Back

Hacking For Beginners

Start from absolute scratch!

Tarek

Lead Trainer

5 hr

Description

Course Curriculum

Introduction

5 lessons

1. Welcome From Tarek

06:27

2. Text 1 updated test

3. Lab 1 updated

4. challenge 1 updted

5. Quiz test

Kali Linux First Steps

9 lessons

6. IMPORTANT: Lab Instructions

7. Start The Lab

8. Intro to Kali Linux

07:57

9. Kali Linux GUI

05:07

10. Kali Linux - Terminal Shortcuts

06:39

11. Kali Linux - root

07:03

12. Kali Linux - Basic Commands

06:49

13. Test Your Knowledge

14. Kali Linux - Package Management

03:28

The Internet

8 lessons

15. The Internet

02:57

16. Test Your Knowledge

17. Internet Protocols

06:06

18. Test Your Knowledge

19. Public and Private IPs

04:13

20. NAT

08:36

21. DNS

06:53

22. Test Your Knowledge

Servers, Services, Ports and Clients

4 lessons

23. Servers

03:49

24. Services and Ports

06:52

25. Test Your Knowledge

26. Clients

05:01

Packets and Protocols

4 lessons

27. What Are Packets?

05:46

28. Understanding TCP

04:28

29. Understanding HTTP

01:47

30. Test Your Knowledge

Packet Analysis

5 lessons

31. Wireshark PCAP File

32. Introduction to Wireshark

06:39

33. Wireshark TCP Handshake Analysis

08:33

34. Wireshark Display Filters

02:59

35. Wireshark Capture Filters

06:01

Port Scanning

6 lessons

36. Port Scanning First Run

05:34

37. Port Scanning Techniques

04:49

38. Port Scanning Packet Analysis

06:03

39. Port Scanning With Service Detection

05:32

40. Port Scanning Service Detection Packet Analysis

04:35

41. Test Your Knowledge

Vulnerability Identification

10 lessons

42. Vulnerabilities and Exploits

04:17

43. CVE and CVSS

03:29

44. Test Your Knowledge

45. Manual Vulnerability Research

03:38

46. Semi-automated Vulnerability Research

04:10

47. Scripted Vulnerability Research

04:58

48. Vulnerability Scanning

09:41

49. Test Your Knowledge

50. Vulnerability Reporting

04:54

51. OpenVAS Report - PDF

Exploitation and Backdoors

7 lessons

52. Exploitation Key Terms

06:00

53. What Is A Remote Shell?

08:06

54. What Is A Backdoor?

04:09

55. Exploiting A Backdoored FTP

04:19

56. Test Your Knowledge

57. Creating Your Own Backdoor

05:05

58. How The Backdoor FTP Exploit Works

08:35

Metasploit Crash Course

11 lessons

59. Introduction to Metasploit

04:53

60. Metasploit Auxiliary

08:42

61. Metasploit Auxiliary Search

03:36

62. Metasploit Search

08:49

63. Exploiting Backdoored FTP With Metasploit

07:38

64. Managing Metasploit Multiple Sessions

10:48

65. Install A Tool

66. Exploiting Tomcat Manually

09:21

67. Exploiting Tomcat with Metasploit

10:44

68. Metasploit Meterpreter Shell

07:37

69. Test Your Knowledge

Last Section

0 lessons