• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      • Home
      • All courses
      • Ethical Hacking
      • Learn Ethical Hacking From Scratch
      CoursesEthical HackingLearn Ethical Hacking From Scratch
      • Introduction 3

        • Lecture1.1
          Teaser – Hacking Windows 10 Computer & Accessing The Webcam 07 min
        • Lecture1.2
          Course Introduction & Overview 03 min
        • Lecture1.3
          What Is Hacking & Why Learn it? 06 min
      • Setting up a Hacking Lab 3

        • Lecture2.1
          Lab Overview & Needed Software 03 min
        • Lecture2.2
          Installing Kali 2020 As a Virtual Machine 11 min
        • Lecture2.3
          Creating & Using Snapshots 06 min
      • Linux Basics 2

        • Lecture3.1
          Basic Overview of Kali Linux 05 min
        • Lecture3.2
          The Terminal & Linux Commands 11 min
      • Network Hacking 5

        • Lecture4.1
          Introduction to Network Penetration Testing / Hacking 02 min
        • Lecture4.2
          Network Basics 03 min
        • Lecture4.3
          Connecting a Wireless Adapter To Kali 07 min
        • Lecture4.4
          What is MAC Address & How to Change It 05 min
        • Lecture4.5
          Wireless Modes (Managed & Monitor) 05 min
      • Network Hacking - Pre Connection Attacks 2

        • Lecture5.1
          Packet Sniffing Basics 06 min
        • Lecture5.2
          WiFi Bands – 2.4Ghz & 5Ghz Frequencies 08 min
      • Network Hacking - Gaining Access - WEP Cracking 2

        • Lecture6.1
          Targeted Packets Sniffing 10 min
        • Lecture6.2
          Deauthentication Attack (Disconnection Any Device From The Network) 07 min
      • Network Hacking - Gaining Access (WEP/WPA/WPA2 Cracking) 2

        • Lecture7.1
          Gaining Access Introduction 01 min
        • Lecture7.2
          Theory Behind Cracking WEP Encryption 06 min
      • Network Hacking - Gaining Access - WPA / WPA2 Cracking 6

        • Lecture8.1
          WEP Cracking Basics 06 min
        • Lecture8.2
          Fake Authentication 06 min
        • Lecture8.3
          ARP Request Replay Attack 06 min
        • Lecture8.4
          Introduction to WPA and WPA2 Cracking 04 min
        • Lecture8.5
          Hacking WPA & WPA2 Without a Wordlist 10 min
        • Lecture8.6
          Capturing The Handshake 07 min
      • Network Hacking - Gaining Access - Security 4

        • Lecture9.1
          Creating a Wordlist 07 min
        • Lecture9.2
          Cracking WPA and WPA2 Using a Wordlist Attack 06 min
        • Lecture9.3
          Securing Your Network From Hackers
        • Lecture9.4
          Configuring Wireless Settings for Maximum Security 06 min
      • Network Hacking - Post Connection Attacks 1

        • Lecture10.1
          Introduction to Post-Connection Attacks 02 min
      • Network Hacking - Post-Connection Attacks - Information Gathering 4

        • Lecture11.1
          Installing Windows As a Virtual Machine 03 min
        • Lecture11.2
          Discovering Devices Connected to the Same Network 08 min
        • Lecture11.3
          Gathering Sensitive Info About Connected Devices (Device name, Ports…etc) 07 min
        • Lecture11.4
          Gathering More Sensitive Info (Running Services, Operating System…etc) 08 min
      • Network Hacking - Post Connection Attacks - MITM Attacks 17

        • Lecture12.1
          What is ARP Poisoning ? 09 min
        • Lecture12.2
          Intercepting Network Traffic 06 min
        • Lecture12.3
          Bettercap Basics 08 min
        • Lecture12.4
          ARP Spoofing Using Bettercap 08 min
        • Lecture12.5
          Spying on Network Devices (Capturing Passwords, Visited Websites…etc) 05 min
        • Lecture12.6
          Creating Custom Spoofing Script 10 min
        • Lecture12.7
          MITM – Understanding HTTPS & How to Bypass it 06 min
        • Lecture12.8
          Bypassing HTTPS 07 min
        • Lecture12.9
          Bypassing HSTS 10 min
        • Lecture12.10
          DNS Spoofing – Controlling DNS Requests on The Network 11 min
        • Lecture12.11
          MITM – Injecting Javascript Code 10 min
        • Lecture12.12
          Wireshark – Basic Overview & How To Use It With MITM Attacks 09 min
        • Lecture12.13
          Wireshark – Sniffing & Analysing Data 05 min
        • Lecture12.14
          Wireshark – Using Filters, Tracing & Dissecting Packets 06 min
        • Lecture12.15
          Wireshark – Capturing Passwords & Cookies Entered By Any Device In The Network 08 min
        • Lecture12.16
          Creating a Fake Access Point (Honeypot) – Theory 09 min
        • Lecture12.17
          Creating a Fake Access Point (Honeypot) – Practical 10 min
      • Network Hacking - Detection & Security 4

        • Lecture13.1
          Detecting ARP Poisoning Attacks 05 min
        • Lecture13.2
          Detecting Suspicious Activities Using Wireshark 06 min
        • Lecture13.3
          Preventing MITM Attacks – Method 1 08 min
        • Lecture13.4
          Preventing MITM Attacks – Method 2 11 min
      • Gaining Access To Computer Devices 1

        • Lecture14.1
          Gaining Access Introduction 04 min
      • Gaining Access - Server Side Attacks 8

        • Lecture15.1
          Installing Metasploitable As a Virtual Machine 06 min
        • Lecture15.2
          Introduction to Server-Side Attacks 04 min
        • Lecture15.3
          Basic Information Gathering & Exploitation 10 min
        • Lecture15.4
          Hacking a Remote Server Using a Basic Metasploit Exploit 07 min
        • Lecture15.5
          Exploiting a Code Execution Vulnerability to Hack into a Remote Server 10 min
        • Lecture15.6
          Nexpose – Installing Nexpose 10 min
        • Lecture15.7
          Nexpose – Scanning a Target Server For Vulnerabilities 09 min
        • Lecture15.8
          Nexpose – Analyzing Scan Results & Generating Reports 08 min
      • Gaining Access - Client Side Attacks 9

        • Lecture16.1
          Introduction to Client-Side Attacks 02 min
        • Lecture16.2
          Installing Veil Framework 05 min
        • Lecture16.3
          Veil Overview & Payloads Basics 07 min
        • Lecture16.4
          Generating An Undetectable Backdoor 10 min
        • Lecture16.5
          Listening For Incoming Connections 07 min
        • Lecture16.6
          Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 07 min
        • Lecture16.7
          Hacking Windows 10 Using a Fake Update 12 min
        • Lecture16.8
          Backdooring Downloads on The Fly to Hack Windows 10 11 min
        • Lecture16.9
          How to Protect Yourself From The Discussed Delivery Methods 04 min
      • Gaining Access - Client Side Attacks - Social Engineering 19

        • Lecture17.1
          Introduction to Social Engineering 03 min
        • Lecture17.2
          Maltego Basics 06 min
        • Lecture17.3
          Discovering Websites, Links & Social Networking Accounts Associated With The Target 07 min
        • Lecture17.4
          Discovering Twitter Friends & Associated Accounts 05 min
        • Lecture17.5
          Discovering Emails Of The Target’s Friends 04 min
        • Lecture17.6
          Analyzing The Gathered Info & Building An Attack Strategy 09 min
        • Lecture17.7
          Backdooring Any File Type (images,pdf’s …etc) 05 min
        • Lecture17.8
          Compiling & Changing Trojan’s Icon 06 min
        • Lecture17.9
          Spoofing .exe Extension To Any Extension (jpg, pdf …etc) 08 min
        • Lecture17.10
          Spoofing Emails – Setting Up an SMTP Server 07 min
        • Lecture17.11
          Email Spoofing – Sending Emails as Any Email Account 12 min
        • Lecture17.12
          Email Spoofing – Method 2 08 min
        • Lecture17.13
          BeEF Overview & Basic Hook Method 11 min
        • Lecture17.14
          BeEF – Hooking Targets Using Bettercap 03 min
        • Lecture17.15
          BeEF – Running Basic Commands On Target 04 min
        • Lecture17.16
          BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt 02 min
        • Lecture17.17
          BeEF – Hacking Windows 10 Using a Fake Update Prompt 04 min
        • Lecture17.18
          Detecting Trojans Manually 05 min
        • Lecture17.19
          Detecting Trojans Using a Sandbox 03 min
      • Gaining Access - Using The Above Attacks Outside The Local Network 4

        • Lecture18.1
          Overview Of The Setup 06 min
        • Lecture18.2
          Ex1 – Generating a Backdoor That Works Outside The Network 05 min
        • Lecture18.3
          Configuring The Router To Forward Connections To Kali 07 min
        • Lecture18.4
          Ex2 – Using BeEF Outside The Network 06 min
      • Post Exploitation 8

        • Lecture19.1
          Introduction to Post Exploitation 02 min
        • Lecture19.2
          Meterpreter Basics 06 min
        • Lecture19.3
          File System Commands 05 min
        • Lecture19.4
          Maintaining Access – Basic Methods 05 min
        • Lecture19.5
          Maintaining Access – Using a Reliable & Undetectable Method 07 min
        • Lecture19.6
          Spying – Capturing Key Strikes & Taking Screen Shots 03 min
        • Lecture19.7
          Pivoting – Theory (What Is Pivoting) 07 min
        • Lecture19.8
          Pivoting – Using a Hacked System to Hack Into Other Systems 08 min
      • Website Hacking 2

        • Lecture20.1
          Introduction – What Is A Website ? 04 min
        • Lecture20.2
          How To Hack a Website? 04 min
      • Website Hacking - Information Gathering 7

        • Lecture21.1
          Gathering Basic Information Using Whois Lookup 06 min
        • Lecture21.2
          Discovering Technologies Used On The Website 06 min
        • Lecture21.3
          Gathering Comprehensive DNS Information 10 min
        • Lecture21.4
          Discovering Websites On The Same Server 04 min
        • Lecture21.5
          Discovering Subdomains 05 min
        • Lecture21.6
          Discovering Sensitive Files 07 min
        • Lecture21.7
          Analyzing Discovered Files 04 min
      • Website Pentesting - File Upload, Code Execution & File Inclusion Vulns 6

        • Lecture22.1
          Discovering & Exploiting File Upload Vulnerabilities To Hack Websites 07 min
        • Lecture22.2
          Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites 07 min
        • Lecture22.3
          Discovering & Exploiting Local File Inclusion Vulnerabilities 05 min
        • Lecture22.4
          Remote File Inclusion Vulnerabilities – Configuring PHP Settings 04 min
        • Lecture22.5
          Remote File Inclusion Vulnerabilities – Discovery & Exploitation 06 min
        • Lecture22.6
          Preventing The Above Vulnerabilities 07 min
      • Website Pentesting - SQL Injection Vulnerabilities 11

        • Lecture23.1
          What is SQL 06 min
        • Lecture23.2
          Dangers of SQL Injection Vulnerabilities 03 min
        • Lecture23.3
          Discovering SQL Injections In POST 08 min
        • Lecture23.4
          Bypassing Logins Using SQL injection 05 min
        • Lecture23.5
          Discovering SQL Injections In GET 07 min
        • Lecture23.6
          Reading Database Information 05 min
        • Lecture23.7
          Finding Database Tables 03 min
        • Lecture23.8
          Extracting Sensitive Data From The Database (Such As Password, User Info…etc) 04 min
        • Lecture23.9
          Reading & Writing Files On The Server Using SQL Injection Vulnerability 06 min
        • Lecture23.10
          Discovering SQL Injections & Extracting Data Using SQLmap 07 min
        • Lecture23.11
          The Right Way To Prevent SQL Injection 05 min
      • Website Hacking - Cross Site Scripting Vulnerabilities 5

        • Lecture24.1
          Introduction to Cross Site Scripting? 03 min
        • Lecture24.2
          Discovering Reflected XSS 04 min
        • Lecture24.3
          Discovering Stored XSS 03 min
        • Lecture24.4
          Exploiting XSS – Hooking Vulnerable Page Visitors To BeEF 05 min
        • Lecture24.5
          Preventing XSS Vulnerabilities 05 min
      • Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP 2

        • Lecture25.1
          Automatically Scanning Target Website For Vulnerabilities 04 min
        • Lecture25.2
          Analyzing Scan Results 04 min
      • Bonus Section 1

        • Lecture26.1
          Bonus Lecture – What’s Next?

        Overview Of The Setup

        https://zsecurity.org/wp-content/uploads/2017/11/port-forwarding-intro.mp4

         

        This lecture will give you an overview of the default setup of networks, how connections are handled and the theory behind what needs to be done to receive connections from outside the network.

        Prev Detecting Trojans Using a Sandbox
        Next Ex1 – Generating a Backdoor That Works Outside The Network

        “Everything related to ethical hacking

        & cyber security in one place.”

        Quick Links

        • Home
        • About Us
        • Hacking & Security
        • Contact
        • FAQ

        Services

        • Penetration Testing
        • Consulting
        • Code Review
        • One on one training
        • VPN
        • VIP Membership

        Company

        • About Us
        • Contact

        Support

        • FAQ
        • Forums

        Copyright © 2020 zSecurity Ltd. All rights reserved.

        • Privacy
        • Terms

        Contribute

        Share your knowledge with the world

        SUBMIT AN ARTICLE

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now