Course Overview | |||
Course Overview | 00:04:00 | ||
Building Your Virtual Lab Environment | |||
Lab-Creating a Virtual install of Kali using VirtualBox | 00:13:00 | ||
Installing the VirtualBox Extension Pack | 00:02:00 | ||
Lab-Creating a Virtual Install of CSI Linux | 00:13:00 | ||
Lab-Creating an Unattended Virtual Install of XP Using Virtualbox | 00:08:00 | ||
Taking a Snapshot of Your Current configuration | 00:04:00 | ||
Anonymity - Remaining Anonymous While Browsing Online | |||
Lab-Anonymize Kali Using Whonix | 00:10:00 | ||
Lab-Ensuring Anonymity Using the CSI Linux Gateway | 00:13:00 | ||
Assigning a Random MAC Address in Kali | 00:07:00 | ||
Passive reconnaissance | |||
Lab-Information Gathering Using Maltego | 00:10:00 | ||
Lab-Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
Using Metagoofil inside CSI Linux Analyst | 00:05:00 | ||
Conducting a Passive Reconnaissance Using Shodan | |||
Lab-Preparing CSI Analyst to Use Shodan | 00:06:00 | ||
Lab-Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
Lab-Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
NMap | |||
Lab-Introduction to NMap | 00:17:00 | ||
Lab-NMap Scripting Engine (NSE) | 00:19:00 | ||
Lab-Scanning for WannaCry Ransomware | 00:14:00 | ||
Scanning for Vulnerabilities Using NESSUS | |||
Lab-Installing NESSUS Using Docker | 00:15:00 | ||
Lab-Scanning for Vulnerabilities Using Nessus | 00:11:00 | ||
Using Your Nessus Scan Results | 00:12:00 | ||
Scanning for Vulnerabilities Using OpenVAS | |||
Lab-Installing OpenVAS Using Docker | 00:09:00 | ||
Lab – Scanning for Vulnerabilities Using OpenVAS | 00:10:00 | ||
Exploiting Windows XP | |||
Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP | 00:09:00 | ||
Lab-Establishing A VNC Shell Using Meterpreter | 00:18:00 | ||
Lab-Using Meterpreter to backdoor Windows XP | 00:12:00 | ||
Lab – Exploiting Vulnerable Applications on Windows XP SP2 | 01:15:00 | ||
Lab – Hacking Windows XP via MS11-006 Windows Shell Graphics Processing | 01:05:00 | ||
NetCat | |||
Creating a Virtual Install of Server 2008 Using virtualBox | 00:07:00 | ||
Lab-Create Reverse Shell Using MS09_050 | 00:12:00 | ||
Exploiting Linux | |||
Lab-Installing Metasploitable2 Using VirtualBox | 00:10:00 | ||
Lab – Learning to Hack Linux Using Metasploitable2 | 01:10:00 | ||
Lab – Exploring Endpoint Attacks | 01:35:00 | ||
Social Engineering | |||
Lab-Using the Social Engineering Toolkit (SET) | 00:07:00 | ||
BASH Scripting for Pentesters | |||
Lab-Introduction to BASH Scripting | 00:08:00 | ||
Lab-Creating a BASH Script for Linux Fedora Part-1 | 00:11:00 | ||
Lab-Creating a BASH Script for Linux Fedora Part-2 | 00:30:00 | ||
Password Cracking | |||
Lab – Password Cracking Using Medusa | 00:06:00 | ||
Lab-Passwords Cracking Using Mimikatz | 00:11:00 | ||
Lab-Password Cracking Using Hydra | 00:05:00 | ||
Web Based Application Attacks | |||
Lab-Installing w3af in Kali Linux Using Docker | 00:13:00 | ||
Lab – Conducting A Website Vulnerability Scan Using w3af | 00:05:00 | ||
Lab – Performing a Browser Based Attack | 00:12:00 | ||
Lab-SQL Injection Attack Using SQLmap | 00:12:00 | ||
Browser Exploitation Framework (BeEF) | |||
Configure Kali for Exploitation the WAN | 00:16:00 | ||
Lab-The Browser Exploitation Framework (BeEF) | 00:19:00 | ||
Capture the Flag Walkthrough - Mr. Robot | |||
Lab file – Capture the Flag (CTF) – Mr. Robot | 02:25:00 | ||
Video Walk Through -Key #1 | 00:13:00 | ||
Video Walk through – Key #2 | 00:19:00 | ||
Video Walk Through – Key #3 | 00:08:00 | ||
Capture the Flag Walkthrough – Stapler | |||
Lab File – Walkthrough – CTF – Stapler | 02:40:00 | ||
Capture the Flag – Stapler Part 1 | 00:18:00 | ||
Capture the Flag – Stapler Part 2 | 00:17:00 | ||
Capture the Flag – Stapler Part 3 | 00:17:00 | ||
Bonus - Digital Forensics Case Management | |||
Attaching an External USB Device in Kali | 00:07:00 | ||
Lab -Digital Forensics Using Autopsy Part I | 00:11:00 | ||
Lab-Digital Forensics Using Autopsy Part II | 00:07:00 | ||
Assignment | |||
Assignment – Ethical Hacking and Penetration Testing Using Kali Linux | 00:00:00 |
No Reviews found for this course.