1.What is a Virtual Machine
2.Why Kali-Linux?
3.Downloading Virtual Box and Kali Linux
4.Creating Our First Virtual Machine
5.Installing a VPN on [Kali-Linux]
6.Update New & Old Versions of Kali Linux
7.Full Screen MOde & Network Settings
8.Troubleshooting Network Connections in Kali Linux
9.The 5 Stages of a Penetration Test
1.Navigating Through Linux
2.Creating Files & Managing Directories
3.Network Commands & Sudo Privileges In Kali Linux
1.What is Information Gathering
2.Obtaining IP Address, Physical Address Using Whois Tool
3.Whatweb Stealthy Scan
4.Aggressive Website Technology Discovering on IP Range
5.Gathering Emails Using theHarvester & Hunter.io
5.How To Download Tools Online
6.Finding Usernames With Sherlock
7.Bonus! Email Scraper Tool In Python 3
1.The Theory Behind Scanning
2.TCP & UDP
3.Installing Vulnerable Virtual Machine
4.Netdiscover
5.Performing First Nmap Scan
6.Different Nmap Types
7.Discovering Target Operating Systems
8.Detecting Versions Of Service Running On An Open Port
9.Filtering Port Range & Output Of Scan Results
10.What is a FirewallIDS
11.Using Decoys and Packet Fragmentation
12.Security Evasion Nmap Options
1.Finding Vulnerability with Nmap Scripts
2.Manual Vulnerability Analysis & Searchsploit
3.Nessus Installation
4.Discovering Vulnerabilities With Nessus
5.Scanning Windows 7 Machine With Nessus
6.Let's Cool Down
1.What is Exploitation
2.What is a Vulnerability
3.Reverse Shells & Bind Shells
4.MetaSploit Framework Structure
5.Msfconsole Basic Commands
6.Our First Exploit
7.Misconfigurations Happen - Bindshell Exploitation
8.Information Disclosure Telnet Eploit
9.Software Vulnerability - Samba Exploitation
10.Attacking SSH - Bruteforce Attack
11.Exploitation Challenge - 5 Different Exploits
12.Eternal Blue Attack - Windows 7 Exploitation
13.DoublePulsar Attack - Windows Exploit
14.BlueKeep Vulnerability - Windows Exploit
15. Update 2 - Routersploit
16. Update 3 - Router Default Credentials
1.Setting up Vulnerable Windows 10
2.Crashing Windows 10 Machine Remotely
3.Exploiting Windows 10 Machine Remotely
1.Generating Basic Payload with Msfvenom
2.Advanced Msfvenom Usage Part 1.
3.Advanced Msfvenom Usage Part 2.
4. Generating Powershell Payload Using Veil
5.TheFATrat Payload
6. Hexeditor & Antiviruses
7.Making Our Payload Open An Image
1.Post-Exploitation Theory
2.Meterpreter Basic Commands
3.Elevating Privileges with Different Modules
4.Creating Persistence On The Target System
5.Post Exploitation Modules
6.Exploitation Recap
7.Making Our Payload Open An Image
1.Website Penetration Testing Theory
2.HTTP Request & Response
3.Information Gathering & Dirb Tool
4.BurpSuite Configuration
5.ShellShock Exploitation
6.Command Injection Exploitation
7. Getting Meterpreter Shell With Command Execution
8.Reflected XSS & Cookie Stealing
9.Stored XSS
10. HTML Injection
11.SQL Injection
12.CSRF Vulnerability
13.Hydra Bruteforce Attack Example 1
14.Hydra Bruteforce Attack Example 2
13.Burpsuite Intruder
1.Man In The Middle Attack
2.Bettercap ARP Spoofing
3.Ettercap Password Sniffing
4.Manually Poisoning Targets ARP Cache With Scapy
1.Wireless Cracking Theory
2.Putting Wireless Card In Monitor Mode
3.Deauthenticating Devices & Grabbing Password
4.Aircrack Password Cracking
5.Hashcat Password Cracking
1.Anonymity Theory
2.Tor Browser
3.Proxychains With Nmap
4.Installing VPN in Kali Linux
5.WhoAmI Anonymity Tool
1.Enumerating Active Directory
2.Exploring Active Directory
3.Escalating Privileges on teh Domain