Introduction and Welcome
  • Introduction
Kali Linux Installation
  • Downloading Kali Linux
  • Installing Kali Linux Part 1
  • Installing Kali Linux Part 2
  • Final Installation Steps Before Startup
  • First Look at Kali Linux
  • Wireless Card Installation Part 1
  • Linux Kernel Installation
  • How To Install VIrtualBox Guest Additions For Wireless Card Setup on Kali Linux
  • Wireless Card Installation Part 2
NMAP Essentials
  • NMAP Introduction and Demo
  • NMAP Anonymous Mode First
  • TraceRoute Without ProxyChains
  • Proxychains
  • Nmap TCP Port Scanning
  • Port Scanning on Test Machine
  • TCP Port Scanning - Further Results
  • FIN and XMAS Scans
  • Nmap OS Detection
Introduction To Footprinting
  • Whois Footprinting
  • Further Footprinting
  • Fun with List-Urls.py
  • More of The Harvester
Installing and Working with Nessus
  • Introduction to Nessus and Nessus Installation
Web SQL Injection
  • Introduction to Web SQL Injection
  • Impacts of Web SQL Injection
Build Malware in Code Compiler
  • Introduction to Malware and Trojans
  • Installing C / C++ Compiler
  • Downloading Additional Applications
  • Creating a Malware Program with Codeblocks
  • Running Apache Server and Uploading Malware to Server
  • Using Reverse Shell on Victim's PC
  • Viewing Access Logs and Introduction to the Metasploit Framerwork
  • What to Do When Victim is on a Different Network
  • Using Metasploit to Create an Exploit
  • Viewing KeyScan Results
Using Python to Create Hacking Scripts
  • Python Introduction and Installation on Windows
  • Python Installation on Kali Linux
  • Introduction to PyCharm - Create Your First Program
  • Importing the Nmap Module
  • Introduction to Indentation
  • Quick Recap
  • Basic Commands in Python
  • Conditional Statements
  • Lists, Arrays and Dictionaries
  • String Manipulation and File Handling
  • Introduction to Functions
  • Building an Nmap Network Scanner - Part 1
  • Building an Nmap Network Scanner - Part 2
  • Creating a Brute Force Password Cracker in Python
  • Brute Force Cracking Results
How Hackers Create Undetectable Malware and Viruses
  • Introduction to Undetectable Malware
  • Installing Python and Pip
  • Installing Veil-Framework
  • Setting Up The Veil Framework
  • Installing Gnome Desktop
  • Wine Mono and Veil-Evasion Installation
  • Installing Metasploit
  • Metasploit Installation Complete
  • Testing MSF Console
  • Veil Evasion Final Installation
  • Adding the Metasploit Folder to Veil Installation
  • Introduction to Veil and The Importance in Ethical Hacking
  • Creating an Exploit
  • Testing Exploit on a Windows 10 Machine
  • Encrypting the Payload
Introduction To Perl and Foundations for Ethical Hacking
  • Introduction to Perl
  • Basic Perl Programming
  • Introduction to Perl Functions
  • Working With Arrays
  • More Fun With Arrays
  • Conditions in Perl
  • Switch Statements and More Examples of If Statements