Introduction
  • Introduction
Setup the Lab
  • Setting up the Laboratory
  • Virtualisation Platforms
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
  • Lab's Architecture Diagram
  • Using VirtualBox vs VMware
  • Installing & Running Oracle VM VirtualBox
  • Installing Kali using the VMware Image - Step 1
  • Installing Kali using the VMware Image - Step 2
  • Installing Kali using the VMware Image - Step 3
  • Installing Kali using the ISO file for VMware - Step 1
  • Installing Kali using the ISO file for VMware - Step 2
  • Installing Kali using the ISO file for VMware - Step 3
  • Installing Kali on VirtualBox using the OVA file - Step 1
  • Installing Kali on VirtualBox using the OVA file - Step 2
  • Installing Kali on VirtualBox using the OVA file - Step 3
  • Installing Kali using the ISO file for VirtualBox - Step 1
  • Installing Kali using the ISO file for VirtualBox - Step 2
  • Installing Kali using the ISO file for VirtualBox - Step 3
  • Metasploitable Linux
  • Metasploitable for VirtualBox
  • OWASP Broken Web Applications
  • Free Windows Operating Systems on VMware
  • Free Windows Operating Systems on Oracle VM VirtualBox
  • Windows Systems as Victim
  • Configuring NAT Network for VirtualBox: Revisited
  • Connections of Virtual Machines
Introduction to Penetration Test
  • Content of the Section
  • Definition of "Penetration Test"
  • Penetration Test Types
  • Security Audits
  • Vulnerability Scan
  • Terms: Asset, Threat, Vulnerability, Risk, Exploit
  • Penetration Test Approaches
  • Planning a Penetration Test
  • Penetration Test Phases
  • Legal Issues & Testing Standards
  • Quiz - Introduction to Penetration Test
Network Fundamentals
  • Attention
  • Content of the Section
  • Basic Terms of Networking
  • Reference Models
  • TCP/IP (Networking) Basics
  • OSI Reference Model vs. TCP/IP Reference Model
  • Network Layers in Real World
  • Layer 2 - Data Link Layer
  • Layer 2: Ethernet - Principles, Frames & Headers
  • Layer 2: ARP - Address Resolution Protocol
  • Layer 2: Analysing ARP Packets
  • Layer 2: VLANs (Virtual Local Area Networks)
  • Layer 2: WLANs (Wireless Local Area Networks)
  • Layer 3 - Network Layer
  • Layer 3: IP (Internet Protocol)
  • Layer 3: IPv4 Addressing System
  • Layer 3: IPv4 Packet Header
  • Layer 3: Subnetting - Classful Networks
  • Layer 3: Subnetting Masks
  • Layer 3: Understanding IPv4 Subnets
  • Layer 3: IPv4 Address Shortage
  • Layer 3: Private Networks
  • Layer 3: Private Networks - Demonstration
  • Layer 3: NAT (Network Address Translation)
  • Layer 3: IPv6, Packet Header & Addressing
  • Layer 3: DHCP - How the Mechanism Works
  • Layer 3: ICMP (Internet Control Message Protocol)
  • Layer 3: Traceroute
  • Layer 4 - Transport Layer
  • Layer 4: TCP (Transmission Control Protocol)
  • Layer 4: TCP Header
  • Layer 4: UDP (User Datagram Protocol)
  • Layer 5-7 - Application Layer
  • Layer 7: DNS (Domain Name System)
  • Layer 7: HTTP (Hyper Text Transfer Protocol)
  • Layer 7: HTTPS
  • Summary of Network Fundamentals
  • Quiz - Network Fundamentals
Network Scan
  • Content of the Section
  • Network Scan Types
  • Passive Scan with Wireshark
  • Passive Scan with ARP Tables
  • Active Scan with Hping
  • Hping for Another Purpose: DDoS
NMAP: The Network Mapper
  • Introduction to Nmap
  • Ping Scan
  • TCP/IP (Networking) Basics
  • TCP/IP Model on an Example
  • TCP & UDP Protocols Basics
  • Introduction to Port Scan
  • SYN Scan
  • Details of the Port Scan
  • TCP Scan
  • UDP Scan
  • Version Detection in Nmap
  • Operating System Detection