Introduction
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Setting Up Our Hacking Lab
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - What is a Virtual Machine? (6:03)
 - Why Linux? (3:13)
 - Section 2 - Virtual Box and Kali Linux Download (4:52)
 - Important - New Kali Linux Categories (1:25)
 - Note: Kali Linux Updates All The Time!
 - Section 2 - Creating Our First Virtual Machine (9:14)
 - Note: Common Errors With Your First VM
 - Section 2 - Kali Linux Installation (10:00)
 - Update 1 - New & Old Versions of Kali Linux (2:21)
 - Networking Basics
 - Full Screen Mode & Network Settings (12:05)
 - Troubleshooting Network Connecting in Kali Linux (6:34)
 - Note: Getting Familiar With Kali Linux!
 - 5 Stages Of A Penetration Test (7:35)
 - Let's Have Some Fun (+ Free Resources)
 
    
    Linux Operating System
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Reconnaissance & Information Gathering
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - What is Information Gathering? (4:40)
 - Obtaining IP Address, Physical Address Using Whois Tool (9:57)
 - Whatweb Stealthy Scan (8:21)
 - Aggressive Website Technology Discovering on IP Range (9:50)
 - Note: Same Tools Different Results!
 - Gathering Emails Using theHarvester & Hunter.io (9:59)
 - How To Download Tools Online (10:34)
 - Finding Usernames With Sherlock (7:49)
 - Bonus - Email Scraper Tool In Python 3 (6:35)
 - Unlimited Updates
 
    
    Scanning
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - Theory Behind Scanning (7:19)
 - TCP & UDP (4:21)
 - Installing Vulnerable Virtual Machine (6:01)
 - Netdiscover (6:01)
 - Performing First Nmap Scan (8:52)
 - Different Nmap Scan Types (10:41)
 - ZTM Nmap Cheatsheet
 - Discovering Target Operating System (6:00)
 - Detecting Version of Service Running on an Open Port (7:18)
 - Filtering Port Range & Output Of Scan Results (11:54)
 - What is a Firewall/IDS? (2:29)
 - Using Decoys and Packet Fragmentation (12:25)
 - Security Evasion Nmap Options (5:28)
 - Note: Time To Switch Things Up!
 - Course Check-In
 
    
    Python Coding Project #1 - Portscanner
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Vulnerability Analysis
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Exploitation & Gaining Access
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - What is Exploitation? (7:08)
 - What is a Vulnerability? (5:24)
 - Reverse Shells, Bind Shells ... (2:42)
 - Metasploit Framework Structure (13:53)
 - Msfconsole Basic Commands (16:53)
 - Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
 - Misconfigurations Happen - Bindshell Exploitation (4:41)
 - Information Disclosure - Telnet Exploit (4:06)
 - Software Vulnerability - Samba Exploitation (9:22)
 - Attacking SSH - Bruteforce Attack (11:56)
 - Exploitation Challenge - 5 Different Exploits (17:52)
 - Explaining Windows 7 Setup (8:46)
 - Eternal Blue Attack - Windows 7 Exploitation (12:33)
 - DoublePulsar Attack - Windows Exploit (15:04)
 - BlueKeep Vulnerability - Windows Exploit (9:35)
 - Note: We Can Also Target Routers!
 - Update 2 - Routersploit (6:25)
 - Update 3 - Router Default Credentials (7:02)
 
    
    SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Gaining Access (Viruses, Trojans, Payloads ...)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - Generating Basic Payload With Msfvenom (11:30)
 - Advance Msfvenom Usage Part 1 (9:48)
 - Advance Msfvenom Usage Part 2 (7:30)
 - Generating Powershell Payload Using Veil (14:36)
 - TheFatRat Payload Creation (7:43)
 - Note: My Payloads Are Getting Detected By An Antivirus!
 - Hexeditor & Antiviruses (7:09)
 - Making Our Payload Open An Image (8:10)
 
    
    Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Python Coding Project #2 - Backdoor
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - What Are We Creating? (2:47)
 - Connecting Server And Backdoor (10:22)
 - Processing Instructional Commands (6:27)
 - Sending and Receiving Data (6:23)
 - Executing Commands And Compiling The Program (12:08)
 - Changing Directory Inside Of Our Backdoor (6:02)
 - Uploading & Downloading Files (10:59)
 - Testing All The Commands (8:55)
 - Note: You Can Continue Building Onto This Project!
 - Exercise: Imposter Syndrome (2:55)
 
    
    Website Application Penetration Testing
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - Website Penetration Testing Theory (11:37)
 - HTTP Request & Response (4:03)
 - Information Gathering & Dirb Tool (8:10)
 - Burpsuite Configuration (7:57)
 - ShellShock Exploitation (15:51)
 - Command Injection Exploitation (11:55)
 - Getting Meterpreter Shell With Command Execution (9:18)
 - Reflected XSS & Cookie Stealing (16:16)
 - Stored XSS (9:06)
 - HTML Injection (7:12)
 - SQL Injection (21:32)
 - CSRF Vulnerability (12:49)
 - Hydra Bruteforce Attack Example 1 (10:56)
 - Hydra Bruteforce Attack Example 2 (7:06)
 - Burpsuite Intruder (7:34)
 
    
    Python Coding Project #3 - Login Bruteforce, Directory Discovery
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Man In The Middle - MITM
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Bonus - Wireless Access Point Cracking
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Bonus: Gaining Access To An Android Device
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Bonus: Introduction To Anonymity
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Bonus: Hacking Active Directory
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Where To Go From Here?
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Learn Python Basics
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Learn Python Intermediate
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Learn Python 3: Error Handling
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Learn Python 4: File I/O
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll