Introduction
Available in
days
days
after you enroll
Setting Up Our Hacking Lab
Available in
days
days
after you enroll
- What is a Virtual Machine? (6:03)
- Why Linux? (3:13)
- Downloading Virtual Box & Kali Linux (5:57)
- Important - New Kali Linux Categories (1:25)
- Note: Kali Linux Updates All The Time!
- Creating Our First Virtual Machine (7:09)
- Note: Common Errors With Your First VM
- Installing Kali Linux Operating System (12:08)
- Update 1 - New & Old Versions of Kali Linux (2:21)
- Networking Basics
- Full Screen Mode & Network Settings (12:05)
- Troubleshooting Network Connecting in Kali Linux (6:34)
- Note: Getting Familiar With Kali Linux!
- 5 Stages Of A Penetration Test (7:35)
- Let's Have Some Fun (+ Free Resources)
Linux Operating System
Available in
days
days
after you enroll
Reconnaissance & Information Gathering
Available in
days
days
after you enroll
- What is Information Gathering? (4:40)
- Obtaining IP Address, Physical Address Using Whois Tool (9:57)
- Whatweb Stealthy Scan (8:21)
- Aggressive Website Technology Discovering on IP Range (9:50)
- Note: Same Tools Different Results!
- Gathering Emails Using theHarvester & Hunter.io (9:59)
- How To Download Tools Online (10:34)
- Finding Usernames With Sherlock (7:49)
- Bonus - Email Scraper Tool In Python 3 (6:35)
- Unlimited Updates
Scanning
Available in
days
days
after you enroll
- Theory Behind Scanning (7:19)
- TCP & UDP (4:21)
- Installing Vulnerable Virtual Machine (6:01)
- Netdiscover (6:01)
- Performing First Nmap Scan (8:52)
- Different Nmap Scan Types (10:41)
- ZTM Nmap Cheatsheet
- Discovering Target Operating System (6:00)
- Detecting Version of Service Running on an Open Port (7:18)
- Filtering Port Range & Output Of Scan Results (11:54)
- What is a Firewall/IDS? (2:29)
- Using Decoys and Packet Fragmentation (12:25)
- Security Evasion Nmap Options (5:28)
- Note: Time To Switch Things Up!
- Course Check-In
Python Coding Project #1 - Portscanner
Available in
days
days
after you enroll
Vulnerability Analysis
Available in
days
days
after you enroll
Exploitation & Gaining Access
Available in
days
days
after you enroll
- What is Exploitation? (7:08)
- What is a Vulnerability? (5:24)
- Reverse Shells, Bind Shells ... (2:42)
- Metasploit Framework Structure (13:53)
- Msfconsole Basic Commands (16:53)
- Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
- Misconfigurations Happen - Bindshell Exploitation (4:41)
- Information Disclosure - Telnet Exploit (4:06)
- Software Vulnerability - Samba Exploitation (9:22)
- Attacking SSH - Bruteforce Attack (11:56)
- Exploitation Challenge - 5 Different Exploits (17:52)
- Explaining Windows 7 Setup (8:46)
- Eternal Blue Attack - Windows 7 Exploitation (12:33)
- DoublePulsar Attack - Windows Exploit (15:04)
- BlueKeep Vulnerability - Windows Exploit (9:35)
- Note: We Can Also Target Routers!
- Update 2 - Routersploit (6:25)
- Update 3 - Router Default Credentials (7:02)
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
Available in
days
days
after you enroll
Gaining Access (Viruses, Trojans, Payloads ...)
Available in
days
days
after you enroll
- Generating Basic Payload With Msfvenom (11:30)
- Advance Msfvenom Usage Part 1 (9:48)
- Advance Msfvenom Usage Part 2 (7:30)
- Generating Powershell Payload Using Veil (14:36)
- TheFatRat Payload Creation (7:43)
- Note: My Payloads Are Getting Detected By An Antivirus!
- Hexeditor & Antiviruses (7:09)
- Making Our Payload Open An Image (8:10)
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Available in
days
days
after you enroll
Python Coding Project #2 - Backdoor
Available in
days
days
after you enroll
- What Are We Creating? (2:47)
- Connecting Server And Backdoor (10:22)
- Processing Instructional Commands (6:27)
- Sending and Receiving Data (6:23)
- Executing Commands And Compiling The Program (12:08)
- Changing Directory Inside Of Our Backdoor (6:02)
- Uploading & Downloading Files (10:59)
- Testing All The Commands (8:55)
- Note: You Can Continue Building Onto This Project!
- Exercise: Imposter Syndrome (2:55)
Website Application Penetration Testing
Available in
days
days
after you enroll
- Website Penetration Testing Theory (11:37)
- HTTP Request & Response (4:03)
- Information Gathering & Dirb Tool (8:10)
- Burpsuite Configuration (7:57)
- ShellShock Exploitation (15:51)
- Command Injection Exploitation (11:55)
- Getting Meterpreter Shell With Command Execution (9:18)
- Reflected XSS & Cookie Stealing (16:16)
- Stored XSS (9:06)
- HTML Injection (7:12)
- SQL Injection (21:32)
- CSRF Vulnerability (12:49)
- Hydra Bruteforce Attack Example 1 (10:56)
- Hydra Bruteforce Attack Example 2 (7:06)
- Burpsuite Intruder (7:34)
Python Coding Project #3 - Login Bruteforce, Directory Discovery
Available in
days
days
after you enroll
Man In The Middle - MITM
Available in
days
days
after you enroll
Bonus - Wireless Access Point Cracking
Available in
days
days
after you enroll
Bonus: Gaining Access To An Android Device
Available in
days
days
after you enroll
Bonus: Introduction To Anonymity
Available in
days
days
after you enroll
Bonus: Hacking Active Directory
Available in
days
days
after you enroll
Where To Go From Here?
Available in
days
days
after you enroll
Learn Python Basics
Available in
days
days
after you enroll
Learn Python Intermediate
Available in
days
days
after you enroll
Learn Python 3: Error Handling
Available in
days
days
after you enroll
Learn Python 4: File I/O
Available in
days
days
after you enroll