Section 1 : Real-World Ethical Hacking 1 Hacking Windows!

Lecture 1 Introduction 00:01:01 Duration
Lecture 2 Overview What is Ethical Hacking 00:11:15 Duration
Lecture 3 Hacking Windows 00:02:08 Duration
Lecture 4 The Sticky Keys Hack 00:02:31 Duration
Lecture 5 Burning a Legal Windows 10 Install Disc 00:03:54 Duration
Lecture 6 The Hack First Reboot and Exploit 00:04:37 Duration
Lecture 7 The Hack (cont.) Second Reboot and Compromise 00:06:56 Duration
Lecture 8 Hack Finale Logging in as Administrator 00:06:56 Duration
Lecture 9 Review 00:04:10 Duration
Lecture 10 BONUS Mac Root Hack 00:08:33 Duration

Section 2 : Create Your Own Virtual Hacking Lab!

Lecture 1 Virtual Lab Intro and VirtualBox Installation. 00:05:08 Duration
Lecture 2 Building a Kali Linux Virtual Machine 00:06:33 Duration
Lecture 3 Create a Windows 10 VM 00:07:40 Duration
Lecture 4 Create an Android PhoneTablet VM for Mobile Ha 00:10:38 Duration
Lecture 5 The Ultimately Hackable Metasploitable 00:05:43 Duration
Lecture 6 Troubleshooting VirtualBox on Mac-Windows

Section 3 : Important Linux and Windows Terminal Commands

Lecture 1 Intro to Command-Line Linux and Windows 00:01:27 Duration
Lecture 2 Basic Linux Commands 00:07:37 Duration
Lecture 3 Command-Line Linux File Magic 00:06:03 Duration
Lecture 4 More Helpful Linux Commands 00:06:59 Duration
Lecture 5 BONUS Fun Linux Terminal Commands (Optional). 00:11:27 Duration
Lecture 6 Basic Command-Line Commands for Windows 00:04:57 Duration
Lecture 7 Windows File Commands 00:04:58 Duration
Lecture 8 Advanced Windows Command-Line Commands 00:04:58 Duration
Lecture 9 Command-Line Review for Linux and Windows 00:05:00 Duration

Section 4 : Create a Virtual Network for Ethical Hacking!

Lecture 1 Virtual Networking in VirtualBo 00:03:51 Duration
Lecture 2 Creating the Private, Host-Only 10.0.3.x Netwo 00:06:46 Duration
Lecture 3 Connecting Your VMs to the Host-Only Network. 00:09:49 Duration
Lecture 4 Creating and Using a Public NAT Network in VBo 00:07:34 Duration
Lecture 5 Updating Kali and Windows VMs 00:07:02 Duration

Section 5 : Social Engineering Capturing Usernames and Passwo

Lecture 1 Intro to Social Engineering 00:07:50 Duration
Lecture 2 Fixing SET on Kali 2020 and later 00:03:52 Duration
Lecture 3 The Social Engineer's Toolkit in Kali Linux 00:04:30 Duration
Lecture 4 Cloning Facebook and Harvesting User Passwords 00:09:52 Duration
Lecture 5 Intro to Spear-Phishing. 00:06:13 Duration
Lecture 6 Advanced IP Address Masking Hiding Your Real U 00:08:14 Duration
Lecture 7 Crafting the Perfect Spear-Phishing Email 00:07:47 Duration
Lecture 8 Capturing the User's Login and Password in Kal 00:07:51 Duration
Lecture 9 BONUS Cloning Twitter - Easy as 1-2-3-2! 00:03:19 Duration
Lecture 10 Review Social Engineering Techniques 00:07:25 Duration
Lecture 11 Stopping Phishing at Work and at Home. 00:08:59 Duration

Section 6 : Recon Information Gathering, Scanning and Enumera

Lecture 1 Information Gathering Passive vs. Active Recon 00:03:41 Duration
Lecture 2 OSINT (Open-Source INTelligence) Framework Dom 00:04:56 Duration
Lecture 3 theHarvester How hackers find users and email 00:10:21 Duration
Lecture 4 Recon-ng Enumeration of servershosts with Reco 00:05:56 Duration
Lecture 5 nmap Active Scanning with nmap 00:10:06 Duration
Lecture 6 Legion Active network and vulnerability scanni

Section 7 : Remote Hacking Win10 Attack Phase

Lecture 1 Hacking Win10 The Attack Phase
Lecture 2 Intro to Metasploit The Hacker's Swiss Army Kn 00:03:52 Duration
Lecture 3 Creating Your Own Virus with Metasploit
Lecture 4 Sharing the Malware over the Web 00:04:13 Duration
Lecture 5 Prep Win10 for Hacking USB, WebCam, Firewall a 00:06:25 Duration
Lecture 6 Infecting Your Windows 10 VM with the Virus 00:08:06 Duration

Section 8 : Hacking Win10 Command & Control Phase

Lecture 1 Attack Phase RecapReconnecting in Meterpreter. 00:07:07 Duration
Lecture 2 Intro to Meterpreter Your Remote Attack Shell! 00:05:40 Duration
Lecture 3 Viewing, Downloading and Uploading Files with 00:05:16 Duration
Lecture 4 Stealing Screenshots, Keystrokes, and ,Webcams 00:10:20 Duration
Lecture 5 How Attackers Steal Windows 10 Passwords Privi 00:13:23 Duration
Lecture 6 Defending Yourself from Malware Attacks 00:08:29 Duration

Section 9 : BONUS Section Car Hacking in Kali Linux!

Lecture 1 Intro to Car Hacking! 00:04:34 Duration
Lecture 2 Update Installing can-utils and ICSim on Kali 00:07:48 Duration
Lecture 3 Running the Car Dashboard Simulator ICSim 00:08:00 Duration
Lecture 4 Capturing CAN Traffic with CanSniffer 00:05:49 Duration
Lecture 5 The Replay Attack Replaying CAN Packets with C 00:07:13 Duration
Lecture 6 Car Hacking Review 00:07:46 Duration
Lecture 7 BONUS Reverse Engineering the CAN Bus 00:13:51 Duration
Lecture 8 BONUS Hacking the Car Hacking Software, to 100 00:11:27 Duration
Lecture 9 Car Hacking LIVE on Dr. Payne's VW Jetta Faceb 00:09:44 Duration

Section 10 : BONUS Hacking Windows 7 with Metasploit!

Lecture 1 Intro to Hacking a Real Win7 Box 00:04:13 Duration
Lecture 2 Intro to Metasploit 00:03:55 Duration
Lecture 3 Setting up Guest Additions in VirtualBox 00:06:46 Duration
Lecture 4 Creating an Exploit Payload with Metasploit 00:06:15 Duration
Lecture 5 Sharing the Exploit over the Web 00:04:42 Duration
Lecture 6 Running the Exploit to Hack Windows 7 00:04:35 Duration
Lecture 7 Intro to Meterpreter Your Remote Attack Shell!
Lecture 8 Privilege Escalation Gaining Root Access and D 00:09:05 Duration
Lecture 9 Metasploit & Meterpreter Review 00:04:30 Duration

Section 11 : Password Problems - Everybody's Got 'Em Hacking,

Lecture 1 Six Problems with Passwords 00:04:27 Duration
Lecture 2 Hijacking Stored Passwords from Chrome and Fir 00:08:15 Duration
Lecture 3 Sniffing the Network Installing Wireshark 00:06:53 Duration
Lecture 4 Sniffing Unencrypted Passwords with Wireshark. 00:07:58 Duration
Lecture 5 Cracking Passwords with Kali and Online Tools. 00:09:08 Duration
Lecture 6 Seven Things You Can Do for Safer Passwords 00:08:58 Duration

Section 12 : Web Hacking - Testing and Securing Web Applicati

Lecture 1 Intro to Web Hacking 00:03:49 Duration
Lecture 2 Hands-on Cross-Site Scripting (XSS) Attacks Th 00:08:21 Duration
Lecture 3 SQL (Structured Query Language) Injection Mess 00:04:07 Duration
Lecture 4 Advanced SQLi Attacks 00:06:01 Duration
Lecture 5 Securing Web Applications from XSS, SQLi and M 00:05:56 Duration

Section 13 : Mobile Hacking on Android

Lecture 1 Exploiting Android from Kali Linux using Meter 00:01:45 Duration
Lecture 2 Advanced Android Exploits Accessing Storage, D
Lecture 3 Exploiting Android from Kali Linux using Meter 00:06:07 Duration
Lecture 4 Advanced Android Exploits Accessing Storage, D 00:08:12 Duration

Section 14 : Bonus Videos National Cyber Warrior Academy, Int

Lecture 1 Bonus videos from the National Cyber Warrior A 00:01:03 Duration
Lecture 2 NCWA 2016 00:01:14 Duration
Lecture 3 NCWA 2017 Facebook Live Video on Car Hacking a 00:19:54 Duration
Lecture 4 WDUN Radio Interview July 2017 on Cybersecurit 00:07:57 Duration