Section 1: Ethical hacking and penetration testing. What is it and how can you use it?
How can you earn money legally with your ethical hacking skills online? 04:19
Section 2: Prerequisites for getting started with this course.
Lecture 7
Introduction to Ethical Hacking. What is it in detail?
08:02
Lecture 8
Prerequisites success tips for getting the most out of this course.
07:28
Lecture 9
How can you become intermediate and advanced with this course?
03:40
Section 3: Basic hacking terms you will want to know getting started.
Lecture 10
Basic terminology such as white hat, grey hat, and black hat hacking.
12:00
Lecture 11
Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers.
18:18
Section 4: Build your hacking environment!
Lecture 12
Getting started successfully PDF with common questions answered and helpful tips
29 pages
Lecture 13
Installing VirtualBox with rpm plus why use a virtual machine.
08:58
Lecture 14
Installing VirtualBox using the default package manager from repositories.
15:01
Lecture 15
Creating the virtual environment.
13:35
Lecture 16
Installing VirtualBox in a Windows 8.1 environment.
05:16
Lecture 17
Kali Linux installation within a virtual environment.
16:00
Lecture 18
Kali Linux installation after it is running and getting starting using it.
12:18
Lecture 19
Installing VirtualBox Guest Additions
14:40
Section 5: Set up instructions for Mac users ONLY
Lecture 20
Installing VirtualBox on a Mac
18:09
Lecture 21
Setting up Kali Linux with VirtualBox part 1
13:38
Lecture 22
Setting up Kali Linux with VirtualBox part 2
15:23
Lecture 23
How to set up a USB passthrough on a Mac part 1
19:02
Lecture 24
How to set up a USB passthrough on a Mac part 2
09:00
Lecture 25
Kali Linux Live USB on a MacBook Pro part 1 ( OPTIONAL )
19:47
Lecture 26
Kali Linux Live USB on a MacBook Pro part 2 ( OPTIONAL )
11:37
Lecture 27
Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL )
13:40
Section 6: How to create a bootable USB of Kali Linux ( optional )
Lecture 28
How to create a bootable USB of Kali with persistent storage > 4 GB part 1
19:17
Lecture 29
How to create a bootable USB of Kali with persistent storage > 4 GB part 2
18:01
Lecture 30
How to create a bootable USB of Kali with persistent storage > 4 GB part 3
06:26
Lecture 31
How to create a bootable USB of Kali with persistent storage > 4 GB part 4
10:48
Section 7: Updates: How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
Lecture 32
Fedroa 22 VirtualBox set up
17:10
Lecture 33
Kali Sana virtual machine installation
05:37
Lecture 34
How to install VBox GuestAdditions in Kali Sana
07:13
Section 8: Linux Terminal including basic functionalities and CLI.
Lecture 35
Introduction to the Linux terminal.
09:31
Lecture 36
Linux Command-Line Interface (CLI) basics.
14:04
Lecture 37
The Linux CLI explained in greater detail to give you a good understanding.
15:26
Section 9: What is Tor? How can you use it to protect your anonymity online?
Lecture 38
Tor part 1.
10:58
Lecture 39
Tor part 2.
15:05
Section 10: ProxyChains for using proxy servers, hiding your ip, and obtaining access.
Lecture 40
Proxychains part 1.
12:01
Lecture 41
Proxychains part 2.
14:15
Lecture 42
Proxychains part 3.
12:57
Section 11: What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
Lecture 43
VPN part 1.
13:29
Lecture 44
VPN part 2.
14:54
Section 12: What is a macchanger? How can you use it to change your mac address?
Lecture 45
Macchanger part 1 (updated)
17:28
Lecture 46
Macchanger part 2 (updated)
19:02
Section 13: Footprinting with Nmap and external resources.
Lecture 47
Nmap part 1.
17:34
Lecture 48
Nmap part 2.
19:22
Lecture 49
External resources using public listings of known vulnerabilities.
10:11
Section 14: Attacking wireless networks. Overview of the tools.
Lecture 50
Intro to wifi hacker cracking WPA⁄WPA2.
15:14
Lecture 51
Aircrack and reaver installation.
12:44
Lecture 52
Installing aircrack-ng on Windows + crunch on Linux.
11:34
Lecture 53
For Windows Users. How To Set Up USB wireless Adapter with Virtualbox Part 1.
07:42
Lecture 54
For Windows Users. How To Set Up USB wireless Adapter with VirtualBox part 2.
07:11
Section 15: Breaking WPA/WPA2 encryption. Wifi hacking and wifi hacker training.
Lecture 55
Aircrack-ng _ crunch usage example_1
11:04
Lecture 56
Aircrack-ng _ crunch usage example_2
10:26
Lecture 57
Aircrack-ng _ crunch usage example_3
20:39
Lecture 58
Cracking WPS pins with reaver part 1.
15:24
Lecture 59
Cracking WPS pins with reaver part 2.
10:41
Lecture 60
Cracking WPS pins with reaver part 3.
16:25
Section 16: Signal jamming and denial of service.
Lecture 61
Performing denial of service on wireless networks part 1.
13:14
Lecture 62
Performing denial of service on wireless networks part 2.
17:55
Section 17: SSL strips.
Lecture 63
SSL strip part 1.
08:49
Lecture 64
SSL strip part 2.
10:37
Lecture 65
SSL strip part 3.
18:13
Section 18: Let's have a bit of fun!
Lecture 66
Funny things part 1.
07:03
Lecture 67
Funny things part 2.
12:12
Lecture 68
Funny things part 3.
18:21
Section 19: Evil twin method! Clone wireless access points to steal data.
Lecture 69
Evil twin part 1.
10:34
Lecture 70
Evil twin part 2
07:28
Lecture 71
Evil twin part 3.
11:19
Section 20: Attacking routers to give you free reign over the entire network!
Lecture 72
Using known vulnerabilities part 1.
09:40
Lecture 73
Using known vulnerabilities part 2.
09:21
Lecture 74
Using known vulnerabilities part 3.
18:54
Section 21: DNS setting hacking to redirect users with post authentication exploitation.
Lecture 75
Post authentication exploitation ( DNS ) part 1.
09:38
Lecture 76
Post authentication exploitation ( DNS ) part 2.
12:22
Lecture 77
Post authentication exploitation ( DNS ) part 3.
13:41
Section 22: Website attacks with SQL injections.
Lecture 78
sql-injection-part-1
12:32
Lecture 79
sql-injection-part-2
14:46
Lecture 80
sql-injection-part-3
13:22
Lecture 81
sql-injection-part-4
11:24
Lecture 82
sql-injection-part-5
16:55
Section 23: Brute-forcing methods for cracking passwords.
Lecture 83
cracking-hashes
12:03
Lecture 84
cracking-linux-password-with-john-the-ripper-part-1
12:44
Lecture 85
cracking-linux-password-with-john-the-ripper-part-2
08:50
Lecture 86
cracking-windows-password-with-john-the-ripper
19:25
Lecture 87
hydra-usage-part-1
17:13
Lecture 88
hydra-usage-part-2
18:21
Section 24: Denial of Service (DoS) attacks demonstrated and explained.
Lecture 89
DoS attack demonstration part 1. Introduction to Denial of Service attacks.
18:37
Lecture 90
DoS attack demonstration part 2. Combine slowloris.pl with nmap.
08:19
Lecture 91
DoS attack demonstration part 3 featuring ha.ckers.org.
09:45
Section 25: Reverse shells. Gain remote control of any device!
Lecture 92
Intro to Metasploit and reverse shells. What are reverse shells and why use them
18:28
Lecture 93
Metasploit ( reverse shell ) part 2 starting from a two terminal setup.
18:24
Lecture 94
Making reverse shells persistent on another system and escalating privileges.
16:35
Lecture 95
Creating a persistent reverse shell with Metasploit.
10:56
Lecture 96
Using NetCat to make any kind of connection you might need.
20:00
Lecture 97
How to upload a reverse shell onto a web server.
16:33
Section 26: Make your own Keylogger in C++
Lecture 98
General stuff
14:15
Lecture 99
Setting up the Environment part 1
19:58
Lecture 100
Setting up the Environment part 2
19:28
======================================================================
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV
======================================================================
No comments:
Post a Comment