Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Intermediate Ethical Hacking Hands-on Training
Section 1: Course Overview
Course Overview (5:20)
Section 2: Building Your Virtual Lab Environment Using VirtualBox
Video - Section 2 Overview (0:44)
Video - Downloading ISO and OVA Files for VirtualBox (10:09)
Video and Lab -Creating a Virtual install of Kali using VirtualBox (12:11)
Video and lab - Create a virtual install of Metasploitable2 (10:01)
Video - Spoofing Your Browser to Get Access to Windows 10 Pro (3:27)
Video and Lab - Creating Windows 10 Target Machine Using VirtualBox (7:57)
Video and Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VB (7:32)
Video - Installing the VirtualBox Extension Pack (2:18)
Section 3: Troubleshooting VirtualBox
Video - Adding a NAT Network in VirtualBox 7.0.2 (2:12)
Video - Fix Duplicate IP Address Issue With VirtualBox (1:48)
Section 4: NMap
Video and Lab - Installing the WebMap-Nmap Dashboard (11:55)
Video and Lab – Automated Recon/Enumeration Using nmap Automator (10:23)
Section 5: Enumerating a Windows 10 Target
Video - Creating a Vulnerable Windows 10 Target (4:11)
Video and Lab Enumerating Windows 10 Using WinPEAS (12:00)
Section 6: Reverse Shells, Privilege Escalation and Persistent Backdoors
Video and Lab - Create a Windows Reverse Shell Using the PowerShell (8:44)
Video and Lab – Create a Reverse Shell Using Command Injection (6:33)
Video and Lab - Create a Reverse Shell Using a File Upload (8:44)
Video and Lab - Launch an Automated Meterpreter Session (12:52)
Video and Lab - Upgrade a Dumb Terminal to Fully Functional BASH Shell (9:49)
Video and Lab - Windows 7 Privilege Escalation Using UAC Bypass (5:10)
Video and Lab - Creating a Persistent Backdoor Using a Persistent Service (14:09)
Section 7: Powershell Empire
Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox (12:15)
Video and Lab - Preparing Your Server 2016 Target (11:37)
Video and Lab - Promote Server 2016 to a Domain Controller (8:59)
Video and Lab - Installing PowerShell Empire StarKiller On Kali Linux (5:06)
Video and Lab - Enumerating Active Directory (15:30)
Video and Lab - Post-Exploitation of Windows Using PowerShell Empire (19:33)
Section 8: Post Exploitation of Microsoft Windows
Video and Lab – Advanced Password Hacking with Metasploit (13:22)
Video and Lab – Post-Exploitation of Microsoft Windows (13:41)
Video and Lab – Brute Force the SMB Password on a Windows Server (10:02)
video and Lab - Enumerating Active Directory Using RPCClient (16:04)
Video and Lab - Dumping Wi-Fi Credentials Using netsh (4:30)
Section 9: Program Scripting
Video and Lab - Quickly Transfer Files Using Python (9:25)
Video and Lab - File Transfer Using HTTP and PowerShell’s WebClient Object (4:42)
Section 10: Practical Pentesting Labs
Video and Lab - HTML Smuggling Attack (13:30)
Video and Lab - Heartbleed OpenSSL Exploit Vulnerability (17:51)
Video and Lab - Performing an RDP Brute Force Attack (13:53)
Video and Lab – Exploiting Active Directory using LLMNR/NBT-NS Poisoning (11:32)
Video and Lab - Accessing Kali Across the WAN with NGROK (14:53)
Video and Lab - Pentesting with Netcat (12:45)
Video and Lab - Enumerate DNS Records Using DNSRecon (12:40)
Video and Lab - Gathering Information Using Recon-ng (17:55)
Video and Lab – How to Appear Tech Savvy…Even if You're Not (8:46)
Section 11: Auditing Wireless Networks
Video and Lab - Installing a Wireless Adapter in Kali (9:06)
Video and Lab - Hacking a Wireless Network Using Kali Linux (14:12)
Video and Lab - Wireless Deauthentication Attack (6:44)
Video and Lab - PMKID Client-less Wireless Attack Using Bettercap (10:16)
Solved! Missing the hcxdumptool & hcxpcaptool in Kali (3:25)
Section 12: Wireshark
Video - Overview of Wireshark 3.2 (10:37)
Video - Wireshark Capture Options (7:21)
Video - Wireshark Toolbar Icons (3:32)
Video - Capturing Wireless Traffic Using Wireshark (5:07)
Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark (4:53)
Section 13: Web APP Penetration Testing
Video and Lab - Creating a virtual install of OWASP (5:46)
Video and lab - Setting Up Burp Suite (8:55)
Video and Lab - Attack Web Apps with Burp Suite Using SQL Injection (11:45)
Video and Lab - OS Command Injection Using Commix 3.2x (15:55)
Video - Web Application Firewall Detection Using WAFW00F (4:45)
Video and Lab – Exploit Vulnerable Web Applications Using Command Injection (9:18)
Video and Lab - Using Banner Grabbing to Aid in Reconnaissance (9:58)
Section 14: Anonymity - Remaining Anonymous While Pentesting
Anonymize Kali Using Whonix (10:09)
Section 15: CTF - SQL Injection to Shell Walkthrough
CTF Lab Preparation (4:32)
CTF - SQL Injection to Shell Walkthrough (13:16)
Audio Version of Training
Audio Download
Video and lab - Setting Up Burp Suite
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock