- Curriculum
- Reviews
SECTION 1: INTRODUCTION
SECTION 2: SETTING UP OUR HACKING LAB
-
4What Is A Virtual Machine
-
5Why Linux
-
6Downloading Virtual Box & Kali Linux
-
7Important - New Kali Linux Categories
-
8Creating Our First Virtual Machine
-
9Installing Kali Linux Operating System
-
10New & Old Versions Of Kali Linux
-
11Full Screen Mode & Network Settings
-
125 Stages Of A Penetration Test
SECTION 3: LINUX OPERATING SYSTEM
SECTION 4: RECONNAISSANCE & INFORMATION GATHERING
-
16What Is Information Gathering
-
17Obtaining IP Address, Physical Address Using Whois Tool
-
18Whatweb Stealthy Scan
-
19Aggressive Website Technology Discovering On IP Range
-
20Gathering Emails Using The Harvester & Hunter.io
-
21How To Download Tools Online
-
22Finding Usernames With Sherlock
-
23Bonus - Email Scraper Tool In Python 3
SECTION 5: SCANNING
-
24Theory Behind Scanning
-
25TCP & UDP
-
26Installing Vulnerable Virtual Machine
-
27Netdiscover
-
28Performing First Nmap Scan
-
29Different Nmap Scan Types
-
30Discovering Target Operating System
-
31Detecting Version Of Service Running On An Open Port
-
32Filtering Port Range & Output Of Scan Results
-
33What Is A Firewall IDS
-
34Using Decoys And Packet Fragmentation
-
35Security Evasion Nmap Options
SECTION 6: PYTHON CODING PROJECT #1 - PORTSCANNER
SECTION 7: VULNERABILITY ANALYSIS
SECTION 8: EXPLOITATION & GAINING ACCESS
-
43What Is Exploitation
-
44What Is A Vulnerability
-
45Reverse Shells, Bind Shells
-
46Metasploit Framework Structure
-
47Msfconsole Basic Commands
-
48Our First Exploit - Vsftp 2.3.4 Exploitation
-
49Misconfigurations Happen - Bindshell Exploitation
-
50Information Disclosure - Telnet Exploit
-
51Software Vulnerability - Samba Exploitation
-
52Attacking SSH - Bruteforce Attack
-
53Exploitation Challenge - 5 Different Exploits
-
54Explaining Windows 7 Setup
-
55Eternal Blue Attack - Windows 7 Exploitation
-
56Double Pulsar Attack - Windows Exploit
-
57Blue Keep Vulnerability - Windows Exploit
-
58Update 2 – Routersploit
-
59Update 3 - Router Default Credentials
-
60Exercise Imposter Syndrome
SECTION 9: SMBGHOST CVE 2020-0796 - WINDOWS 10 MANUAL EXPLOITATION
SECTION 10: GAINING ACCESS (VIRUSES, TROJANS, PAYLOADS)
SECTION 11: POST EXPLOITATION - ELEVATING PRIVILEGES, EXTRACTING DATA, RUNNING KEYLOGGERS
SECTION 12: PYTHON CODING PROJECT #2 - BACKDOOR
SECTION 13: WEBSITE APPLICATION PENETRATION TESTING
-
86Website Penetration Testing Theory
-
87HTTP Request & Response
-
88Information Gathering & Dirb Tool
-
89Burp-suite Configuration
-
90ShellShock Exploitation
-
91Command Injection Exploitation
-
92Getting Meterpreter Shell With Command Execution
-
93Reflected XSS & Cookie Stealing
-
94Stored XSS
-
95HTML Injection
-
96SQL Injection
-
97CSRF Vulnerability
-
98Hydra Bruteforce Attack Example 1
-
99Hydra Bruteforce Attack Example 2
-
100Burp-suite Intruder
SECTION 14: PYTHON CODING PROJECT #3 - LOGIN BRUTEFORCE, DIRECTORY DISCOVERY
SECTION 15: MAN IN THE MIDDLE - MITM
SECTION 16: EXTRA WIRELESS ACCESS POINT CRACKING
SECTION 17: EXTRA GAINING ACCESS TO ANDROID DEVICE
SECTION 18: EXTRA INTRODUCTION TO ANONYMITY
SECTION 19: WHERE TO GO FROM HERE
SECTION 20: LEARN PYTHON BASICS
SECTION 21: LEARN PYTHON INTERMEDIATE
-
132Learning Python
-
133Python Data Types
-
134Numbers
-
135Math Functions
-
136Developer Fundamentals I
-
137Operator Precedence
-
138Optional Bin() And Complex
-
139Variables
-
140Expressions Vs Statements
-
141Augmented Assignment Operator
-
142Strings
-
143String Concatenation
-
144Type Conversion
-
145Escape Sequences
-
146Formatted Strings
-
147String Indexes
-
148Immutability
-
149Built-In Functions + Methods
-
150Booleans
-
151Exercise Type Conversion
-
152Developer Fundamentals II
-
153Exercise Password Checker
-
154Lists
-
155List Slicing
-
156Matrix
-
157List Methods I
-
158List Methods II
-
159List Methods III
-
160Common List Patterns
-
161List Unpacking
-
162None
-
163Dictionaries
-
164Developer Fundamentals III
-
165Dictionary Keys
-
166Dictionary Methods I
-
167Dictionary Methods II
-
168Tuples I
-
169Tuples II
-
170Sets I
-
171Sets II
-
172Breaking The Flow
-
173Conditional Logic
-
174Indentation In Python
-
175Truthy Vs Falsey
-
176Ternary Operator
-
177Short Circuiting
-
178Logical Operators
-
179Exercise Logical Operators
-
180Is Vs ==
-
181For Loops
-
182Iterables
-
183Exercise Tricky Counter
-
184Range()
-
185Enumerate()
-
186While Loops I
-
187While Loops II
-
188Break, Continue, Pass
-
189Our First GUI
-
190Developer Fundamentals IV
-
191Exercise Find Duplicates
-
192Functions
-
193Parameters And Arguments
-
194Default Parameters And Keyword Arguments
-
195Return
-
196Methods Vs Functions
-
197Docstrings
-
198Clean Code
-
199Args And Kwargs
-
200Exercise Functions
-
201Scope
-
202Scope Rules
-
203Global Keyword
-
204Nonlocal Keyword
-
205Why Do We Need Scope
-
206Modules In Python
-
207Optional Py Charm
-
208Packages In Python
-
209Different Ways To Import
SECTION 22: LEARN PYTHON 3 ERROR HANDLING
SECTION 23: LEARN PYTHON 4 FILE IO
Please, login to leave a review