Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking - Hands-On Training - Part I
Section 1: Course Overview
1. Course Overview (3:57)
Section 2: Virtual Lab Build
2. Download ISO and OVA files for VirtuallBox (8:04)
3. Create a Virtual install of Kali using VirtualBox (12:11)
4. Installing CSI Linux (11:44)
5. Create an Unattended Install of XP Using VirtualBox (7:31)
6. Installing the VirtualBox Extension Pack (2:18)
7. Taking a Snapshot of Your Current configuration (4:13)
Section 3: Passive Reconnaissance
8. Gathering Information Using Maltego CE (9:30)
9. Gathering Information Using CSI Linux Investigator (8:23)
10. Preparing CSI Liniux for Using Shodan (5:03)
11. Using Shodan to Find Vulnerable Devices Connected to the Internet (15:33)
12. Using Shodan to Search for Vulnerable Databases (8:07)
13. Using Metagofil inside CSI Analyst (5:01)
Section 4: Scanning and Enumeration
14. Introduction to Nmap (16:35)
15. Nmap Scripting Engine (NSE) (18:35)
16. Scanning for WannaCry Ransomware (14:04)
Section 5: Scanning for Vulnerabilities Using Nessus
17. Installing NESSUS Using Docker (11:03)
18. Scanning for Vulnerabilities Using Nessus (10:07)
19. Using Your Nessus Scan Results (11:51)
Section 6: Scanning for Vulnerabilities OpenVAS
20. Installing OpenVAS Using Docker (9:11)
21. Scanning for Vulnerabilities Using OpenVAS (10:15)
Section 7: Exploiting Microsoft Windows
22. Using Metasploit to Launch a DOS Attack Against Windows XP (8:39)
23. Establishing A VNC Shell Using Meterpreter (17:35)
24. Using Meterpreter to backdoor Windows XP (11:41)
25. Lab - Exploiting Vulnerable Applications on Windows XP SP2
26. Lab - Hacking Windows XP via MS11-006 Windows Shell Graphics Processing
Section 8: Exploiting Linux
27. Installing Metasploitable2 Using VirtualBox (10:01)
28. Exploring Endpoint Attacks
29. This is SPARTA (16:40)
30. Lab - Learning to Hack Linux Using Metasploitable2
Section 9: Social Engineering
31. Harvesting Credentials Using the SET Tool Kit (6:46)
Section 10: BASH Scripting for Pentesters
32. Intro to BASH scripting (7:39)
33. Creating a BASH Script for Scanning Vulnerable Ports (16:09)
34. Linux Fedora BASH Scripting Part I (10:41)
35. Linux Fedora BASH Scripting Part II
Section 11: Password Cracking
36. Password Cracking Using Medusa (5:58)
37. Password Cracking Using Mimikatz (11:00)
38. Password Cracking Using Hydra (4:40)
Section 12: Pentesting Wireless Networks
39. Installing a Wireless Adapter in Kali (9:06)
40. Hacking a Wireless Network Using Kali Linux (14:12)
41. Wireless Deauthentication Attack (6:44)
42. PMKID Client-less Wireless Attack Using Bettercap (10:16)
Section 13: Web Based Application Attacks
43. Installing w3af in Kali Linux Using Docker (12:46)
44. Conducting A Website Vulnerability Scan Using w3af (5:10)
45. Performing a Browser Based Attack (12:07)
46. SQL Injection Attack Using SQLMap (12:19)
Section 14: Browser Exploitation Framework (BeEF)
47. Configuring Kali for Exploiting the WAN (16:26)
48. The Browser Exploitation Framework (BeEF) (19:03)
Section 15: Remaining Anonymous
49. Anonymize Kali Using Whonix (10:09)
50. Assigning a Random MAC Address in Kali (7:26)
51. Ensuring Anonymity Using the CSI Linux Gateway (12:31)
Section 16: CTF Mr Robot
52. Lab file - Capture the Flag (CTF) – Mr. Robot
53. V.6.1 Capture the Flag (CTF) – Mr. Robot - Part I (13:11)
54. V.6.2 Capture the Flag (CTF) - Mr. Robot - Part 2 (19:03)
55. V.6.3 Capture the Flag (CTF) -Mr. Robot - Part 3 (7:14)
Section 17: CTF Stapler
56. Lab File - Walkthrough - CTF – Stapler
57. V.5.1 Capture the Flag - Stapler -Part 1 (17:49)
58. V.5.2 Capture the Flag - Stapler -Part2 (16:49)
59. V.5.3 Capture the Flag - Stapler -Part 3 (12:24)
Audio Version of Training
Audio Download
12. Using Shodan to Search for Vulnerable Databases
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock