
Burpsuite Configuration (7:57)
ShellShock Exploitation (15:51)
Command Injection Exploitation (11:55)
Getting Meterpreter Shell With Command Execution (9:18)
Reflected XSS & Cookie Stealing (16:16)
Stored XSS (9:06)
HTML Injection (7:12)
SQL Injection (21:32)
CSRF Vulnerability (12:49)
Hydra Bruteforce Attack Example 1 (10:56)
Hydra Bruteforce Attack Example 2 (7:06)
Burpsuite Intruder (7:34)
Python Coding Project #3 - Login Bruteforce, Directory Discovery
Creating 2 Programs (1:46)
Bruteforcer In Python (27:09)
Hidden Directory Discovery (12:10)
Man In The Middle - MITM
Theory - Man In The Middle Attack (8:03)
Bettercap ARP Spoofing (11:29)
Ettercap Password Sniffing (8:58)
Manually Poisoning Targets ARP Cache With Scapy (12:21)
Bonus - Wireless Access Point Cracking
Wireless Cracking Theory (5:48)
Putting Wireless Card In Monitor Mode (3:43)
Deauthenticating Devices & Grabbing Password (11:24)
Aircrack Password Cracking (7:35)
Hashcat Password Cracking (9:42)
Bonus: Gaining Access To An Android Device
Android Hacking Theory (3:31)
Android VM Install (5:50)
Gaining Access With Android Meterpreter (10:15)
Evil Droid (7:52)
Is it Flappy Bird or Malware (12:49)
Hack Any Device On Any Network With Ngrok (11:47)
Bonus: Introduction To Anonymity
Anonymity Theory (4:22)
Tor Browser (8:47)
Proxychains With Nmap (7:31)
Installing VPN in Kali Linux (5:54)
Whoami Anonymity Tool (8:41)
Bonus: Hacking Active Directory
Enumerating Active Directory (19:22)
Exploiting Active Directory (14:03)
Escalating Privileges on the Domain (13:12)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
What's Next? (2:34)
Practice
Bug Bounty
Coding For Hackers
Exploit Development
Learn Python Basics
Watch Python Intro Section
Learn Python Intermediate
Watch Python Fundamentals Sections
Modules in Python (11:47)
Quick Note: Upcoming Videos
Optional: PyCharm (8:19)
Packages in Python (10:45)
Different Ways To Import (7:03)
Learn Python 3: Error Handling
Watch Error Handling Section
Learn Python 4: File I/O
Watch Python File I/O Section
Next Steps
Theory - Man In The Middle Attack
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures