Learn Ethical Hacking From Scratch

Categories:Ethical Hacking and Penetration TestingCyber Security
This course includes

Course Introduction & Overview
2:53
Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam
6:32
What Is Hacking & Why Learn It
3:09

Lab Overview & Needed Software
7:48
Installing Kali 2019 As a Virtual Machine
10:13
Creating & Using Snapshots
5:36

Basic Overview of Kali Linux
5:10
The Terminal & Linux Commands
11:21

Network Penetration Testing Introduction
2:21
Networks Basics
4:28
Connecting a Wireless Adapter To Kali
5:09
What is MAC Address & How To Change It
8:20
Wireless Modes (Managed & Monitor)
6:57

Packet Sniffing Basics Using Airodump-ng
6:40
WiFi Bands - 2.4Ghz & 5Ghz Frequencies
7:54
Targeted Packet Sniffing Using Airodump-ng
10:30
Deauthentication Attack (Disconnecting Any Device From The Network)
6:50

Gaining Access Introduction
1:09
WEP Cracking - Theory Behind Cracking WEP Encryption
5:47
WEP Cracking - Basic Case
6:17
WEP Cracking - Fake Authentication
6:45
WEP Cracking - ARP Request Replay Attack
6:09
WPAWPA2 Cracking - Introduction
3:42
WPAWPA2 Cracking - Exploiting WPS Feature
10:11
WPAWPA2 Cracking - How To Capture The Handshake
6:49
WPAWPA2 Cracking - Creating a Wordlist
7:33
WPAWPA2 Cracking - Using a Wordlist Attack
6:26
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network
6:25

Introduction
2:10
Installing Windows As a Virtual Machine
3:32
Information Gathering - Discovering Connected Clients using netdiscover
8:39
Gathering More Information Using Zenmap
6:45
Gathering Even More Information Using Zenmap
8:08
MITM - ARP Poisoning Theory
9:04
MITM - ARP Spoofing using arpspoof
6:30
MITM - ARP Spoofing Using MITMf
5:14
MITM - Bypassing HTTPS
6:39
MITM - DNS Spoofing
4:53
MITM - Capturing Screen Of Target & Injecting a Keylogger
9:50
MITM - Injecting JavascriptHTML Code
8:59
MITM - Using MITMf Against Real Networks
9:09
Wireshark - Basic Overview & How To Use It With MITM Attacks
9:09
Wireshark - Sniffing Data & Analysing HTTP Traffic
8:01
Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network
5:34
Creating a Fake Access Point (Honeypot) - Theory
9:15
Creating a Fake Access Point (Honeypot) - Practical
11:12

Detecting ARP Poisoning Attacks
5:10
Detecting suspicious Activities Using Wireshark
5:51

Gaining Access Introduction
4:14

Installing Metasploitable As a Virtual Machine
6:21
Introduction
4:05
Basic Information Gathering & Exploitation
10:06
Using a Basic Metasploit Exploit
7:31
Exploiting a Code Execution Vulnerability
10:03
MSFC - Installing MSFC (Metasploit Community)
5:47
MSFC - Scanning Target(s) For Vulnerabilities
3:21
MSFC - Analysing Scan results & Exploiting Target System
9:42
Nexpose - Installing Nexpose
9:59
Nexpose - How To Configure & Launch a Scan
9:16
Nexpose - Analysing Scan Results & Generating Reports
7:56

Introduction
2:19
Installing Veil 3.1
6:20
Veil Overview & Payloads Basics
7:20
Generating An Undetectable Backdoor Using Veil 3
9:44
Listening For Incoming Connections
7:19
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
7:12
Backdoor Delivery Method 1 - Using a Fake Update
9:48
Backdoor Delivery Method 2 - Backdooring Downloads on The Fly
8:23
How to Protect Yourself From The Discussed Delivery Methods
3:52

Introduction
2:43
Maltego Basics
5:48
Discovering Websites, Links & Social Networking Accounts Associated With Target
7:33
Discovering Twitter Friends & Associated Accounts
4:57
Discovering Emails Of The Target's Friends
3:48
Analysing The Gathered Info & Building An Attack Strategy
8:41
Backdooring Any File Type (images, pdf's ...etc)
4:41
Compiling & Changing Trojan's Icon
6:16
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc)
8:29
Spoofing Emails - Setting Up am SMTP Server
7:34
Email Spoofing - Sending Emails as Any Email Account
14:03
BeEF Overview & Basic Hook Method
6:39
BeEF - hooking targets using MITMf
2:58
BeEF - Running Basic Commands On Target
4:24
BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt
2:17
BeEF - Gaining Full Control Over Windows Target
3:39
Detecting Trojans Manually
5:32
Detecting Trojans Using a Sandbox
3:16

Overview of the Setup
6:07
Ex1 - Generating a Backdoor That Works Outside The Network
5:24
Configuring The Router To Forward Connections To Kali
6:59
Ex2 - Using BeEF Outside The Network
5:49

Introduction
2:02
Meterpreter Basics
6:22
File System Commands
5:09
Maintaining Access - Basic Methods
5:07
Maintaining Access - Using a Reliable & Undetectable Method
6:53
Spying - Capturing Key Strikes & Taking Screen Shots
2:39
Pivoting - Theory (What is Pivoting)
7:07
Pivoting - Exploiting Devices on The Same Network As The Target Computer
8:11

Introduction - What Is A Website
4:16
How To Hack a Website
3:51

Gathering Basic Information Using Whois Lookup
5:36
Discovering Technologies Used On The Website
6:03
Gathering Comprehensive DNS Information
10:23
Discovering Websites On The Same Server
3:42
Discovering Subdomains
5:05
Discovering Sensitive Files
7:25
Analysing Discovered Files
4:17

Discovering & Exploiting File Upload Vulnerabilities
6:43
Discovering & Exploiting Code Execution Vulnerabilities
7:25
Discovering & Exploiting Local File Inclusion Vulnerabilities
5:16
Remote File Inclusion Vulnerabilities - Configuring PHP Settings
3:45
Remote File Inclusion Vulnerabilities - Discovery & Exploitation
5:44
Preventing The Above Vulnerabilities
7:19

What is SQL
5:48
Dangers of SQL Injection Vulnerabilities
2:53
Discovering SQL injections In POST
7:56
Bypassing Logins Using SQL injection Vulnerability
4:48
Discovering SQL injections in GET
7:02
Reading Database Information
5:26
Finding Database Tables
3:33
Extracting Sensitive Data Such As Passwords
4:29
Reading & Writing Files On The Server Using SQL Injection Vulnerability
5:57
Discovering SQL Injections & Extracting Data Using SQLmap
6:47
The Right Way To Prevent SQL Injection
4:58

Introduction - What is XSS or Cross Site Scripting
3:09
Discovering Reflected XSS
3:46
Discovering Stored XSS
2:56
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF
5:31
Preventing XSS Vulnerabilities
5:13

Scanning Target Website For Vulnerabilities
4:19
Analysing Scan Results
4:11

Bonus Lecture - What's Next
This course includes