Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Intermediate Ethical Hacking Hands-on Training
Section 1: Course Overview
1.1 Course Overview (5:20)
Section 2: Building Your Virtual Lab Environment Using VirtualBox
2. Video - Section 2 Overview (0:44)
3. Video - Downloading ISO and OVA Files for VirtualBox (10:09)
4. Video and Lab -Creating a Virtual install of Kali using VirtualBox (12:11)
5. Video and lab - Create a virtual install of Metasploitable2 (10:01)
6. Video and Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VB (7:32)
7. Video and Lab - Creating Windows 10 Target Machine Using VirtualBox (8:17)
8. Video - Installing the VirtualBox Extension Pack (2:18)
Section 3: Troubleshooting VirtualBox
10. Video - Fix Duplicate IP Address Issue With VirtualBox (1:48)
9. Video - Adding a NAT Network in VirtualBox 7.0.2 (2:12)
Section 4: NMap
11. Video and Lab - Installing the WebMap-Nmap Dashboard (11:55)
12. Video and Lab – Automated Recon/Enumeration Using nmap Automator (10:23)
Section 5: Enumerating a Windows 10 Target
13. Video - Creating a Vulnerable Windows 10 Target (4:11)
14. Video and Lab Enumerating Windows 10 Using WinPEAS (12:00)
Section 6: Reverse Shells, Privilege Escalation and Persistent Backdoors
15. Video and Lab - Create a Windows Reverse Shell Using the PowerShell (8:44)
16. Video and Lab – Create a Reverse Shell Using Command Injection (6:33)
17. Video and Lab - Create a Reverse Shell Using a File Upload (8:44)
18. Video and Lab - Launch an Automated Meterpreter Session (12:52)
19. Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH Shell (9:49)
20. Video and Lab - Windows 7 Privilege Escalation Using UAC Bypass (5:10)
21. Video and Lab - Creating a Persistent Backdoor Using a Persistent Service (14:09)
Section 7: Powershell Empire
22. Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox (12:15)
23. Video and Lab - Preparing Your Server 2016 Target (11:37)
24. Video and Lab - Promote Server 2016 to a Domain Controller (8:59)
25. Video and Lab - Installing PowerShell Empire StarKiller On Kali Linux (5:06)
26. Video and Lab - Enumerating Active Directory (15:30)
27. Video and Lab - Post-Exploitation of Windows Using PowerShell Empire (19:33)
Section 8: Post Exploitation of Microsoft Windows
28. Video and Lab – Advanced Password Hacking with Metasploit (13:22)
29. Video and Lab – Post-Exploitation of Microsoft Windows (13:41)
30. Video and Lab – Brute Force the SMB Password on a Windows Server (10:02)
31- video and Lab - Enumerating Active Directory Using RPCClient (16:04)
32. Video and Lab - Dumping Wi-Fi Credentials Using netsh (4:30)
Section 9: Program Scripting
34. Video and Lab - Quickly Transfer Files Using Python (9:25)
33. Video and Lab - File Transfer Using HTTP and PowerShell’s WebClient Object (4:42)
Section 10: Practical Pentesting Labs
36. Video and Lab - Heartbleed OpenSSL Exploit Vulnerability (17:51)
35. Video and Lab - HTML Smuggling Attack (13:30)
37. Video and Lab - Performing an RDP Brute Force Attack (13:53)
38. Video and Lab – Exploiting Active Directory using LLMNR/NBT-NS Poisoning (11:32)
39. Video and Lab - Accessing Kali Across the WAN with NGROK (14:53)
40. Video and Lab - Pentesting with Netcat (12:45)
41. Video and Lab - Enumerate DNS Records Using DNSRecon (12:40)
Section 11: Auditing Wireless Networks
42. Video and Lab - Installing a Wireless Adapter in Kali (9:06)
43. Video and Lab - Hacking a Wireless Network Using Kali Linux (14:12)
44. Video and Lab - Wireless Deauthentication Attack (6:44)
45. Video and Lab - PMKID Client-less Wireless Attack Using Bettercap (10:16)
Section 12: Wireshark
46. Video - Overview of Wireshark 3.2 (10:37)
47. Video - Wireshark Capture Options (7:21)
48. Video - Wireshark Toolbar Icons (3:32)
49. Video - Capturing Wireless Traffic Using Wireshark (5:07)
50. Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark (4:53)
Section 13: Web APP Penetration Testing
51. Video and Lab - Creating a virtual install of OWASP (5:46)
52. Video and lab - Setting Up Burp Suite (8:55)
53. Video and Lab - Attack Web Apps with Burp Suite Using SQL Injection (11:45)
54. Video and Lab - OS Command Injection Using Commix 3.2x (15:55)
55. Video - Web Application Firewall Detection Using WAFW00F (4:45)
56. Video and Lab – Exploit Vulnerable Web Applications Using Command Injection (9:18)
57. Video and Lab - Using Banner Grabbing to Aid in Reconnaissance (9:58)
Section 14: Anonymity - Remaining Anonymous While Pentesting
11.1 Anonymize Kali Using Whonix (10:09)
Section 15: CTF - SQL Injection to Shell Walkthrough
12.1 CTF Lab Preparation (4:32)
12.2 CTF - SQL Injection to Shell Walkthrough (13:16)
Audio Version of Training
Audio Download
46. Video - Overview of Wireshark 3.2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock