Introduction
  • Welcome!
Setting Up Your Environment
  • How To Setup A Virtual Penetration Testing Environment
  • Downloading and installing Metasploitable2
  • Installing VMware
  • How To Install Kali Linux On VMware
Anonymity
  • How To Setup Proxychains On Kali Linux
  • How to setup Anonsurf on Kali Linux
  • How to use a VPN with Proxychains - Maximum anonymity
  • The Complete DNS guide - How to change your DNS
Getting started with Linux
  • Adding Users & Changing Passwords
  • System Services
  • The Aptitude Package Manager - Installing & Updating packages
  • Linux File System
  • Installing Terminator - Terminal Emulator & Multiplexer
Networking Fundamentals
  • Understanding the OSI Model
  • The Network Layer
  • The Transport Layer
  • The TCP 3 Way Handshake
Passive Information Gathering
  • Information Gathering - Whois Lookup & DNS Reconnaisance
  • Gathering Emails - theharvester
  • Whois Lookup
  • Netcraft - Passive Information Gathering
Active Information Gathering
  • DNS Enumeration
  • DNSRecon
  • Installing Nmap on Windows
  • Installing Nmap on Linux
  • Installing Zenmap on Linux
  • Scanning a single target
  • Scanning multiple targets
  • Scanning an IP range
  • Scanning an entire subnet
  • Scanning a list of targets
  • Excluding targets from a scan
  • Excluding targets with a list
  • Aggressive scanning & OS Detection
  • Nmap Syn Scan
  • Nmap UDP Scan
  • Output Scan Results
  • Nmap Scripts
Netcat
  • Banner Grabbing With Netcat
  • Transferring Data With Netcat
  • Reverse Shell With Netcat
Getting started with Metasploit
  • Metasploit for beginners - Modules, Exploits and Payloads
  • Metasploit for beginners - Understanding Metasploit Modules
  • Metasploit for beginners - Information gathering - Auxiliary scanners
  • Metasploit for beginners - Basic Exploitation
  • Metasploit community Web GUI - Installation and Overview
Web Server Hacking
  • Web server hacking with Metasploit - Gaining Access
  • Web server hacking with Metasploit - FTP backdoor command execution
  • Web server hacking with Metasploit - Metasploit payloads
  • Nikto - Web Vulnerability Scanner
Exploitation
  • WordPress hacking with WPScan
  • Password cracking with John The Ripper
  • Bruteforce password cracking with Hydra - SSH
  • Bruteforce password cracking with Medusa
  • BeEF browser exploitation - Client side attacks
  • Armitage - Scanning and Exploitation
  • Veil Evasion - How to generate undetectable payloads
  • How to generate wordlists with Crunch
Wired and WIreless attacks
  • MITM - ARP spoofing with arpspoof
  • MITM - ARP Poisoning with Ettercap
  • WPA/WPA2 Hacking & Exploitation With Aircrack-ng & airgeddon | Pixie Dust Attack
  • DDoS Attacks with Xerxes - The most powerful DDoS tool
Post Exploitation & Privilege Escalation
  • The Complete Meterpreter guide - Privilege escalation and clearning tracks
  • Generating a PHP backdoor with Weevely - Post exploitation