Introduction
  • Introduction
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
  • Lab's Architecture Diagram
  • Using VirtualBox vs VMware
  • Install & Run Oracle VM VirtualBox
  • Installing Kali using the VMware Image - Step 1
  • Installing Kali using the VMware Image - Step 2
  • Installing Kali using the VMware Image - Step 3
  • Installing Kali using the ISO file for VMware - Step 1
  • Installing Kali using the ISO file for VMware - Step 2
  • Installing Kali using the ISO file for VMware - Step 3
  • Installing Kali on VirtualBox using the OVA file - Step 1
  • Installing Kali on VirtualBox using the OVA file - Step 2
  • Installing Kali on VirtualBox using the OVA file - Step 3
  • Installing Kali using the ISO file for VirtualBox - Step 1
  • Installing Kali using the ISO file for VirtualBox - Step 2
  • Installing Kali using the ISO file for VirtualBox - Step 3
  • Free Windows Operating Systems on VMware Fusion
  • Free Windows Operating Systems on Oracle VM VirtualBox
  • Windows Systems as Victim
  • Configuring NAT Network in Oracle VM VirtualBox
Scan Types
  • Scan Types Definitions: Active Scan & Passive Scan
  • Passive Scan - Wireshark
  • Passive Scan - ARP Tables
  • Active Scan
Nmap Introduction & Basics
  • Nmap Introduction
  • TCP/IP Basics - Layers and Protocols
  • TCP/IP Basics - An Example: DNS Query
  • TCP/UDP Basics
Nmap in Action - 1 : Scan Types
  • Ping Scan
  • SYN Scan
  • Port Scan
  • TCP Scan
  • UDP Scan
Nmap in Action - 2 : Detection & Management
  • Version Detection
  • Operating System Detection
  • Input-Output Management
  • Lab Exercise - 1
Nmap in Action - 3 : Script Scanning
  • Introduction
  • First Script Example
  • Second Script Example
  • Third Script Example
  • Nmap Aggressive Scan
Nmap in Action - 4 : Timing and IPS/IVS Evasion
  • Bypassing IPS/IDS Devices
  • Timing
Nmap in Action - 5 : Some Other Scans
  • NULL, FIN, XMAS and ACK Scan
  • Idle Scan
Vulnerability Scan and Introduction to Nessus
  • Introduction to Vulnerability Scan
  • Nessus® Home vs Nessus® Essentials
  • Introduction to Nessus
  • Downloading Nessus
  • Installing Nessus
Nessus in Action
  • Creating Policy
  • Scanning
  • Reporting
  • Lab Exercise - 2
  • An Aggressive Scan with Nessus: Start
  • An Aggressive Scan with Nessus: Results
  • An Aggressive Scan with Nessus: Results with Windows Targets
BONUS
  • BONUS