Back

Hacking For Beginners

Start from absolute scratch!

Tarek

Lead Trainer

5 hr

Description

Course Curriculum

Introduction

1 lessons

1. Welcome From Tarek

06:27

Kali Linux First Steps

9 lessons

2. IMPORTANT: Lab Instructions

3. Start The Lab

4. Intro to Kali Linux

07:57

5. Kali Linux GUI

05:07

6. Kali Linux - Terminal Shortcuts

06:39

7. Kali Linux - root

07:03

8. Kali Linux - Basic Commands

06:49

9. Test Your Knowledge

10. Kali Linux - Package Management

03:28

The Internet

8 lessons

11. The Internet

02:57

12. Test Your Knowledge

13. Internet Protocols

06:06

14. Test Your Knowledge

15. Public and Private IPs

04:13

16. NAT

08:36

17. DNS

06:53

18. Test Your Knowledge

Servers, Services, Ports and Clients

4 lessons

19. Servers

03:49

20. Services and Ports

06:52

21. Test Your Knowledge

22. Clients

05:01

Packets and Protocols

4 lessons

23. What Are Packets?

05:46

24. Understanding TCP

04:28

25. Understanding HTTP

01:47

26. Test Your Knowledge

Packet Analysis

5 lessons

27. Wireshark PCAP File

28. Introduction to Wireshark

06:39

29. Wireshark TCP Handshake Analysis

08:33

30. Wireshark Display Filters

02:59

31. Wireshark Capture Filters

06:01

Port Scanning

6 lessons

32. Port Scanning First Run

05:34

33. Port Scanning Techniques

04:49

34. Port Scanning Packet Analysis

06:03

35. Port Scanning With Service Detection

05:32

36. Port Scanning Service Detection Packet Analysis

04:35

37. Test Your Knowledge

Vulnerability Identification

10 lessons

38. Vulnerabilities and Exploits

04:17

39. CVE and CVSS

03:29

40. Test Your Knowledge

41. Manual Vulnerability Research

03:38

42. Semi-automated Vulnerability Research

04:10

43. Scripted Vulnerability Research

04:58

44. Vulnerability Scanning

09:41

45. Test Your Knowledge

46. Vulnerability Reporting

04:54

47. OpenVAS Report - PDF

Exploitation and Backdoors

7 lessons

48. Exploitation Key Terms

06:00

49. What Is A Remote Shell?

08:06

50. What Is A Backdoor?

04:09

51. Exploiting A Backdoored FTP

04:19

52. Test Your Knowledge

53. Creating Your Own Backdoor

05:05

54. How The Backdoor FTP Exploit Works

08:35

Metasploit Crash Course

11 lessons

55. Introduction to Metasploit

04:53

56. Metasploit Auxiliary

08:42

57. Metasploit Auxiliary Search

03:36

58. Metasploit Search

08:49

59. Exploiting Backdoored FTP With Metasploit

07:38

60. Managing Metasploit Multiple Sessions

10:48

61. Install A Tool

62. Exploiting Tomcat Manually

09:21

63. Exploiting Tomcat with Metasploit

10:44

64. Metasploit Meterpreter Shell

07:37

65. Test Your Knowledge

Last Section

0 lessons