Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is a Virtual Machine? (6:03)
- Why Linux? (3:13)
- Downloading Virtual Box & Kali Linux (5:57)
- Important - New Kali Linux Categories (1:25)
- Note: Kali Linux Updates All The Time!
- Creating Our First Virtual Machine (7:09)
- Note: Common Errors With Your First VM
- Installing Kali Linux Operating System (12:08)
- Update 1 - New & Old Versions of Kali Linux (2:21)
- Networking Basics
- Full Screen Mode & Network Settings (12:05)
- Troubleshooting Network Connecting in Kali Linux (6:34)
- Note: Getting Familiar With Kali Linux!
- 5 Stages Of A Penetration Test (7:35)
- Let's Have Some Fun (+ Free Resources)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Information Gathering? (4:40)
- Obtaining IP Address, Physical Address Using Whois Tool (9:57)
- Whatweb Stealthy Scan (8:21)
- Aggressive Website Technology Discovering on IP Range (9:50)
- Note: Same Tools Different Results!
- Gathering Emails Using theHarvester & Hunter.io (9:59)
- How To Download Tools Online (10:34)
- Finding Usernames With Sherlock (7:49)
- Bonus - Email Scraper Tool In Python 3 (6:35)
- Unlimited Updates
Available in
days
days
after you enroll
- Theory Behind Scanning (7:19)
- TCP & UDP (4:21)
- Installing Vulnerable Virtual Machine (6:01)
- Netdiscover (6:01)
- Performing First Nmap Scan (8:52)
- Different Nmap Scan Types (10:41)
- ZTM Nmap Cheatsheet
- Discovering Target Operating System (6:00)
- Detecting Version of Service Running on an Open Port (7:18)
- Filtering Port Range & Output Of Scan Results (11:54)
- What is a Firewall/IDS? (2:29)
- Using Decoys and Packet Fragmentation (12:25)
- Security Evasion Nmap Options (5:28)
- Note: Time To Switch Things Up!
- Course Check-In
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Exploitation? (7:08)
- What is a Vulnerability? (5:24)
- Reverse Shells, Bind Shells ... (2:42)
- Metasploit Framework Structure (13:53)
- Msfconsole Basic Commands (16:53)
- Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
- Misconfigurations Happen - Bindshell Exploitation (4:41)
- Information Disclosure - Telnet Exploit (4:06)
- Software Vulnerability - Samba Exploitation (9:22)
- Attacking SSH - Bruteforce Attack (11:56)
- Exploitation Challenge - 5 Different Exploits (17:52)
- Explaining Windows 7 Setup (8:46)
- Eternal Blue Attack - Windows 7 Exploitation (12:33)
- DoublePulsar Attack - Windows Exploit (15:04)
- BlueKeep Vulnerability - Windows Exploit (9:35)
- Note: We Can Also Target Routers!
- Update 2 - Routersploit (6:25)
- Update 3 - Router Default Credentials (7:02)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Generating Basic Payload With Msfvenom (11:30)
- Advance Msfvenom Usage Part 1 (9:48)
- Advance Msfvenom Usage Part 2 (7:30)
- Generating Powershell Payload Using Veil (14:36)
- TheFatRat Payload Creation (7:43)
- Note: My Payloads Are Getting Detected By An Antivirus!
- Hexeditor & Antiviruses (7:09)
- Making Our Payload Open An Image (8:10)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What Are We Creating? (2:47)
- Connecting Server And Backdoor (10:22)
- Processing Instructional Commands (6:27)
- Sending and Receiving Data (6:23)
- Executing Commands And Compiling The Program (12:08)
- Changing Directory Inside Of Our Backdoor (6:02)
- Uploading & Downloading Files (10:59)
- Testing All The Commands (8:55)
- Note: You Can Continue Building Onto This Project!
- Exercise: Imposter Syndrome (2:55)
Available in
days
days
after you enroll
- Website Penetration Testing Theory (11:37)
- HTTP Request & Response (4:03)
- Information Gathering & Dirb Tool (8:10)
- Burpsuite Configuration (7:57)
- ShellShock Exploitation (15:51)
- Command Injection Exploitation (11:55)
- Getting Meterpreter Shell With Command Execution (9:18)
- Reflected XSS & Cookie Stealing (16:16)
- Stored XSS (9:06)
- HTML Injection (7:12)
- SQL Injection (21:32)
- CSRF Vulnerability (12:49)
- Hydra Bruteforce Attack Example 1 (10:56)
- Hydra Bruteforce Attack Example 2 (7:06)
- Burpsuite Intruder (7:34)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll