Introduction
  • Course Introduction & Overview
Setting Up The Laboratory - Windows & Mac
  • Virtualisation Platforms
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
  • Lab's Architecture Diagram
  • Using VirtualBox vs VMware
  • Install & Run Oracle VM VirtualBox
  • Installing Kali using the VMware Image - Step 1
  • Installing Kali using the VMware Image - Step 2
  • Installing Kali using the VMware Image - Step 3
  • Installing Kali using the ISO file for VMware - Step 1
  • Installing Kali using the ISO file for VMware - Step 2
  • Installing Kali using the ISO file for VMware - Step 3
  • Installing Kali on VirtualBox using the OVA file - Step 1
  • Installing Kali on VirtualBox using the OVA file - Step 2
  • Installing Kali on VirtualBox using the OVA file - Step 3
  • Installing Kali using the ISO file for VirtualBox - Step 1
  • Installing Kali using the ISO file for VirtualBox - Step 2
  • Installing Kali using the ISO file for VirtualBox - Step 3
  • Installing Metasploitable
  • Free Windows Operating Systems on VMware Fusion
  • Free Windows Operating Systems on Oracle VM VirtualBox
  • Windows Systems as Victim
  • Configuring NAT Network in Oracle VM VirtualBox
  • Checking Lab Network Connectivity
Vulnerability Scanning
  • Introduction to Vulnerability Scanning
  • Nessus® Home vs Nessus® Essentials
  • Downloading Nessus
  • Installing Nessus
  • Aggressive Scan with Nessus: Start
  • Aggressive Scan with Nessus: Results
  • Aggressive Scan with Nessus: Results with Windows Targets
Exploitation
  • Concept and The Terminology
  • Exploit Databases
  • Manuel Exploitation
  • Exploitation Frameworks
Exploitation with Metasploit
  • Introduction to MSF
  • Metasploit Framework
  • Msfconsole
  • Msfconsole Initialisation
  • Msfconsole Exploit Search & Ranking
  • Running Msfconsole
  • Meterpreter
  • Running Meterpreter
  • Meterpreter on a Linux System - Basics
  • Meterpreter on a Windows System - Basics
Hacking Using No Vulnerability:Pass the Hash
  • Pass the Hash
  • Pass the Hash: Metasploit PsExec
  • Exploit A Machine and Gather Password Hashes
  • Pass The Hash: Try Hashes on The Other Systems
Post-Exploitation & Persistence
  • Post-Exploitation
  • What is “Persistence”
  • Meterpreter’s Persistence module
  • Removing the Backdoor
  • Running Meterpreter’s Persistence Module on Windows 8
  • Next Generation Persistence: Step 1
  • Next Generation Persistence: Step 2
Post Modules and Extensions: Part 1
  • Meterpreter for Post - Exploitation
  • Meterpreter Core Commands
  • Meterpreter Core Extension - Session Command
  • Meterpreter Core Extension - Migrate Command
  • Meterpreter Core Extension - Channel Command
  • Meterpreter Stdapi Extension
  • Meterpreter Stdapi Extension - File System Commands
  • Meterpreter Stdapi Extension - System Commands
  • Meterpreter Stdapi Extension - User Interface & Webcam Commands
Post Modules and Extensions: Part 2
  • Meterpreter Incognito Extension
  • Meterpreter Mimikatz Extension
  • Metasploit Post-Exploitation Modules
  • Gathering Modules
  • Managing Modules
Password Cracking: Introduction
  • Password Cracking
  • Password Hash Examples: Windows Hashes
  • Linux Hashes
  • Password Cracking Classification
Password Cracking: Tools in Action
  • Password Cracking Tools
  • Online Cracking With HYDRA
  • Cain & Abel - Introduction
  • Cain & Abel - Step 1: Install & First Run
  • Cain & Abel - Step 2: Gathering Hash Dumps
  • Cain & Abel - Step 3: Importing Hash Files
  • Cain & Abel - Step 4: Dictionary Attack
  • Cain & Abel - Step 5: Brute Force Attack
  • Cracking Tool: John The Ripper
Collecting Sensitive Data
  • File Shares and End User Computers
  • Real World Examples
  • Summary
BONUS
  • BONUS