Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab
Setting Up Virtual Lab Environment for CompTIA Pentest+ PT0-002- Ethical Hacking
Requirements and Overview of Lab (3:54)
FAQ about CompTIA Pentest+ PT0-002 (Ethical Hacking), Pentesting
Create Lab VirtualBox
Download and Install Kali Linux -VirtualBox (7:36)
Download and Install VirtualBOX (2:02)
Download and Install Kali Linux Image File (2:40)
Download and add Metasploitable Image File (2:40)
OWASP Image File-2 Download and Add VirtualBOX (4:21)
Windows 7 Add VirtualBox (1:47)
BeeBox Download and Add VirtualBox (3:33)
Create Nat Network and Connections Test with VirtualBox (7:32)
Create Lab VmWare
VmWare Download and Install (1:49)
Kali Linux Install VMWare (5:39)
Kali Image File Add VmWare (2:02)
Metasploitable Add VmWare (2:15)
Owasp Add VmWare (2:12)
Win7 add VmWare (1:59)
BeeBox Download and Add VmWare (2:09)
Create Nat Network and Connections Test with VmWare (6:12)
Introduction to Penetration Testing (Pentest+)
Content of the Penetration Testing (2:34)
Definition of "Penetration Test" (2:13)
Penetration Test Types (0:28)
Security Audits (4:41)
Vulnerability Scan (2:45)
Terms: Asset, Threat, Vulnerability, Risk, Exploit (3:08)
Penetration Test Approaches (2:44)
Planning a Penetration Test (4:24)
Penetration Test Phases (7:01)
Legal Issues & Testing Standards (4:18)
Basic Networking
What is “Protocol” (5:36)
Reference Models (0:24)
OSI Reference Model (13:43)
OSI vs TCP/IP (2:33)
Demonstration using Wireshark (7:59)
Standards & Protocols (3:50)
Ethernet: Principles, Frame & Headers (4:06)
ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets (6:10)
ARP Hand-On Practices (3:14)
VLANs – Virtual Local Area Networks (4:03)
WLANs – Wireless Local Area Networks (7:01)
Introduction to Network Layer (1:37)
Internet Protocol - IP (2:49)
IPv4 Adressing System (1:56)
IPv4 Packet Header (2:56)
IPv4 Subnetting: Classful Networks (2:35)
IPv4 Subnetting: Subnet Mask (2:59)
IPv4 Subnetting: Understanding (3:09)
IPv4 Shortage (1:41)
Private Networks (3:59)
Private Networks - Demonstration (3:01)
NAT – Network Address Translation (4:30)
IPv6, Packet Header & Addressing (8:30)
DHCP - How the Mechanism Works (9:23)
ICMP – Internet Control Message Protocol (2:02)
Traceroute (9:51)
Introduction to Transport Layer (2:40)
TCP – Transmission Control Protocol (6:59)
TCP Header (2:27)
UDP – User Datagram Protocol (3:56)
Introduction to Application Layer (0:55)
DNS – Domain Name System (5:56)
HTTP ( Hyper Text Transfer Protocol ) (3:09)
HTTPS (1:56)
Information Gathering
Intro to Reconnaissance (3:31)
Extract Domain Registration Information: Whois (4:20)
Identifying Hosts or Subdomains Using DNS: Fierce & Theharvester (6:08)
Detect Applications on The Same Service (1:10)
Ports and Services on The Web Server (8:44)
Review Technology/Architecture Information (4:37)
Extracting Directory Structure: Crawling (8:17)
Minimum Information Principle (2:56)
Using Search Engines: Google Hacking (6:10)
Shodan (2:50)
Web Archives (1:53)
FOCA - Fingerprinting Organisations with Collected Archives (7:41)
Maltego - Visual Link Analysis Tool (4:38)
quiz
Vulnerability Scan and Introduction to Nessus
Introduction to Vulnerability Scan (9:19)
Introduction to Nessus (1:57)
Nessus: Download (1:40)
Nessus: Install & Setup (3:42)
Nessus: Creating a Custom Policy (5:39)
Nessus: First Scan (7:07)
An Aggressive Scan (4:23)
Results of an Aggressive Scan (7:17)
Results of an Aggressive Scan with Windows Systems (2:45)
Nessus: Report Function (2:21)
quiz
Network Scan & Network Attacks
Passive Scan - Definition (2:50)
Passive Scan - ARP Tables (6:20)
Passive Scan - Wireshark (6:36)
Wireshark Following Stream (2:40)
Wireshark: Summarise Network (6:19)
Active Scan (8:30)
MitM Listening to the traffic (1:45)
Sniffing (1:03)
TCPDump (5:23)
Router Switch Hub (4:44)
How to Expand Sniffing Space (5:13)
MAC Flood Switching (3:55)
MAC Flood Using Macof Tool (7:09)
MacFlood - Countermeasures (1:13)
ARP Spoof (3:40)
ARP Cache Poisoning using Ettercap (10:35)
DHCP Starvation & DHCP Spoofing (3:36)
DHCP Mechanism (6:15)
Network Scan & Network Attacks
DHCP Starvation Scenario (4:00)
DHCP Starvation Demonstration with Yersinia (8:33)
VLAN Hopping (2:05)
VLAN Hopping Switch Spoofing (1:39)
VLAN Hopping Double Tagging (3:17)
Nmap
What Is Nmap (4:14)
Nmap First Scan (4:47)
Interpretation of Nmap Results (2:04)
Scanning Specific IPs or Specific Targets With Nmap (1:57)
Nmap IP List Creation (4:07)
Nmap Random Scan and Exclude Ips (4:17)
Input Output Management in Nmap (8:28)
What is Port Nmap Port Scan (3:34)
Scanning Top 20 Top 100 Ports With Nmap (4:43)
Scanning Specific Ports With Nmap (6:01)
Nmap Syn Scannig (3:21)
Nmap TCP Scan (2:46)
Nmap UDP Scan (4:12)
Nmap FiN, Xmas, Null and ACK Scan in Ethical Hacking (2:55)
Discovering hosts with ARP ping scans (4:52)
Discovering hosts with ICMP ping scans (3:23)
Nmap Fast Scan (1:13)
Nmap Open Ports Scan (1:23)
Nmap No PORT Scan (2:15)
Nmap PING and noPING Scan (3:19)
Nmap Verbose Command (2:15)
Nmap Version Detection (7:10)
Nmap Operating System Detection (5:58)
Nmap Script Engine (NSE) (10:59)
Nmap Script Engine Example 1 (2:53)
Nmap Script Engine Example 2 (0:58)
NMAP Brute Force Attacks (4:35)
Nmap Timing Templates (3:36)
Bypass of IPS & IDS Systems With Nmap (10:57)
quiz
Using Metasploit Framework
Why Metasploit Framework? AKA: MSF (5:33)
Importance of Penetration Testing (Pentesting) (3:15)
Penetration Testing Execution Standard (5:40)
Requirements ( Like Storage. Processor ) (2:44)
Lab Connectivity and Taking Snapshots (2:05)
Evolution of Metasploit (4:18)
Metasploit Filesystem and Libraries (4:31)
The Architecture of MSF (1:43)
Auxiliary Modules (4:37)
Payload Modules (6:00)
Exploit Modules (3:33)
Encoder Modules (2:35)
Post Modules (3:24)
Metasploit Editions (4:02)
Metasploit Community (3:09)
Metasploit Interfaces (4:50)
Armitage (3:16)
MSFconsole (4:53)
MSFConsole Basic Commands 1 (6:44)
MSFConsole Basic Commands 2 (7:59)
MSFConsole Basic Commands 3 (3:32)
Using Databases in MSF 1 (5:43)
Using Databases in MSF 2 (3:14)
More on Exploits in MSF (3:14)
Enumeration
What is Enumeration (2:03)
SMB and Samba Enumeration (5:40)
MySQL Enumeration (3:40)
FTP Enumeration (4:15)
SSH Enumeration (2:30)
HTTP Enumeration (6:02)
SNMP Enumeration (3:43)
SMTP Enumeration (3:49)
NMAP DNS Enumeration (6:12)
NMAP HTTP Enumeration (2:52)
NMAP MySQL Enumeration (5:06)
NMAP SMB Enumeration (4:55)
NMAP SNMP Enumeration (6:56)
Social Engineering
Terminologies Part 1 (5:19)
Terminologies Part 2 (6:08)
Creating Malware and Terminologies (3:37)
MSFvenom Part 1 (14:09)
MSFvenom Part 2 (2:25)
Veil Installation (2:36)
Veil in Action (5:12)
TheFatRat Installation (4:19)
TheFatRat in Action (11:08)
TheFatRat Overcoming a Problem (0:46)
Embedding Malware in PDF (4:04)
Embedding Malware in WORD (9:21)
Embedding Malware in Firefox Add-on (7:02)
Empire Installation (4:07)
Empire in Action Part 1 (8:12)
Empire in Action Part 2 (4:23)
Exploiting Java Vulnerabilities (2:24)
Social Engineering Toolkit (6:34)
Sending Fake Emails Phishing (1:11)
Vishing - Voice Phishing (3:41)
Wi-Fİ Hacking And Tools
Hardware and Software Requirements (7:02)
Wi-Fi Adapter Settings (6:17)
IEE-802.11 (3:54)
Basic Terminologies Concepts (4:50)
Wireless Operating Modes (6:11)
MAC Frame Structure (2:58)
Wireless Packet Types (5:22)
Wireshark Analysing Packet Types (6:33)
Wifi Network Interaction (5:03)
Wireless Encryption Protocols WEP WPA (3:58)
WPA-4 Way Handshake (5:45)
Personal Enterprise (3:16)
Wireshark WEP and WPA (1:10)
Wifi Protected Setup (3:49)
Wireless Reconnaissance Bettercap (3:35)
Wardriving with Kismet: Configuration (6:45)
Wardriving with Kismet: Mapping (4:50)
Rogue Access Points Airbase ng (5:46)
Rogue Access Points Evil Twin Attack (6:42)
Rogue Access Points Wifi Pumpkin (7:30)
Rogue Access Points Fluxion (2:50)
Fluxion Handshake Snooper Attack (4:54)
Fluxion Captive Portal Attack (5:28)
WEP Cracking Preparing Attacks (2:49)
Cracking WEP Fake Authentication Attack (3:50)
Cracking WEP Deauthentication Attack (2:59)
WEP Cracking Deauthentication Attack with Bettercap (1:32)
WEP Cracking - ARP Request Replay Attack (4:15)
WEP Cracking - Fragmentation Attack (5:09)
WEP Cracking - ChopChop Attack (3:47)
WPA/WPA2 Cracking - Introduction (5:13)
WPA/WPA2 Cracking - Aircrack-ng (3:57)
WPA/WPA2 Cracking - John The Ripper (4:09)
WPA/WPA2 Cracking - CoWPAtty (2:52)
WPA/WPA2 Cracking - Wifite 2 (2:20)
WPA/WPA2 Cracking with GPUs : Hashcat (5:25)
WPA/WPA2 Cracking - Key Reinstallation Attack (KRACK) (7:12)
WPS Cracking - Wifite 2: PIN Attack (3:50)
quiz
Web Application Pentesting
Reflected Cross-Site Scripting Attacks (9:42)
Reflected Cross-Site Scripting over JSON (6:24)
Stored Cross-Site Scripting Attacks (9:56)
DOM Based Cross-Site Scripting Attacks (10:04)
Inband SQL Injection over a Search Form (14:24)
Inband SQL Injection over a Select Form (8:22)
Error-Based SQL Injection over a Login Form (6:47)
SQL Injection over Insert Statement (7:07)
Boolean Based Blind SQL Injection (6:53)
Time Based Blind SQL Injection (5:34)
Detecting and Exploiting SQL Injection with SQLmap (11:30)
Detecting and Exploiting Error Based SQL Injection with SQLmap (5:10)
Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap (8:02)
Command Injection Introduction (5:35)
Automate Command Injection Attacks: Commix (5:43)
XML/XPATH Injection (14:07)
SMTP Mail Header Injection (6:51)
PHP Code Injection (6:00)
Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner (3:06)
Introduction to Burp: Downloading, Installing and Running (8:44)
Intercepting HTTP Traffic with Burp Suite (3:48)
Intercepting HTTPS Traffic with Burp Suite (2:52)
quiz
Authentication and Authorization Testing
Definition (2:37)
Creating a Password List: Crunch (7:32)
Differece Between HTTP and HTTPS Traffic: Wireshark (3:43)
Attacking Insecure Login Mechanisms (9:12)
Attacking Insecure Logout Mechanisms (4:50)
Attacking Improper Password Recovery Mechanisms (5:50)
Attacking Insecure CAPTCHA Implementations (8:39)
Path Traversal: Directory (6:44)
Path Traversal: File (5:41)
Introduction to File Inclusion Vulnerabilities (6:23)
Local File Inclusion Vulnerabilities (6:11)
Remote File Inclusion Vulnerabilities (5:51)
Post Exploitation
Post-Exploitation (3:28)
What is “Persistence”? (1:28)
Meterpreter’s Persistence module (8:55)
Removing the Backdoor (5:00)
IoT & Mobile
What is IoT (3:25)
Where does IoT Exist in Our Lives (1:47)
How does IoT work (0:47)
Connection Standarts (9:06)
IoT Security (7:04)
Mobile Security Threats (8:02)
Scripting Basics
Bash Scripting 101 (4:18)
Python Scripting
Installing Anaconda Distribution For Windows in Python (2:49)
Installing Python 3.9.7 and PyCharm For Windows in Python (4:19)
Variables in python (8:35)
Numbers in Python (10:20)
String Operations and Useful String Methods in python examples (5:37)
Data Type Conversion in Python (3:53)
Exercise : Company Email Generator in python (2:57)
Conditionals in python (1:41)
bool() Function in Python (2:08)
Comparison and Logical Operators in Python (9:05)
If Statements in Python (9:59)
Exercise: Calculator (11:05)
Loops in Python (1:31)
While Loops in Python (4:15)
For Loops in python (4:29)
Range Function in Python (3:24)
Control Statements in python (5:03)
Functions in Python Programming (2:11)
Create A New Function and Function Calls (3:53)
Return Statement (4:36)
Lambda Functions (2:58)
Lists and List Operations in Python Programming (4:55)
List Methods in Python Programming (5:35)
Dictionaries in Python Hands-on (10:16)
Dictionary Comprehensions (2:20)
Logic of OOP in Object Oriented Programming (OOP) (4:58)
Constructor (6:34)
Methods (4:41)
Inheritance (6:42)
Overriding and Overloading (10:33)
Ruby Scripting
Ruby Set Up - Installing Ruby on Windows (2:01)
Ruby Development Editor (3:18)
First Program (6:25)
Debugging (2:05)
Comments (1:02)
What is a variable? (3:42)
Data Types (3:07)
Arithmetic Operators (2:16)
Assignment Operator (2:15)
Parallel Assignment (2:03)
Comparison Operators (5:10)
Logical Operators (1:28)
Special Operators (2:27)
Operation Ordering (3:00)
String Operations (9:50)
String Methods (6:18)
If Statements (10:38)
Unless Statements (4:06)
Case Statements (4:00)
Loops (4:24)
For Loops and Iterators (3:34)
Do / While Loops (1:19)
Break and Next Keywords (3:59)
Method Calls (2:24)
Create A New Method (5:02)
Blocks (3:48)
Method Arguments (5:51)
Lambda Functions (3:46)
Global and Local Variables (4:19)
Recursive Functions (3:15)
Modules (5:46)
Arrays (4:12)
Traverse an Array (4:12)
Array Operations (8:11)
Array Methods (8:25)
Hashes (4:52)
Traverse a Hash (2:45)
Hash Operations (1:51)
Hash Methods (6:04)
Files and Directories (8:17)
File Operations (7:49)
Exceptions (12:03)
Throw-Catch Statements (5:37)
Metasploit Editions
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock