- What is an ethical hacker?
- Terminology crash course pt. 1
- Terminology crash course pt. 2
- Terminology crash course pt. 3
- Confidentiality, integrity, and availability
- Legal considerations
- Surveying the attack surface
- Recon types and goals
- Passive recon pt. 1
- Passive recon pt. 2
- Active recon
- Recon walk-through and tools summary
- DEMO - Maltego real world example
- DEMO - FOCA to examine metadata
- DEMO - Harvester
- DEMO - Information collection using Recon-ng
- Scanning & enumeration
- Identifying active hosts pt. 1
- Identifying active hosts pt. 2
- Identifying active services
- OS and services fingerprinting
- Network mapping
- Final thoughts
- DEMO - Nmap syntax pt. 1
- DEMO - Nmap syntax pt. 2
- DEMO - Nmap hosts discovery
- DEMO - Nmap service discovery
- DEMO - Nmap scripts
- DEMO - masscan
- Network insecurity
- Sniffing and spoofing
- Sniffing tools
- Spoofing, crypto, and wifi
- DEMO - tcpdump
- DEMO - Wireshark
- DEMO - Ettercap
- DEMO - Burp Suite
- DEMO - Scapy
- Security overview pt. 1: Windows architecture
- Security overview pt. 2: credentials security
- Security overview pt. 3: memory corruption & exploitation
- Windows hacking basics
- Local access and privilege escalation
- Dumping hashes and cracking passwords
- Linux attacking basics pt. 1
- Linux attacking basics pt. 2
- References
- DEMO - Windows msf exploit pt. 1
- DEMO - Windows msf exploit pt. 2
- DEMO - Post exploitation activities
- DEMO - Mimikatz
- DEMO - Dumping hashes
- DEMO - Hashcat
- DEMO - Konboot
- DEMO - Post exploitation Windows cmd
- DEMO - Post exploitation Windows powershell
- DEMO - Online password cracking pt. 1
- DEMO - Online password cracking pt. 2
- DEMO - Attacking Linux targets pt. 1
- DEMO - Attacking Linux targets pt. 2
- Introduction to web hacking
- Web security architecture overview pt. 1
- Web security architecture overview pt. 2
- Attacking the web server pt. 1
- Attacking the webserver pt. 2
- Attacking the platform pt. 1
- Attacking the platform pt. 2
- Attacking the technology pt. 1
- Attacking the technology pt. 2
- OWASP top 10 pt. 1
- OWASP top 10 pt. 2
- Attacking the business logic pt. 1
- Attacking the business logic pt. 2
- Tools and methodology
- References
- DEMO - OWASP Mutillidae
- DEMO - SQL injection
- DEMO - SQLMAP intro
- DEMO - SQLMAP practice
- DEMO - Burpsuite
- DEMO - Burpsuite XSS Hunter
- DEMO - mitmproxy
- DEMO - Skipfish pt.1
- DEMO - Skipfish pt.2
- Social engineering basics
- Social engineering methods
- Tools and techniques pt. 1
- Tools and techniques pt. 2
- Tools and techniques pt. 3
- Physical security considerations
- Final thoughts
- DEMO - Social engineering intro
- DEMO - Social engineering toolkit prep