Back

Hacking For Beginners

Start from absolute scratch! Dive straight into learning the core concepts to set you off on the path of becoming a professional hacker.

Tarek

Lead Trainer

4 hr 59 min

Description

Course Curriculum

Introduction

1 lessons

1. Welcome Message

00:00

Kali Linux First Steps

9 lessons

2. IMPORTANT: Lab Instructions

3. Start The Lab

4. Intro to Kali Linux

07:57

5. Kali Linux GUI

05:07

6. Kali Linux - Terminal Shortcuts

06:39

7. Kali Linux - root

07:03

8. Kali Linux - Basic Commands

06:49

9. Test Your Knowledge

10. Kali Linux - Package Management

03:28

The Internet

5 lessons

11. The Internet

02:57

12. Internet Protocols

06:06

13. Public and Private IPs

04:13

14. NAT

08:36

15. DNS

06:53

Servers, Services, Ports and Clients

6 lessons

16. Servers

03:49

17. Services and Ports

06:52

18. Clients

05:01

19. Apache Server Troubleshooting

20. Server Client Demo

05:01

21. Test Lecture

Packets and Protocols

3 lessons

22. What Are Packets?

05:46

23. Understanding TCP

04:28

24. Understanding HTTP

01:47

Packet Analysis

5 lessons

25. Introduction to Wireshark

06:39

26. Wireshark TCP Handshake Analysis

08:33

27. Wireshark Display Filters

02:59

28. Wireshark PCAP File

29. Wireshark Capture Filters

06:01

Port Scanning

5 lessons

30. Port Scanning First Run

05:34

31. Port Scanning Techniques

04:49

32. Port Scanning Packet Analysis

06:03

33. Port Scanning With Service Detection

05:32

34. Port Scanning Service Detection Packet Analysis

04:35

Vulnerability Identification

7 lessons

35. Vulnerabilities and Exploits

04:17

36. CVE and CVSS

03:29

37. Manual Vulnerability Research

03:38

38. Semi-automated Vulnerability Research

04:10

39. Scripted Vulnerability Research

04:58

40. Vulnerability Scanning

09:41

41. Vulnerability Reporting

04:54

Exploitation and Backdoors

6 lessons

42. Exploitation Key Terms

06:00

43. What Is A Remote Shell?

08:06

44. What Is A Backdoor?

04:09

45. Exploiting A Backdoored FTP

04:19

46. Creating Your Own Backdoor

05:05

47. How The Backdoor FTP Exploit Works

08:35

Metasploit Crash Course

10 lessons

48. Introduction to Metasploit

04:53

49. Metasploit Auxiliary

08:42

50. Metasploit Auxiliary Search

03:36

51. Metasploit Search

08:49

52. Exploiting Backdoored FTP With Metasploit

07:38

53. Managing Metasploit Multiple Sessions

10:48

54. Install A Tool

55. Exploiting Tomcat Manually

09:21

56. Exploiting Tomcat with Metasploit

10:44

57. Metasploit Meterpreter Shell

07:37