Section 1 : Real-World Ethical Hacking 1 Hacking Windows!
|
Lecture 1 | Introduction | 00:01:01 Duration |
|
Lecture 2 | Overview What is Ethical Hacking | 00:11:15 Duration |
|
Lecture 3 | Hacking Windows | 00:02:08 Duration |
|
Lecture 4 | The Sticky Keys Hack | 00:02:31 Duration |
|
Lecture 5 | Burning a Legal Windows 10 Install Disc | 00:03:54 Duration |
|
Lecture 6 | The Hack First Reboot and Exploit | 00:04:37 Duration |
|
Lecture 7 | The Hack (cont.) Second Reboot and Compromise | 00:06:56 Duration |
|
Lecture 8 | Hack Finale Logging in as Administrator | 00:06:56 Duration |
|
Lecture 9 | Review | 00:04:10 Duration |
|
Lecture 10 | BONUS Mac Root Hack | 00:08:33 Duration |
Section 2 : Create Your Own Virtual Hacking Lab!
|
Lecture 1 | Virtual Lab Intro and VirtualBox Installation. | 00:05:08 Duration |
|
Lecture 2 | Building a Kali Linux Virtual Machine | 00:06:33 Duration |
|
Lecture 3 | Create a Windows 10 VM | 00:07:40 Duration |
|
Lecture 4 | Create an Android PhoneTablet VM for Mobile Ha | 00:10:38 Duration |
|
Lecture 5 | The Ultimately Hackable Metasploitable | 00:05:43 Duration |
|
Lecture 6 | Troubleshooting VirtualBox on Mac-Windows |
Section 3 : Important Linux and Windows Terminal Commands
|
Lecture 1 | Intro to Command-Line Linux and Windows | 00:01:27 Duration |
|
Lecture 2 | Basic Linux Commands | 00:07:37 Duration |
|
Lecture 3 | Command-Line Linux File Magic | 00:06:03 Duration |
|
Lecture 4 | More Helpful Linux Commands | 00:06:59 Duration |
|
Lecture 5 | BONUS Fun Linux Terminal Commands (Optional). | 00:11:27 Duration |
|
Lecture 6 | Basic Command-Line Commands for Windows | 00:04:57 Duration |
|
Lecture 7 | Windows File Commands | 00:04:58 Duration |
|
Lecture 8 | Advanced Windows Command-Line Commands | 00:04:58 Duration |
|
Lecture 9 | Command-Line Review for Linux and Windows | 00:05:00 Duration |
Section 4 : Create a Virtual Network for Ethical Hacking!
|
Lecture 1 | Virtual Networking in VirtualBo | 00:03:51 Duration |
|
Lecture 2 | Creating the Private, Host-Only 10.0.3.x Netwo | 00:06:46 Duration |
|
Lecture 3 | Connecting Your VMs to the Host-Only Network. | 00:09:49 Duration |
|
Lecture 4 | Creating and Using a Public NAT Network in VBo | 00:07:34 Duration |
|
Lecture 5 | Updating Kali and Windows VMs | 00:07:02 Duration |
Section 5 : Social Engineering Capturing Usernames and Passwo
|
Lecture 1 | Intro to Social Engineering | 00:07:50 Duration |
|
Lecture 2 | Fixing SET on Kali 2020 and later | 00:03:52 Duration |
|
Lecture 3 | The Social Engineer's Toolkit in Kali Linux | 00:04:30 Duration |
|
Lecture 4 | Cloning Facebook and Harvesting User Passwords | 00:09:52 Duration |
|
Lecture 5 | Intro to Spear-Phishing. | 00:06:13 Duration |
|
Lecture 6 | Advanced IP Address Masking Hiding Your Real U | 00:08:14 Duration |
|
Lecture 7 | Crafting the Perfect Spear-Phishing Email | 00:07:47 Duration |
|
Lecture 8 | Capturing the User's Login and Password in Kal | 00:07:51 Duration |
|
Lecture 9 | BONUS Cloning Twitter - Easy as 1-2-3-2! | 00:03:19 Duration |
|
Lecture 10 | Review Social Engineering Techniques | 00:07:25 Duration |
|
Lecture 11 | Stopping Phishing at Work and at Home. | 00:08:59 Duration |
Section 6 : Recon Information Gathering, Scanning and Enumera
|
Lecture 1 | Information Gathering Passive vs. Active Recon | 00:03:41 Duration |
|
Lecture 2 | OSINT (Open-Source INTelligence) Framework Dom | 00:04:56 Duration |
|
Lecture 3 | theHarvester How hackers find users and email | 00:10:21 Duration |
|
Lecture 4 | Recon-ng Enumeration of servershosts with Reco | 00:05:56 Duration |
|
Lecture 5 | nmap Active Scanning with nmap | 00:10:06 Duration |
|
Lecture 6 | Legion Active network and vulnerability scanni |
Section 7 : Remote Hacking Win10 Attack Phase
|
Lecture 1 | Hacking Win10 The Attack Phase | |
|
Lecture 2 | Intro to Metasploit The Hacker's Swiss Army Kn | 00:03:52 Duration |
|
Lecture 3 | Creating Your Own Virus with Metasploit | |
|
Lecture 4 | Sharing the Malware over the Web | 00:04:13 Duration |
|
Lecture 5 | Prep Win10 for Hacking USB, WebCam, Firewall a | 00:06:25 Duration |
|
Lecture 6 | Infecting Your Windows 10 VM with the Virus | 00:08:06 Duration |
Section 8 : Hacking Win10 Command & Control Phase
|
Lecture 1 | Attack Phase RecapReconnecting in Meterpreter. | 00:07:07 Duration |
|
Lecture 2 | Intro to Meterpreter Your Remote Attack Shell! | 00:05:40 Duration |
|
Lecture 3 | Viewing, Downloading and Uploading Files with | 00:05:16 Duration |
|
Lecture 4 | Stealing Screenshots, Keystrokes, and ,Webcams | 00:10:20 Duration |
|
Lecture 5 | How Attackers Steal Windows 10 Passwords Privi | 00:13:23 Duration |
|
Lecture 6 | Defending Yourself from Malware Attacks | 00:08:29 Duration |
Section 9 : BONUS Section Car Hacking in Kali Linux!
|
Lecture 1 | Intro to Car Hacking! | 00:04:34 Duration |
|
Lecture 2 | Update Installing can-utils and ICSim on Kali | 00:07:48 Duration |
|
Lecture 3 | Running the Car Dashboard Simulator ICSim | 00:08:00 Duration |
|
Lecture 4 | Capturing CAN Traffic with CanSniffer | 00:05:49 Duration |
|
Lecture 5 | The Replay Attack Replaying CAN Packets with C | 00:07:13 Duration |
|
Lecture 6 | Car Hacking Review | 00:07:46 Duration |
|
Lecture 7 | BONUS Reverse Engineering the CAN Bus | 00:13:51 Duration |
|
Lecture 8 | BONUS Hacking the Car Hacking Software, to 100 | 00:11:27 Duration |
|
Lecture 9 | Car Hacking LIVE on Dr. Payne's VW Jetta Faceb | 00:09:44 Duration |
Section 10 : BONUS Hacking Windows 7 with Metasploit!
|
Lecture 1 | Intro to Hacking a Real Win7 Box | 00:04:13 Duration |
|
Lecture 2 | Intro to Metasploit | 00:03:55 Duration |
|
Lecture 3 | Setting up Guest Additions in VirtualBox | 00:06:46 Duration |
|
Lecture 4 | Creating an Exploit Payload with Metasploit | 00:06:15 Duration |
|
Lecture 5 | Sharing the Exploit over the Web | 00:04:42 Duration |
|
Lecture 6 | Running the Exploit to Hack Windows 7 | 00:04:35 Duration |
|
Lecture 7 | Intro to Meterpreter Your Remote Attack Shell! | |
|
Lecture 8 | Privilege Escalation Gaining Root Access and D | 00:09:05 Duration |
|
Lecture 9 | Metasploit & Meterpreter Review | 00:04:30 Duration |
Section 11 : Password Problems - Everybody's Got 'Em Hacking,
|
Lecture 1 | Six Problems with Passwords | 00:04:27 Duration |
|
Lecture 2 | Hijacking Stored Passwords from Chrome and Fir | 00:08:15 Duration |
|
Lecture 3 | Sniffing the Network Installing Wireshark | 00:06:53 Duration |
|
Lecture 4 | Sniffing Unencrypted Passwords with Wireshark. | 00:07:58 Duration |
|
Lecture 5 | Cracking Passwords with Kali and Online Tools. | 00:09:08 Duration |
|
Lecture 6 | Seven Things You Can Do for Safer Passwords | 00:08:58 Duration |
Section 12 : Web Hacking - Testing and Securing Web Applicati
|
Lecture 1 | Intro to Web Hacking | 00:03:49 Duration |
|
Lecture 2 | Hands-on Cross-Site Scripting (XSS) Attacks Th | 00:08:21 Duration |
|
Lecture 3 | SQL (Structured Query Language) Injection Mess | 00:04:07 Duration |
|
Lecture 4 | Advanced SQLi Attacks | 00:06:01 Duration |
|
Lecture 5 | Securing Web Applications from XSS, SQLi and M | 00:05:56 Duration |
Section 13 : Mobile Hacking on Android
|
Lecture 1 | Exploiting Android from Kali Linux using Meter | 00:01:45 Duration |
|
Lecture 2 | Advanced Android Exploits Accessing Storage, D | |
|
Lecture 3 | Exploiting Android from Kali Linux using Meter | 00:06:07 Duration |
|
Lecture 4 | Advanced Android Exploits Accessing Storage, D | 00:08:12 Duration |
Section 14 : Bonus Videos National Cyber Warrior Academy, Int
|
Lecture 1 | Bonus videos from the National Cyber Warrior A | 00:01:03 Duration |
|
Lecture 2 | NCWA 2016 | 00:01:14 Duration |
|
Lecture 3 | NCWA 2017 Facebook Live Video on Car Hacking a | 00:19:54 Duration |
|
Lecture 4 | WDUN Radio Interview July 2017 on Cybersecurit | 00:07:57 Duration |