-
Introduction 3
-
Teaser – Hacking Windows 11 Computer & Accessing The WebcamLecture1.1
-
Course Introduction & OverviewLecture1.2
-
What Is Hacking & Why Learn it?Lecture1.3
-
-
Setting up a Hacking Lab 5
-
Lab OverviewLecture2.106 min
-
Initial PreparationLecture2.209 min
-
Installing Kali Linux as a VM on WindowsLecture2.309 min
-
Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
-
Installing Kali Linux as a VM on LinuxLecture2.511 min
-
-
Linux Basics 3
-
Basic Overview of Kali LinuxLecture3.105 min
-
The Terminal & Linux CommandsLecture3.210 min
-
More Powerful Linux Terminals with AI FeaturesLecture3.305 min
-
-
Network Hacking 5
-
Introduction to Network Penetration Testing / HackingLecture4.1
-
Network BasicsLecture4.204 min
-
Connecting a Wireless Adapter To KaliLecture4.307 min
-
What is MAC Address & How to Change ItLecture4.408 min
-
Wireless Modes (Managed & Monitor)Lecture4.507 min
-
-
Network Hacking - Pre Connection Attacks 4
-
Packet Sniffing BasicsLecture5.107 min
-
WiFi Bands – 2.4Ghz & 5Ghz FrequenciesLecture5.208 min
-
Targeted Packets SniffingLecture5.311 min
-
Deauthentication Attack (Disconnection Any Device From The Network)Lecture5.408 min
-
-
Network Hacking - Gaining Access - WEP Cracking 5
-
Gaining Access IntroductionLecture6.101 min
-
Theory Behind Cracking WEP EncryptionLecture6.206 min
-
WEP Cracking BasicsLecture6.306 min
-
Fake AuthenticationLecture6.407 min
-
ARP Request Replay AttackLecture6.506 min
-
-
Network Hacking - Gaining Access WPA/WPA2 Cracking 5
-
Introduction to WPA and WPA2 CrackingLecture7.104 min
-
Hacking WPA & WPA2 Without a WordlistLecture7.208 min
-
Capturing The HandshakeLecture7.307 min
-
Creating a WordlistLecture7.408 min
-
Cracking WPA and WPA2 Using a Wordlist AttackLecture7.506 min
-
-
Network Hacking - Gaining Access - Security 2
-
Securing Your Network From HackersLecture8.1
-
Configuring Wireless Settings for Maximum SecurityLecture8.208 min
-
-
Network Hacking - Post Connection Attacks 1
-
Introduction to Post-Connection AttacksLecture9.1
-
-
Network Hacking - Post-Connection Attacks - Information Gathering 5
-
Installing Windows As a Virtual MachineLecture10.106 min
-
Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture10.205 min
-
Discovering Devices Connected to the Same NetworkLecture10.308 min
-
Gathering Sensitive Info About Connected Devices (Device name, Ports…etc)Lecture10.407 min
-
Gathering More Sensitive Info (Running Services, Operating System…etc)Lecture10.508 min
-
-
Network Hacking - Post Connection Attacks - MITM Attacks 16
-
What is ARP Poisoning ?Lecture11.109 min
-
Intercepting Network TrafficLecture11.207 min
-
Bettercap BasicsLecture11.308 min
-
ARP Spoofing Using BettercapLecture11.408 min
-
Spying on Network Devices (Capturing Passwords, Visited Websites…etc)Lecture11.505 min
-
Creating Custom Spoofing ScriptLecture11.610 min
-
Bypassing HTTPSLecture11.7
-
DNS Spoofing – Controlling DNS Requests on The NetworkLecture11.811 min
-
Injecting Javascript CodeLecture11.910 min
-
Doing All the Above using a Graphical InterfaceLecture11.1010 min
-
Wireshark – Basic Overview & How To Use It With MITM AttacksLecture11.1108 min
-
Wireshark – Sniffing & Analysing DataLecture11.1206 min
-
Wireshark – Using Filters, Tracing & Dissecting PacketsLecture11.1306 min
-
Wireshark – Capturing Passwords & Cookies Entered By Any Device In The NetworkLecture11.1408 min
-
Creating a Fake Access Point (Honeypot) – TheoryLecture11.1507 min
-
Creating a Fake Access Point (Honeypot) – PracticalLecture11.1610 min
-
-
Network Hacking - Detection & Security 4
-
Detecting ARP Poisoning AttacksLecture12.1
-
Detecting Suspicious Activities Using WiresharkLecture12.2
-
Preventing MITM Attacks – Method 1Lecture12.309 min
-
Preventing MITM Attacks – Method 2Lecture12.411 min
-
-
Gaining Access To Computer Devices 1
-
Gaining Access To Computers IntroductionLecture13.1
-
-
Gaining Access - Server Side Attacks 9
-
Installing Metasploitable As a Virtual MachineLecture14.105 min
-
Introduction to Server-Side AttacksLecture14.203 min
-
Basic Information Gathering & ExploitationLecture14.309 min
-
Hacking a Remote Server Using a Basic Metasploit ExploitLecture14.408 min
-
Exploiting a Code Execution Vulnerability to Hack into a Remote ServerLecture14.510 min
-
Nexpose – Installing NexposeLecture14.609 min
-
Nexpose – Scanning a Target Server For VulnerabilitiesLecture14.706 min
-
Nexpose – Analyzing Scan Results & Generating ReportsLecture14.808 min
-
Server-Side Attacks ConclusionLecture14.904 min
-
-
Gaining Access - Client Side Attacks 6
-
Introduction to Client-Side AttacksLecture15.1
-
Backdoors and Payloads BasicsLecture15.212 min
-
Creating Your Own BackdoorLecture15.308 min
-
Listening for Backdoor ConnectionsLecture15.404 min
-
Hacking Windows 11 Using Your Own BackdoorLecture15.506 min
-
How to Bypass Anti-Virus ProgramsLecture15.606 min
-
-
Gaining Access - Client Side Attacks - Social Engineering 20
-
Introduction to Social EngineeringLecture16.1
-
Maltego BasicsLecture16.207 min
-
Discovering Websites, Links & Social Networking Accounts Associated With The TargetLecture16.308 min
-
Discovering Twitter Friends & Associated AccountsLecture16.405 min
-
Discovering Emails Of The Target’s FriendsLecture16.504 min
-
Analyzing The Gathered Info & Building An Attack StrategyLecture16.609 min
-
Intro to Trojans – Backdooring Any File Type (images,pdf’s …etc)Lecture16.705 min
-
Compiling & Changing Trojan’s IconLecture16.806 min
-
Spoofing .exe Extension To Any Extension (jpg, pdf …etc)Lecture16.908 min
-
Spoofing Emails – Setting Up an SMTP ServerLecture16.1006 min
-
Email Spoofing – Sending Emails as Any Email AccountLecture16.1107 min
-
Email Spoofing – Spoofing Sender NameLecture16.1207 min
-
Email Spoofing – Method 2Lecture16.1310 min
-
BeEF Overview & Basic Hook MethodLecture16.14
-
BeEF – Hooking Targets Using BettercapLecture16.1507 min
-
BeEF – Running Basic Commands On TargetLecture16.1604 min
-
BeEF – Stealing Credentials/Passwords Using A Fake Login PromptLecture16.17
-
BeEF – Hacking Windows 10 Using a Fake Update PromptLecture16.1804 min
-
Detecting Trojans ManuallyLecture16.1906 min
-
Detecting Trojans Using a SandboxLecture16.2003 min
-
-
Gaining Access - Hacking Outside The Local Network 4
-
Overview Of The SetupLecture17.1
-
Ex1 – Generating a Backdoor That Works Outside The NetworkLecture17.205 min
-
Configuring The Router To Forward Connections To KaliLecture17.307 min
-
Ex2 – Using BeEF Outside The NetworkLecture17.406 min
-
-
Post Exploitation 7
-
Introduction to Post ExploitationLecture18.1
-
Meterpreter BasicsLecture18.206 min
-
Accessing the System CommandsLecture18.3
-
Maintaining Access (Persistence)Lecture18.408 min
-
Spying – Capturing Key Strikes & Taking Screen ShotsLecture18.503 min
-
Pivoting – Theory (What Is Pivoting)Lecture18.606 min
-
Pivoting – Using a Hacked System to Hack Into Other SystemsLecture18.708 min
-
-
Website Hacking 2
-
Introduction – What Is A Website ?Lecture19.1
-
How To Hack a Website?Lecture19.2
-
-
Website Hacking - Information Gathering 7
-
Gathering Basic Information Using Whois LookupLecture20.106 min
-
Discovering Technologies Used On The WebsiteLecture20.206 min
-
Gathering Comprehensive DNS InformationLecture20.310 min
-
Discovering Websites On The Same ServerLecture20.404 min
-
Discovering SubdomainsLecture20.507 min
-
Discovering Sensitive FilesLecture20.607 min
-
Analyzing Discovered FilesLecture20.704 min
-
-
Website Pentesting - File Upload, Code Execution & File Inclusion Vulns 6
-
Discovering & Exploiting File Upload Vulnerabilities To Hack WebsitesLecture21.107 min
-
Discovering & Exploiting Code Execution Vulnerabilities To Hack WebsitesLecture21.207 min
-
Discovering & Exploiting Local File Inclusion VulnerabilitiesLecture21.305 min
-
Remote File Inclusion Vulnerabilities – Configuring PHP SettingsLecture21.404 min
-
Remote File Inclusion Vulnerabilities – Discovery & ExploitationLecture21.506 min
-
Preventing The Above VulnerabilitiesLecture21.607 min
-
-
Website Pentesting - SQL Injection Vulnerabilities 11
-
What is SQLLecture22.106 min
-
Dangers of SQL Injection VulnerabilitiesLecture22.203 min
-
Discovering SQL Injections In POSTLecture22.308 min
-
Bypassing Logins Using SQL injectionLecture22.4
-
Discovering SQL Injections In GETLecture22.507 min
-
Reading Database InformationLecture22.605 min
-
Discovering Database TablesLecture22.704 min
-
Extracting Sensitive Data From The Database (Such As Password, User Info…etc)Lecture22.804 min
-
Reading & Writing Files On The Server Using SQL Injection VulnerabilityLecture22.906 min
-
Discovering SQL Injections & Extracting Data Using SQLmapLecture22.1007 min
-
The Right Way To Prevent SQL Injection VulnerabilitiesLecture22.1105 min
-
-
Website Hacking - Cross Site Scripting (XSS) Vulnerabilities 5
-
Introduction to Cross Site Scripting?Lecture23.103 min
-
Discovering Reflected XSSLecture23.204 min
-
Discovering Stored XSSLecture23.303 min
-
Exploiting XSS – Hooking Vulnerable Page Visitors To BeEFLecture23.406 min
-
Preventing XSS VulnerabilitiesLecture23.505 min
-
-
Website Pentesting - Discovering Vulnerabilities Automatically 5
-
Automatically Scanning Target Website For VulnerabilitiesLecture24.104 min
-
Analyzing Scan ResultsLecture24.204 min
-
Website Hacking / Penetration Testing ConclusionLecture24.305 min
-
Writing a Pentest ReportLecture24.414 min
-
4 Ways to Secure Websites & AppsLecture24.509 min
-
-
Bonus Section 1
-
Bonus Lecture – What’s Next?Lecture25.103 min
-
This content is protected, please login and enroll course to view this content!
