Back

Hacking For Beginners

Start from absolute scratch! Dive straight into learning the core concepts to set you off on the path of becoming a professional hacker.

Tarek

Lead Trainer

4 hr 59 min

Description

Course Curriculum

Introduction

1 lessons

1. Welcome Message

00:00

Kali Linux First Steps

9 lessons

2. IMPORTANT: Lab Instructions

3. Start The Lab

4. Intro to Kali Linux

07:57

5. Kali Linux GUI

05:07

6. Kali Linux - Terminal Shortcuts

06:39

7. Kali Linux - root

07:03

8. Kali Linux - Basic Commands

06:49

9. Test Your Knowledge

10. Kali Linux - Package Management

03:28

The Internet

5 lessons

11. The Internet

02:57

12. Internet Protocols

06:06

13. Public and Private IPs

04:13

14. NAT

08:36

15. DNS

06:53

Servers, Services, Ports and Clients

5 lessons

16. Servers

03:49

17. Services and Ports

06:52

18. Clients

05:01

19. Apache Server Troubleshooting

20. Server Client Demo

05:01

Packets and Protocols

3 lessons

21. What Are Packets?

05:46

22. Understanding TCP

04:28

23. Understanding HTTP

01:47

Packet Analysis

5 lessons

24. Introduction to Wireshark

06:39

25. Wireshark TCP Handshake Analysis

08:33

26. Wireshark Display Filters

02:59

27. Wireshark PCAP File

28. Wireshark Capture Filters

06:01

Port Scanning

5 lessons

29. Port Scanning First Run

05:34

30. Port Scanning Techniques

04:49

31. Port Scanning Packet Analysis

06:03

32. Port Scanning With Service Detection

05:32

33. Port Scanning Service Detection Packet Analysis

04:35

Vulnerability Identification

7 lessons

34. Vulnerabilities and Exploits

04:17

35. CVE and CVSS

03:29

36. Manual Vulnerability Research

03:38

37. Semi-automated Vulnerability Research

04:10

38. Scripted Vulnerability Research

04:58

39. Vulnerability Scanning

09:41

40. Vulnerability Reporting

04:54

Exploitation and Backdoors

6 lessons

41. Exploitation Key Terms

06:00

42. What Is A Remote Shell?

08:06

43. What Is A Backdoor?

04:09

44. Exploiting A Backdoored FTP

04:19

45. Creating Your Own Backdoor

05:05

46. How The Backdoor FTP Exploit Works

08:35

Metasploit Crash Course

10 lessons

47. Introduction to Metasploit

04:53

48. Metasploit Auxiliary

08:42

49. Metasploit Auxiliary Search

03:36

50. Metasploit Search

08:49

51. Exploiting Backdoored FTP With Metasploit

07:38

52. Managing Metasploit Multiple Sessions

10:48

53. Install A Tool

54. Exploiting Tomcat Manually

09:21

55. Exploiting Tomcat with Metasploit

10:44

56. Metasploit Meterpreter Shell

07:37