Learn Ethical Hacking From Scratch
Categories:Ethical Hacking and Penetration TestingCyber Security
This course includes
- Course Content
- Description
- What To Learn
- Materials Included
- Requirements
- Target Audience
Course Introduction & Overview 2:53
Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam 6:32
What Is Hacking & Why Learn It 3:09
Lab Overview & Needed Software 7:48
Installing Kali 2019 As a Virtual Machine 10:13
Creating & Using Snapshots 5:36
Basic Overview of Kali Linux 5:10
The Terminal & Linux Commands 11:21
Network Penetration Testing Introduction 2:21
Connecting a Wireless Adapter To Kali 5:09
What is MAC Address & How To Change It 8:20
Wireless Modes (Managed & Monitor) 6:57
Packet Sniffing Basics Using Airodump-ng 6:40
WiFi Bands - 2.4Ghz & 5Ghz Frequencies 7:54
Targeted Packet Sniffing Using Airodump-ng 10:30
Deauthentication Attack (Disconnecting Any Device From The Network) 6:50
Gaining Access Introduction 1:09
WEP Cracking - Theory Behind Cracking WEP Encryption 5:47
WEP Cracking - Basic Case 6:17
WEP Cracking - Fake Authentication 6:45
WEP Cracking - ARP Request Replay Attack 6:09
WPAWPA2 Cracking - Introduction 3:42
WPAWPA2 Cracking - Exploiting WPS Feature 10:11
WPAWPA2 Cracking - How To Capture The Handshake 6:49
WPAWPA2 Cracking - Creating a Wordlist 7:33
WPAWPA2 Cracking - Using a Wordlist Attack 6:26
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network 6:25
Installing Windows As a Virtual Machine 3:32
Information Gathering - Discovering Connected Clients using netdiscover 8:39
Gathering More Information Using Zenmap 6:45
Gathering Even More Information Using Zenmap 8:08
MITM - ARP Poisoning Theory 9:04
MITM - ARP Spoofing using arpspoof 6:30
MITM - ARP Spoofing Using MITMf 5:14
MITM - Capturing Screen Of Target & Injecting a Keylogger 9:50
MITM - Injecting JavascriptHTML Code 8:59
MITM - Using MITMf Against Real Networks 9:09
Wireshark - Basic Overview & How To Use It With MITM Attacks 9:09
Wireshark - Sniffing Data & Analysing HTTP Traffic 8:01
Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network 5:34
Creating a Fake Access Point (Honeypot) - Theory 9:15
Creating a Fake Access Point (Honeypot) - Practical 11:12
Detecting ARP Poisoning Attacks 5:10
Detecting suspicious Activities Using Wireshark 5:51
Gaining Access Introduction 4:14
Installing Metasploitable As a Virtual Machine 6:21
Basic Information Gathering & Exploitation 10:06
Using a Basic Metasploit Exploit 7:31
Exploiting a Code Execution Vulnerability 10:03
MSFC - Installing MSFC (Metasploit Community) 5:47
MSFC - Scanning Target(s) For Vulnerabilities 3:21
MSFC - Analysing Scan results & Exploiting Target System 9:42
Nexpose - Installing Nexpose 9:59
Nexpose - How To Configure & Launch a Scan 9:16
Nexpose - Analysing Scan Results & Generating Reports 7:56
Veil Overview & Payloads Basics 7:20
Generating An Undetectable Backdoor Using Veil 3 9:44
Listening For Incoming Connections 7:19
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 7:12
Backdoor Delivery Method 1 - Using a Fake Update 9:48
Backdoor Delivery Method 2 - Backdooring Downloads on The Fly 8:23
How to Protect Yourself From The Discussed Delivery Methods 3:52
Discovering Websites, Links & Social Networking Accounts Associated With Target 7:33
Discovering Twitter Friends & Associated Accounts 4:57
Discovering Emails Of The Target's Friends 3:48
Analysing The Gathered Info & Building An Attack Strategy 8:41
Backdooring Any File Type (images, pdf's ...etc) 4:41
Compiling & Changing Trojan's Icon 6:16
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc) 8:29
Spoofing Emails - Setting Up am SMTP Server 7:34
Email Spoofing - Sending Emails as Any Email Account 14:03
BeEF Overview & Basic Hook Method 6:39
BeEF - hooking targets using MITMf 2:58
BeEF - Running Basic Commands On Target 4:24
BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt 2:17
BeEF - Gaining Full Control Over Windows Target 3:39
Detecting Trojans Manually 5:32
Detecting Trojans Using a Sandbox 3:16
Ex1 - Generating a Backdoor That Works Outside The Network 5:24
Configuring The Router To Forward Connections To Kali 6:59
Ex2 - Using BeEF Outside The Network 5:49
Maintaining Access - Basic Methods 5:07
Maintaining Access - Using a Reliable & Undetectable Method 6:53
Spying - Capturing Key Strikes & Taking Screen Shots 2:39
Pivoting - Theory (What is Pivoting) 7:07
Pivoting - Exploiting Devices on The Same Network As The Target Computer 8:11
Introduction - What Is A Website 4:16
Gathering Basic Information Using Whois Lookup 5:36
Discovering Technologies Used On The Website 6:03
Gathering Comprehensive DNS Information 10:23
Discovering Websites On The Same Server 3:42
Discovering Sensitive Files 7:25
Analysing Discovered Files 4:17
Discovering & Exploiting File Upload Vulnerabilities 6:43
Discovering & Exploiting Code Execution Vulnerabilities 7:25
Discovering & Exploiting Local File Inclusion Vulnerabilities 5:16
Remote File Inclusion Vulnerabilities - Configuring PHP Settings 3:45
Remote File Inclusion Vulnerabilities - Discovery & Exploitation 5:44
Preventing The Above Vulnerabilities 7:19
Dangers of SQL Injection Vulnerabilities 2:53
Discovering SQL injections In POST 7:56
Bypassing Logins Using SQL injection Vulnerability 4:48
Discovering SQL injections in GET 7:02
Reading Database Information 5:26
Extracting Sensitive Data Such As Passwords 4:29
Reading & Writing Files On The Server Using SQL Injection Vulnerability 5:57
Discovering SQL Injections & Extracting Data Using SQLmap 6:47
The Right Way To Prevent SQL Injection 4:58
Introduction - What is XSS or Cross Site Scripting 3:09
Discovering Reflected XSS 3:46
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF 5:31
Preventing XSS Vulnerabilities 5:13
Scanning Target Website For Vulnerabilities 4:19
Bonus Lecture - What's Next