Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
Learn Ethical Hacking + Penetration Testing! Use real techniques by black hat hackers then learn to defend against them!
Description
Course content
- Introduction
- Course Outline
- Join Our Online Classroom!
- Exercise: Meet The Community
- What Is Ethical Hacking ?
- Course Resources + Guide
- Setting Up Our Hacking Lab
- What is A Virtual Machine ?
- Why Linux ?
- Downloading Virtual Box & Kali Linux
- Note: Kali Linux Updates All The Time!
- Creating Our First Virtual Machine
- Installing Kali Linux Operating System
- Update 1 - New & Old Versions of Kali Linux
- Full Screen Mode & Network Settings
- Note: Getting Familiar With Kali Linux!
- 5 Stages Of A Penetration Test
- Linux Operating System
- Navigating Through Linux System
- Creating Files & Managing Directories
- Network Commands & Sudo Privileges In Kali
- Note: Linux File System & Additional Commands
- Reconnaissance & Information Gathering
- What is Information Gathering ?
- Obtaining IP Address, Physical Address Using Whois Tool
- Whatweb Stealthy Scan
- Aggressive Website Technology Discovering on IP Range
- Note: Same Tools Different Results!
- Gathering Emails Using theHarvester & Hunter.io
- How To Download Tools Online
- Finding Usernames With Sherlock
- Bonus - Email Scraper Tool In Python 3
- Note: More About Information Gathering
- Scanning
- Theory Behind Scanning
- TCP & UDP
- Installing Vulnerable Virtual Machine
- Netdiscover
- Performing First Nmap Scan
- Different Nmap Scan Types
- Discovering Target Operating System
- Detecting Version Of Service Running On An Open Port
- Filtering Port Range & Output Of Scan Results
- What is a Firewall/IDS ?
- Using Decoys and Packet Fragmentation
- Security Evasion Nmap Options
- Note: Time To Switch Things Up!
- Python Coding Project #1 - Portscanner
- The 2 Paths
- Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
- Coding a Portscanner in Python 3
- Vulnerability Analysis
- Finding First Vulnerability With Nmap Scripts
- Manual Vulnerability Analysis & Searchsploit
- Nessus Installation
- Discovering Vulnerabilities With Nessus
- Scanning Windows 7 Machine With Nessus
- Lets cool down for a bit!
- Exploitation & Gaining Access
- What is Exploitation ?
- What is a Vulnerability ?
- Reverse Shells, Bind Shells ..
- Metasploit Framework Structure
- Msfconsole Basic Commands
- Our First Exploit - vsftp 2.3.4 Exploitation
- Misconfigurations Happen - Bindshell Exploitation
- Information Disclosure - Telnet Exploit
- Software Vulnerability - Samba Exploitation
- Attacking SSH - Bruteforce Attack
- Exploitation Challenge - 5 Different Exploits
- Explaining Windows 7 Setup
- Eternal Blue Attack - Windows 7 Exploitation
- DoublePulsar Attack - Windows Exploit
- BlueKeep Vulnerability - Windows Exploit
- Note: We Can Also Target Routers!
- Update 2 - Routersploit
- Update 3 - Router Default Credentials
- SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
- Note: Not Everything Will Work Smooth!
- Setting Up Vulnerable Windows 10
- Crashing Windows 10 Machine Remotely
- Exploiting Windows 10 Machine Remotely
- Gaining Access (Viruses, Trojans, Payloads ...)
- Generating Basic Payload With Msfvenom
- Advance Msfvenom Usage Part 1
- Advance Msfvenom Usage Part 2
- Generating Powershell Payload Using Veil
- TheFatRat Payload Creation
- Note: My Payloads Are Getting Detected By An Antivirus!
- Hexeditor & Antiviruses
- Making Our Payload Open An Image
- Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers ..
- Post Exploitation Theory
- Meterpreter Basic Commands Part 1
- Meterpreter Basic Commands Part 2
- Elevating Privileges With Different Modules
- Creating Persistence On The Target System
- Post Exploitation Modules
- Exploitation Recap
- Python Coding Project #2 - Backdoor
- What Are We Creating ?
- Connecting Server And Backdoor
- Processing Instructional Commands
- Sending and Receiving Data
- Executing Commands And Compiling The Program
- Changing Directory Inside Of Our Backdoor
- Uploading & Downloading Files
- Testing All The Commands
- Note: You Can Continue Building Onto This Project!
- Website Application Penetration Testing
- Website Penetration Testing Theory
- HTTP Request & Response
- Information Gathering & Dirb Tool
- Burpsuite Configuration
- ShellShock Exploitation
- Command Injection Exploitation
- Getting Meterpreter Shell With Command Execution
- Reflected XSS & Cookie Stealing
- Stored XSS
- HTML Injection
- SQL Injection
- CSRF Vulnerability
- Hydra Bruteforce Attack Example 1
- Hydra Bruteforce Attack Example 2
- Burpsuite Intruder
- Python Coding Project #3 - Login Bruteforce, Directory Discovery
- Creating 2 Programs
- Bruteforcer In Python
- Hidden Directory Discovery
- Man In The Middle - MITM
- Theory - Man In The Middle Attack
- Bettercap ARP Spoofing
- Ettercap Password Sniffing
- Manually Poisoning Targets ARP Cache With Scapy
- Bonus - Wireless Access Point Cracking
- Wireless Cracking Theory
- Putting Wireless Card In Monitor Mode
- Deauthenticating Devices & Grabbing Password
- Aircrack Password Cracking
- Hashcat Password Cracking
- Where To Go From Here ?
- Become An Alumni
- Endorsements On LinkedIN
- What is Next?
- Learning Guideline
- Practice
- Bug Bounty
- Coding For Hackers
- Exploit Development
- Python Monthly
- Learn Python Basics
- What Is A Programming Language
- Python Interpreter
- How To Run Python Code
- Our First Python Program
- Latest Version Of Python
- Python 2 vs Python 3
- Exercise: How Does Python Work?
- Learn Python Intermediate
- Learning Python
- Python Data Types
- How To Succeed
- Numbers
- Math Functions
- DEVELOPER FUNDAMENTALS: I
- Operator Precedence
- Exercise: Operator Precedence
- Optional: bin() and complex
- Variables
- Expressions vs Statements
- Augmented Assignment Operator
- Strings
- String Concatenation
- Type Conversion
- Escape Sequences
- Formatted Strings
- String Indexes
- Immutability
- Built-In Functions + Methods
- Booleans
- Exercise: Type Conversion
- DEVELOPER FUNDAMENTALS: II
- Exercise: Password Checker
- Lists
- List Slicing
- Matrix
- List Methods
- List Methods 2
- List Methods 3
- Common List Patterns
- List Unpacking
- None
- Dictionaries
- DEVELOPER FUNDAMENTALS: III
- Dictionary Keys
- Dictionary Methods
- Dictionary Methods 2
- Tuples
- Tuples 2
- Sets
- Sets 2
- Breaking The Flow
- Conditional Logic
- Indentation In Python
- Truthy vs Falsey
- Ternary Operator
- Short Circuiting
- Logical Operators
- Exercise: Logical Operators
- is vs ==
- For Loops
- Iterables
- Exercise: Tricky Counter
- range()
- enumerate()
- While Loops
- While Loops 2
- break, continue, pass
- Our First GUI
- DEVELOPER FUNDAMENTALS: IV
- Exercise: Find Duplicates
- Functions
- Parameters and Arguments
- Default Parameters and Keyword Arguments
- return
- Methods vs Functions
- Docstrings
- Clean Code
- *args and **kwargs
- Exercise: Functions
- Scope
- Scope Rules
- global Keyword
- nonlocal Keyword
- Why Do We Need Scope?
- Modules in Python
- Quick Note: Upcoming Videos
- Optional: PyCharm
- Packages in Python
- Different Ways To Import
- Learn Python 3: Error Handling
- Errors in Python
- Error Handling
- Error Handling 2
- Exercises: Error Handling
- Error Handling 3
- Learn Python 4: File I/O
- Working With Files In Python
- Read, Write, Append
- File Paths
- File IO Errors
- Exercise: Translator
- Next Steps
- BONUS SECTION
Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part5.rar
Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part3.rar
Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part4.rar
Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part2.rar
Complete_Ethical_Hacking_Bootcamp_2021_Zero_to_Mastery.part1.rar
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.