Introduction
  • Course Syllabus
  • Introduction to Penetration Testing
  • Reporting For a Client
  • Glossary of Terms - Part 1
  • Glossary of Terms - Part 2
Legal Considerations
  • Legal Considerations Part 1
  • Legal Considerations Part 2
Setting up Your Environment
  • Various Tools for Ethical Hacking
  • Setting Up Kali- Part 1
  • Setting Up Kali- Part 2
  • Setting Up Ethical Hacking Tools In Mac OS - Part 1
  • Setting Up Ethical Hacking Tools In Mac OS - Part 2
  • Vulnhub and Metasploitable 2
  • Cloud Services Part 1
  • Cloud Services Part 2
  • Taking Notes For Client Engagements
  • FTP and SFTP
  • Running an Apache Web Server and Passing Files Between a Client and Attacker
Passive Information Gathering
  • Passive Information Gathering - Part 1
  • Passive Information Gathering - Part 2
  • Searching For Personnel During a Client Engagement
Active Information Gathering
  • Cewl - Collecting Information From a Client Website
  • Nmap - Scanning a Client Network
  • Nmap - Using The Scripting Engine
  • Nikto - Searching for Web Based Vulnerabilities
  • Openvas - Scanning For Network/Website Related Vulnerabilities
  • Dirb/Dirbuster - Brute Forcing Web Directories
  • Metasploit - Using the Scanning Based Modules - Part 1
  • Metasploit - Using the Scanning Based Modules - Part 2
  • Ncat - Banner Grabbing - Part 1
  • Ncat - Banner Grabbing - Part 2
  • DNS Enumeration - Part 1
  • DNS Enumeration - Part 2
  • SMB Enumeration
Exploitation
  • How to Search For Exploits
  • Metasploit - Exploit
  • Metasploit - Payload
  • MSFvenom - Creating a custom payload
  • Burpsuite - Web Proxy
  • Zap - Web Proxy
  • SQL Injection - How to
  • SQL Injection - NoSQL How to
  • Pret - Exploiting Printers
  • LFI & RFI - Local File Inclusion & Remote File Inclusion
  • Veil - Evading Anti Virus - Part 1
  • Veil - Evading Anti Virus - Part 2
  • Using a Reverse Shell - Part 1
  • Using a Reverse Shell - Part 2
  • Patator - Password Attacks - Part 1
  • Patator - Password Attacks - Part 2
  • BOF - What is a Buffer Overflow
  • BOF - Buffer Overflow Demo - Part 1
  • BOF - Buffer Overflow Demo - Part 2
  • BOF - Buffer Overflow Demo - Part 3
Phishing - What is Phishing and Tools Used for Phishing
  • Phishing
Post Exploitation
  • Windows Machine - Part 1
  • Windows Machine - Part 2
  • Linux Machine Part 1
  • Linux Machine Part 2
  • Mimikatz - Extracting Hashes From Memory
  • FGdump - Extracting Password Hashes
  • Cracking Hashes
  • Pivoting - Part 1
  • Pivoting - Part 2
  • Persistance - Maintaining Access to a Client Machine
Other Techniques
  • Wireshark - Part 1
  • Wireshark - Part 2
  • TCPDump
  • Hardware - Part 1
  • Hardware - Part 2