Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Practical Hacking Using Metasploit From Scratch
Lab Environment Setup
Setup Kali Linux as your Main OS (6:05)
Setup Kali as a Virtual Machine (VirtualBox) (4:55)
Setup Kali as a Virtual Machine (VMware) (4:26)
Fix Windows Ping issue (2:28)
Setup Metasploitable as Virtual Machine (2:24)
Configure NAT Network in VirtualBox (OSX) (4:46)
Configure NAT Network in VirtualBox Windows (3:19)
Setup Windows 10 as Virtual Machine (2:28)
Enhance your Virtual Machine Performance (4:46)
Taking Snapshots of Virtual Machines (3:15)
Connect a Wi-Fi Adapter to the Virtual Machine (1:29)
Update Kali Linux (1:35)
Scanning & Enumeration
Introduction (1:21)
Discover the Connected Clients (4:13)
Enumerate the Target OS (Part 1) (13:11)
Enumerate the Target OS (Part 2) (8:20)
Enumerate the Target OS (GUI) (6:06)
Gaining Access
Introduction (1:03)
Metaasploit Fundmentals (12:29)
Create your First Payload (6:05)
Create your First Encoded Payload (5:59)
Test the Payload on the Target OS (7:26)
Encode and Embed the Payload
Introduction (0:47)
Install Veil Framework [outdated] (3:38)
Create Undetectable Payload [outdated] (7:45)
Embed an EXE File with the Payload (1st Method) [outdated] (8:39)
Embed an EXE File with the Payload (2nd Method) (5:58)
Embed the Payload with an Image, PDF, MP3 (11:40)
Embed the Payload with an Excel, Word document (9:20)
Spoof the Backdoor Extension (7:09)
Windows Post-Exploitation
Post-Exploitation Introduction (0:54)
Interact with the Target OS (Part 1) (6:29)
Interact with the Target OS (Part 2) (6:11)
Persistence on Windows (7:46)
Privileges Escalation - Windows 10 (7:22)
Privileges Escalation - Windows 8.1/8/7 (5:18)
Migrate Meterpreter Backdoor to any Windows Process (7:53)
Check Virtualization - Clear Log Events (5:55)
Uninstall Programs From the Target OS (5:18)
Add/Remove Users - Change the Admin Password (5:55)
Pivoting [Explained] (10:44)
Pivot from the Victim System to Own Every Device on the Network (1st Case) (10:36)
Pivot from the Victim System to Own Every Device on the Network (2nd Case) (12:24)
Discover the Target Wi-Fi Password (8:06)
Capture Keystroke and Passwords Logging (6:15)
Stealing Windows Credentials (6:33)
Crack the Administrator Password (8:47)
Capture Stored Passwords & Visited Websites (9:50)
Recover Deleted Files From the Target OS (8:01)
Enumerate USB Drive History (2:19)
Redirect the Target Browser From to Any Website (16:13)
Hooking with BeEF Framework
Introduction (0:55)
Hooking the Target Browser with BeEF (12:04)
Play Any Sound in the Target Browser (9:29)
Capture a Screenshot From the Target Browser (2:47)
Redirect the target to Any Website (5:44)
Run Any YouTube Video in the Target Browser (4:20)
Steal the Target Credentials (5:48)
Integrate Metasploit Framework with BeEF Project (8:31)
Fully Access the Target OS through the Hooked Browser (8:58)
Having Some Fun with BeEF (8:28)
Get a Reverse Shell/Browser Hook over WAN Network
Introduction (1:17)
Port Forwarding (1st Method) (9:16)
Configure The Backdoor (5:30)
SSH Tunneling (2nd Method) (14:26)
Use BeEF Framework over WAN (5:53)
Detection & Protection
Detect the Running Backdoor Manually (9:59)
Detect Embedded Backdoors (1:46)
Detect Embedded Backdoors [Integrity Check] (4:22)
Keystrokes Encryption (5:54)
TCP Connections Analysis (6:38)
Analyze The Running Processes (4:03)
Sandboxing (4:15)
Practice your Hacking Skills with CTFs
What You'll Learn? (1:21)
Connect to Vulnerable Machines' VPN (16:02)
Exploit EternalBlue Vulnerability on Windows (22:06)
Practice Metasploit, NMAP, Hydra, and Gobuster (20:08)
Hacking using Arbitrary Remote Code Execution (17:52)
Hacking Android Phones [Bonus Section]
Hacking Android - Theory (1:22)
Create a Malicious APK (6:12)
Set a Listener - Gaining Access (2:33)
Running Post Exploitation Modules (6:53)
Hack Any Windows OS with a USB Stick [Bonus Section]
Hacking Demonstration (2:02)
Understanding the Attack (1:21)
The Required Hardware/Software (7:48)
Install The Required Software (3:42)
Commands Conversion (C/C++) (10:26)
Change the Administrator Password (17:15)
Fully Access any Windows OS within 3 Seconds (15:34)
Create your First Payload
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock