YOU FOUND THE COMPLETE HACKING BOOTCAMP!


These Video Flies are shared from a Third-Party we do not claim to own or sell these videos. These videos are for learning purposes ~ Enjoy ~

Let's Start Here


1.What is a Virtual Machine

2.Why Kali-Linux?

3.Downloading Virtual Box and Kali Linux

4.Creating Our First Virtual Machine

5.Installing a VPN on [Kali-Linux]

6.Update New & Old Versions of Kali Linux

7.Full Screen MOde & Network Settings

8.Troubleshooting Network Connections in Kali Linux

9.The 5 Stages of a Penetration Test



Kali Linux Operating System


1.Navigating Through Linux

2.Creating Files & Managing Directories

3.Network Commands & Sudo Privileges In Kali Linux


Reconnaissance & Information Gathering


1.What is Information Gathering

2.Obtaining IP Address, Physical Address Using Whois Tool

3.Whatweb Stealthy Scan

4.Aggressive Website Technology Discovering on IP Range

5.Gathering Emails Using theHarvester & Hunter.io

5.How To Download Tools Online

6.Finding Usernames With Sherlock

7.Bonus! Email Scraper Tool In Python 3


Port Scanning


1.The Theory Behind Scanning

2.TCP & UDP

3.Installing Vulnerable Virtual Machine

4.Netdiscover

5.Performing First Nmap Scan

6.Different Nmap Types

7.Discovering Target Operating Systems

8.Detecting Versions Of Service Running On An Open Port

9.Filtering Port Range & Output Of Scan Results

10.What is a FirewallIDS

11.Using Decoys and Packet Fragmentation

12.Security Evasion Nmap Options


Vulnerability Analysis


1.Finding Vulnerability with Nmap Scripts

2.Manual Vulnerability Analysis & Searchsploit

3.Nessus Installation

4.Discovering Vulnerabilities With Nessus

5.Scanning Windows 7 Machine With Nessus

6.Let's Cool Down

Exploitation & Gaining Access


1.What is Exploitation

2.What is a Vulnerability

3.Reverse Shells & Bind Shells

4.MetaSploit Framework Structure

5.Msfconsole Basic Commands

6.Our First Exploit

7.Misconfigurations Happen - Bindshell Exploitation

8.Information Disclosure Telnet Eploit

9.Software Vulnerability - Samba Exploitation

10.Attacking SSH - Bruteforce Attack

11.Exploitation Challenge - 5 Different Exploits

12.Eternal Blue Attack - Windows 7 Exploitation

13.DoublePulsar Attack - Windows Exploit

14.BlueKeep Vulnerability - Windows Exploit

15. Update 2 - Routersploit

16. Update 3 - Router Default Credentials


SMBGhost CVE 202-0796 Windows 10 Manual Exploitation


1.Setting up Vulnerable Windows 10

2.Crashing Windows 10 Machine Remotely

3.Exploiting Windows 10 Machine Remotely


Gaining Access using Virus & Payloads


1.Generating Basic Payload with Msfvenom

2.Advanced Msfvenom Usage Part 1.

3.Advanced Msfvenom Usage Part 2.

4. Generating Powershell Payload Using Veil

5.TheFATrat Payload

6. Hexeditor & Antiviruses

7.Making Our Payload Open An Image


Post-Exploitation-Elevating Privileges-Extracting Data-Running Keylogger's


1.Post-Exploitation Theory

2.Meterpreter Basic Commands

3.Elevating Privileges with Different Modules

4.Creating Persistence On The Target System

5.Post Exploitation Modules

6.Exploitation Recap

7.Making Our Payload Open An Image


Website Hacking


1.Website Penetration Testing Theory

2.HTTP Request & Response

3.Information Gathering & Dirb Tool

4.BurpSuite Configuration

5.ShellShock Exploitation

6.Command Injection Exploitation

7. Getting Meterpreter Shell With Command Execution

8.Reflected XSS & Cookie Stealing

9.Stored XSS

10. HTML Injection

11.SQL Injection

12.CSRF Vulnerability

13.Hydra Bruteforce Attack Example 1

14.Hydra Bruteforce Attack Example 2

13.Burpsuite Intruder


Man in The Middle - MITM


1.Man In The Middle Attack

2.Bettercap ARP Spoofing

3.Ettercap Password Sniffing

4.Manually Poisoning Targets ARP Cache With Scapy


Extra Wireless Access Point Cracking


1.Wireless Cracking Theory

2.Putting Wireless Card In Monitor Mode

3.Deauthenticating Devices & Grabbing Password

4.Aircrack Password Cracking

5.Hashcat Password Cracking


Anonymity Theory


1.Anonymity Theory

2.Tor Browser

3.Proxychains With Nmap

4.Installing VPN in Kali Linux

5.WhoAmI Anonymity Tool


Active Directory Hacking


1.Enumerating Active Directory

2.Exploring Active Directory

3.Escalating Privileges on teh Domain


~Anonymous~

Congratulations Noob!