Introduction and Installation
  • Introduction to the course
  • VirtualBox installation
  • Kali Linux installation
  • Enabling full-screen
Basic Linux Commands
  • Basic commands part 1
  • Basic commands part 2
  • Basic commands part 3
Creating a Secure Hacking Environment
  • Changing IP address and wireless adapter setup
  • Creating a bootable Kali USB drive
  • Essential networking terms
  • Essential hacking terms
  • Additional Kali tools to install
  • Changing our MAC address with macchanger
Footprinting
  • Google hacking
  • Nikto basics
  • Whois tool
  • Email harvesting
  • Shodan
  • Zone transfer with Dig
Scanning
  • Installing Metasploitable
  • Nmap part 1
  • Nmap part 2
  • Nmap part 3
  • Zenmap
  • TCP scans
  • Nmap bypassing defenses
  • Nmap scripts part 1
  • Nmap scripts part 2
Website Penetration Testing
  • Installing OWASP
  • HTTP request
  • HTTP response
  • Burpsuite configuration
  • Editing packets in Burpsuite
  • Whatweb and Dirb
  • Password recovery attack
  • Burpsuite login bruteforce
  • Hydra login bruteforce
  • Session fixation
  • Injection attacks
  • Simple command injection
  • Exploiting command injection vulnerability
  • Finding blind command injection
  • SQL basics
  • Manual SQL injection part 1
  • Manual SQL injection part 2
  • SQLmap basics
  • XML injection
  • Installing XCAT and preventing injection attacks
  • Reflected XSS
  • Stored XSS
  • Changing HTML code with XSS
  • XSSer and XSSsniper
Wireless Cracking
  • Wireless attacking theory
  • Enabling monitor mode
  • Capturing handshake with airodump
  • RockYou.txt
  • Cracking with Aircrack
  • Cracking with Hashcat
  • Creating password lists with Crunch
  • Creating password lists with Cupp
  • Rainbow tables part 1
  • Rainbow tables part 2
  • Installing Fluxion
  • Finding and cracking hidden networks
  • Preventing wireless attacks
Man in the Middle Attacks
  • ARP protocol basics
  • Man in the middle attack theory
  • Installing MITMf
  • Manual ARP spoofing
  • Problems while installing MITMf
  • HTTP traffic sniffing
  • DNS spoofing and HTTPS password sniffing
  • Hooking browsers with BEEF
  • Screenshotting targets browser
  • Cloning any webpage
  • Ettercap basics
System Hacking with Metasploit
  • MSFconsole environment
  • Metasploit modules explained
  • Bruteforcing SSH with Metasploit
  • Attacking Tomcat with Metasploit
  • Getting Meterpreter with command injection
  • PHP code injection
  • 2 Metasploitable exploits
  • Wine installation
  • Creating Windows payloads with Msfvenom
  • Encoders and Hex editor
  • Windows 10 Meterpreter shell
  • Meterpreter environment
  • Windows 10 privilege escalation
  • Preventing privilege escalation
  • Post exploitation modules