Section 1 : Introduction

Lecture 1 Teaser - Hacking a Windows 10 Computer & Accessing Webcam 5:49
Lecture 2 Course Introduction & Overview 2:51
Lecture 3 What Is Hacking & Why Learn It 3:0

Section 2 : Setting up a Hacking Lab

Lecture 4 Lab Overview & Needed Software 7:49
Lecture 5 Installing Kali 2020 As a Virtual Machine 10:9
Lecture 6 Creating & Using Snapshots 5:36

Section 3 : Linux Basics

Lecture 7 Basic Overview of Kali Linux 5:10
Lecture 8 The Terminal & Linux Commands 11:21

Section 4 : Network Hacking

Lecture 9 Introduction to Network Penetration Testing Hacking 2:22
Lecture 10 Networks Basics 4:29
Lecture 11 Connecting a Wireless Adapter To Kali 5:9
Lecture 12 What is MAC Address & How To Change It 8:20
Lecture 13 Wireless Modes (Managed & Monitor) 6:58

Section 5 : Network Hacking - Pre Connection Attacks

Lecture 14 Packet Sniffing Basics 6:41
Lecture 15 WiFi Bands - 2 7:55
Lecture 16 Targeted Packet Sniffing 10:30
Lecture 17 Deauthentication Attack (Disconnecting Any Device From The Network) 6:50

Section 6 : Network Hacking - Gaining Access - WEP Cracking

Lecture 18 Gaining Access Introduction 1:9
Lecture 19 Theory Behind Cracking WEP Encryption 5:48
Lecture 20 WEP Cracking Basics 6:17
Lecture 21 Fake Authentication Attack 6:46
Lecture 22 ARP Request Replay Attack 6:10

Section 7 : Network Hacking - Gaining Access - WPA WPA2 Cracking

Lecture 23 Introduction to WPA and WPA2 Cracking 3:43
Lecture 24 Hacking WPA & WPA2 Without a Wordlist 10:12
Lecture 25 Capturing The Handshake
Lecture 26 Creating a Wordlist 7:33
Lecture 27 Cracking WPA & WPA2 Using a Wordlist Attack 6:27

Section 8 : Network Hacking - Gaining Access - Security

Lecture 28 Securing Your Network From Hackers Text
Lecture 29 Configuring Wireless Settings for Maximum Security 6:26

Section 9 : Network Hacking - Post Connection Attacks

Lecture 30 Introduction to Post-Connection Attacks 2:10

Section 10 : Network Hacking - Post-Connection Attacks - Information Gathering

Lecture 31 Installing Windows As a Virtual Machine 3:32
Lecture 32 Discovering Devices Connected to the Same Network 8:39
Lecture 33 Gathering Sensitive Info About Connected Devices (Device Name, Ports 6:45
Lecture 34 Gathering More Sensitive Info (Running Services, Operating System 8:8

Section 11 : Network Hacking - Post Connection Attacks - MITM Attacks

Lecture 35 What is ARP Poisoning 9:4
Lecture 36 Intercepting Network Traffic 6:30
Lecture 37 Bettercap Basics 7:44
Lecture 38 ARP Spoofing Using Bettercap 8:17
Lecture 39 Spying on Network Devices (Capturing Passwords, Visited Websites 5:12
Lecture 40 Creating Custom Spoofing Script 9:43
Lecture 41 Understanding HTTPS & How to Bypass it 6:6
Lecture 42 Bypassing HTTPS 7:27
Lecture 43 Bypassing HSTS 10:39
Lecture 44 DNS Spoofing - Controlling DNS Requests on The Network 10:51
Lecture 45 Injecting Javascript Code 10:26
Lecture 46 Wireshark - Basic Overview & How To Use It With MITM Attacks 8:24
Lecture 47 Wireshark - Sniffing & Analysing Data 5:30
Lecture 48 Wireshark - Using Filters, Tracing & Dissecting Packets 6:29
Lecture 49 Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network 7:49
Lecture 50 Creating a Fake Access Point (Honeypot) - Theory 9:5
Lecture 51 Creating a Fake Access Point (Honeypot) - Practical 10:32

Section 12 : Network Hacking - Detection & Security

Lecture 52 Detecting ARP Poisoning Attacks 5:5
Lecture 53 Detecting suspicious Activities In The Network 5:41
Lecture 54 Preventing MITM Attacks - Method 1 8:40
Lecture 55 Preventing MITM Attacks - Method 2 10:54

Section 13 : Gaining Access To Computers

Lecture 56 Gaining Access Introduction 4:14

Section 14 : Gaining Access - Server Side Attacks

Lecture 57 Installing Metasploitable As a Virtual Machine 6:22
Lecture 58 Introduction to Server-Side Attacks 3:57
Lecture 59 Basic Information Gathering & Exploitation 10:6
Lecture 60 Hacking a Remote Server Using a Basic Metasploit Exploit 7:32
Lecture 61 Exploiting a Code Execution Vulnerability to Hack into a Remote Server 10:3
Lecture 62 Nexpose - Installing Nexpose 9:59
Lecture 63 Nexpose - Scanning a Target Server For Vulnerabilities 9:16
Lecture 64 Nexpose - Analysing Scan Results & Generating Reports 7:57

Section 15 : Gaining Access - Client Side Attacks

Lecture 65 Introduction to Client-Side Attacks 2:20
Lecture 66 Installing Veil Framework 4:52
Lecture 67 Veil Overview & Payloads Basics 7:20
Lecture 68 Generating An Undetectable Backdoor 9:44
Lecture 69 Listening For Incoming Connections 7:19
Lecture 70 Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 7:12
Lecture 71 Hacking Windows 10 Using Fake Update 11:49
Lecture 72 Backdooring Downloads on The Fly to Hack Windows 10 11:1
Lecture 73 How to Protect Yourself From The Discussed Delivery Methods 3:52

Section 16 : Gaining Access - Client Side Attacks - Social Engineering

Lecture 74 Introduction to Social Engineering 2:43
Lecture 75 Maltego Basics 5:48
Lecture 76 Discovering Websites, Links & Social Accounts Associated With Target 7:33
Lecture 77 Discovering Twitter Friends & Associated Accounts 4:57
Lecture 78 Discovering Emails Of The Target's Friends 3:48
Lecture 79 Analysing The Gathered Info & Building An Attack Strategy 8:41
Lecture 80 Backdooring Any File Type (images, pdf's 4:41
Lecture 81 Compiling & Changing Trojan's Icon 6:17
Lecture 82 Spoofing 8:29
Lecture 83 Spoofing Emails - Setting Up an SMTP Server 6:52
Lecture 84 Email Spoofing - Sending Emails as Any Email Account 12:3
Lecture 85 Email Spoofing - Method 2 8:10
Lecture 86 BeEF Overview & Basic Hook Method 10:51
Lecture 87 BeEF - Hooking Targets Using Bettercap 6:36
Lecture 88 BeEF - Running Basic Commands On Target 4:24
Lecture 89 BeEF - Stealing Passwords Using A Fake Login Prompt 2:17
Lecture 90 BeEF - Hacking Windows 10 Using a Fake Update Prompt 3:40
Lecture 91 Detecting Trojans Manually 5:32
Lecture 92 Detecting Trojans Using a Sandbox 3:16

Section 17 : Gaining Access - Using The Above Attacks Outside The Local Network

Lecture 93 Overview of the Setup 6:7
Lecture 94 Ex1 - Generating a Backdoor That Works Outside The Network 5:24
Lecture 95 Configuring The Router To Forward Connections To Kali 6:59
Lecture 96 Ex2 - Using BeEF Outside The Network 5:50

Section 18 : Post Exploitation

Lecture 97 Introduction to Post Exploitation
Lecture 98 Meterpreter Basics 6:22
Lecture 99 File System Commands
Lecture 100 Maintaining Access - Basic Methods 5:7
Lecture 101 Maintaining Access - Using a Reliable & Undetectable Method 6:53
Lecture 102 Spying - Capturing Key Strikes & Taking Screen Shots 2:40
Lecture 103 Pivoting - Theory (What is Pivoting) 7:7
Lecture 104 Pivoting - Using a Hacked System to Hack Into Other Systems 8:11

Section 19 : Website Hacking

Lecture 105 Introduction - What Is A Website 4:16
Lecture 106 How To Hack a Website 3:52

Section 20 : Website Hacking - Information Gathering

Lecture 107 Gathering Basic Information Using Whois Lookup 5:36
Lecture 108 Discovering Technologies Used On The Website 6:4
Lecture 109 Gathering Comprehensive DNS Information 10:23
Lecture 110 Discovering Websites On The Same Server 3:43
Lecture 111 Discovering Subdomains 5:6
Lecture 112 Discovering Sensitive Files 7:26
Lecture 113 Analysing Discovered Files 4:18

Section 21 : Website Hacking - File Upload, Code Execution & File Inclusion Vulns

Lecture 114 Discovering & Exploiting File Upload Vulnerabilities To Hack Websites 6:44
Lecture 115 Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites 7:26
Lecture 116 Discovering & Exploiting Local File Inclusion Vulnerabilities 5:16
Lecture 117 Remote File Inclusion Vulnerabilities - Configuring PHP Settings 3:46
Lecture 118 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 5:44
Lecture 119 Preventing The Above Vulnerabilities 7:20

Section 22 : Website Hacking - SQL Injection Vulnerabilities

Lecture 120 What is SQL 5:48
Lecture 121 Dangers of SQL Injection Vulnerabilities 2:54
Lecture 122 Discovering SQL injections In POST 7:56
Lecture 123 Bypassing Logins Using SQL injection 4:49
Lecture 124 Discovering SQL injections in GET 7:2
Lecture 125 Reading Database Information 5:26
Lecture 126 Discovering Database Tables 3:34
Lecture 127 Extracting Sensitive Data From The Database (Such As Passwords, User info 4:29
Lecture 128 Reading & Writing Files On The Server Using SQL Injection Vulnerability 5:58
Lecture 129 Discovering SQL Injections & Extracting Data Using SQLmap 6:47
Lecture 130 The Right Way To Prevent SQL Injection Vulnerabilities 4:58

Section 23 : Website Hacking - Cross Site Scripting Vulnerabilities

Lecture 131 Introduction to Cross Site Scripting 3:9
Lecture 132 Discovering Reflected XSS
Lecture 133 Discovering Stored XSS 2:57
Lecture 134 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF 5:31
Lecture 135 Preventing XSS Vulnerabilities

Section 24 : Website Hacking - Discovering Vulnerabilities Automatically

Lecture 136 Automatically Scanning Target Website For Vulnerabilities 4:19
Lecture 137 Analysing Scan Results 4:11