Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Master Ethical Hacking from Beginner Lab Setup to Coding Advanced Backdoors!
Introduction and Installation!
Before We Begin! (4:43)
Virtual Box Install Tutorial (15:37)
Kali Linux Install Tutorial (13:57)
Going Full Screen in Kali Linux! (18:17)
Basic Commands!
Basic Commands Part 1 (9:41)
Basic Commands Part 2 (21:06)
Basic Commands Part 3 (12:48)
Prepare Your Lab!
Changing IP address and setting up Wireless Adapter (4:53)
Creating Bootable Kali USB (5:00)
Important Networking Terms (10:18)
Important Hacking Terms (18:05)
Few Things to Do After Installing Kali Linux (8:32)
Changing Our Mac Address - Macchanger (6:27)
Footprinting!
Google Hacking (13:11)
Nikto Basics (10:55)
Whois Tool (6:40)
Email Harvesting (6:08)
Shodan (10:25)
Zone Transfer With Dig (7:09)
Scanning!
Installing Metasploitable (7:00)
Nmap Part 1 (15:34)
Nmap Part 2 (11:43)
Nmap Part 3 (12:25)
Zenmap (7:55)
TCP scans (15:52)
Nmap Bypassing Defences (17:24)
Nmap Scripts 1 (9:30)
Nmap Scripts 2 (14:00)
Web Penetration Testing!
Installing Owasp (8:27)
HTTP request (10:01)
HTTP Response (10:30)
Burpsuite Configuration (12:51)
Editing Packets in Burpsuite (12:21)
Whatweb & Dirb (10:12)
Password Recovery Attack (15:35)
Burpsuite Login Bruteforce (11:06)
Hydra Login Bruteforce (8:48)
Session Fixation (13:55)
Injection Attacks (5:35)
Simple Command Injection (11:10)
Exploiting Command Injection Vulnerability (7:44)
Finding Blind Command Injection (13:46)
Basics Of SQL (10:27)
Manual SQL Injection Part 1 (13:17)
Manual SQL Injection Part 2 (21:00)
SQLmap basics (16:37)
XML Injection (16:00)
Installing XCAT and Preventing Injection Attacks (5:53)
Reflected XSS (10:52)
Stored XSS (12:01)
Changing HTML Code with XSS (7:34)
XSSer & XSSsniper (13:40)
WPA2 Cracking
Wireless Attacks Theory (10:52)
Putting Network Card in Monitor Mode (4:41)
Capturing Handshake With Airodump (14:40)
RockYou.txt (14:00)
Cracking with Aircrack (15:35)
Cracking with Hashcat (15:00)
Making Password Lists With Crunch (18:22)
Making Password Lists With Cupp (7:12)
Rainbowtables Part 1 (16:36)
Rainbowtables Part 2 (5:40)
Installing Fluxion (6:20)
Finding and Cracking Hidden Network (8:22)
Preventing Wireless Attacks (8:00)
Man In The Middle
ARP Protocol Basics (10:30)
MITM Attack Theory (7:22)
Installing MITMf (6:38)
Manual Arpspoofing (12:50)
Problems While Installing MITMf (6:21)
HTTP Traffic Sniffing (8:32)
DNS Spoofing and HTTPS Password Sniffing (24:20)
Hooking Browsers With BEEF (16:04)
Screenshotting Targets Browser (11:03)
Cloning Any Webpage (8:56)
Ettercap Basics (7:00)
System Hacking
MSFconsole Enviroment (16:10)
Metasploit Modules Explained (12:14)
Bruteforcing SSH with Metasploit (15:20)
Attacking Tomcat With Metasploit (8:53)
Getting Meterpreter With Command Injection (25:08)
PHP Code Injection (5:46)
2 Metasploitable Exploits (7:00)
Wine installation (12:04)
Crafting Windows Payloads With Msfvenom (10:04)
Encoders & Hexeditor (18:45)
Windows 10 Meterpreter Shell (12:01)
Meterpreter Enviroment (11:30)
Windows 10 Privilege Escalation (11:30)
Preventing Privilege Escalation (6:23)
Post Exploitation Modules (14:13)
Getting Meterpreter Over Internet With Port Forwarding (10:43)
Eternalblue Exploit (20:20)
Persistence Module (13:19)
Hacking Over Internet With Ngrok (10:26)
Android Device Attack With Venom (9:55)
Real Hacking Begins Now! (2:26)
Python Basics
Variables (13:45)
Raw_input (10:49)
IF ELSE statement (10:20)
FOR loop (6:33)
WHILE loop (8:24)
Python Lists (8:07)
Functions (14:33)
Classes (10:25)
Importing Libraries (7:01)
Files in Python (11:44)
Try and Except rule (5:14)
Coding Advance Backdoor
Theory Behind Reverse Shell (6:50)
Simple Server Code (12:43)
Connection With Reverse Shell (7:10)
Sending and Receiving Messages (10:49)
Sending Messages With While True Loop (7:54)
Executing Commands On Target System (9:37)
Fixing Backdoor Bugs & Adding Functions (20:10)
Installing Pyinstaller (2:26)
First Performance Test of Our Backdoor (18:01)
Trying to Connect Every 20 seconds (12:26)
Creating Persistence Part 1 (6:12)
Creating Persistence Part 2 (16:50)
Changing Directory (11:55)
Uploading & Downloading Files (22:32)
Downloading Files From Internet (22:45)
Starting Programs From Our Backdoor (6:47)
Capturing Screenshot On Target PC (18:46)
Embedding Backdoor In Image Part 1 (13:29)
Embedding Backdoor In Image Part 2 (8:40)
Checking For Administrator Privileges (12:11)
Adding Help Option (8:52)
Creating Keylogger For Backdoor
Importing Pynput (10:24)
Simple Keylogger (10:00)
Adding Report Function (10:36)
Writing Keystrokes To a File (14:00)
Adding Keylogger To Our Reverse Shell Part 1 (23:01)
Adding Keylogger To Our Reverse Shell Part 2 (7:42)
Final Project Test (14:26)
Basic Authentication Bruteforcer
Printing Banner (11:21)
Adding Available Options (11:16)
Starting Threads For Bruteforce (8:26)
Making Function To Run The Attack (11:05)
Bruteforcing Router Login (9:40)
Bypassing Antivirus With All Your Future Programs (13:43)
Sending Malware With Spoofed Email (15:16)
Whats Next (4:15)
Try and Except rule
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock