ETHICAL HACKING FULL COURSE

Ethical hacking and Penetration testing course by whitesec cyber security consultancy pvt ltd 🥇🥇
0:00 introduction must watch 0:21 cybersecurity (common cyber threats) 5:19 setting up a Attacker machine 11:21 setting up victim machine 16:19 kali Linux Terminal 31:23 File Permissions in kali linux 51:34 Users and groups in linux 57:38 passwd and shadow file in linux 1:06:45 Man tool in linux 1:09:51 installing packages and scripts in linux 1:19:29 Networking for hackers - Must watch 1:22:28 What is ip 1:26:58 what is static ip address 1:32:50 what is dynamic ip address and dhcp 1:36:21 what is a public ip 1:40:46 what is a private ip 1:44:49 Difference between public and private ip 1:51:27 Hacker point of view 2:02:56 ipv4 and its features 2:11:41 ipv6 and its features 2:16:17 Tcp and udp (protocols) 2:22:03 About well know, registered, dynamic ports 2:28:05 what is mac address 2:38:27 difference between mac address and ip address 2:41:52 Programming languages for hackers 2:45:40 analyze network using Wireshark 2:54:53 setting up lab for web hacking 2:59:20 How to Perform google Hacking 3:38:06 OWASP top 10 web 3:41:06 setting up burpsuit 3:48:08 HTTP response status codes 3:52:25 Creating wordlist by scrapping website 4:01:37 Creating wordlist according to target user 4:20:49 what is html injection 4:25:48 impact of html injection 4:27:43 Html injection (reflected and stored) 4:44:43 what is command injection 4:50:09 impact and consequences of command injection vulnerability 4:53:08 command injection(practical) 4:57:38 what is xss and how does it work 5:02:07 what is the impact of xss 5:03:54 xss attack(practical 5:10:38 what is csrf and how its work 5:14:22 csrf - get and post requests 5:17:38 what is the impact of csrf 5:18:38 csrf attack (practical) 5:31:53 impact of broken authentication and session management 5:37:12 what is sql injection 5:39:17 impact of sql injection 5:41:38 sql injection (Practical) 5:48:46 Vulnerability scanning - lab setup 5:51:30 Scanning using nmap 6:01:58 scanning using zenmap 6:06:42 scanning using nikto 6:10:06 Exploiting Ftp 6:14:30 Exploiting ssh 6:19:39 Exploiting telnet, smtp, PostgreSQL, javarmi, proftpd 6:21:25 Penetration testing 6:21:55 setup Lab 6:22:55 Scanning 6:36:20 User Enumeration 6:44:10 Bruteforce Attack 6:51:02 Gaining shell access 6:55:45 Privilege escalation from web to User 7:03:17 Privilege escalation to root 7:09:34 Introduction to wifi hacking 7:10:36 Learning About wep Network 7:14:43 Learning About wpa wpa2 Network 7:26:38 Choosing a wifi adapter for hacking 7:31:04 What is Monitor and Managed Mode (Theory) 7:38:47 How to Change your wifi adapter to monitor mode 7:47:22 Wps Attacks 7:53:45 Wps vulnerabilities and types of wps attacks 7:58:19 wps bruteforce Attacks 8:01:14 Wps - Pixie Dust Attacks 8:02:31 Conditions to Hack wpa2 Network 8:08:38 wifi hacking tool 8:23:39 Scanning wps wep wpa Networks 8:32:35 Hacking wep wps wpa wpa2 Network 8:38:02 How to Perform dictionary Attack 8:45:13 WPS Bruteforce Attack Using Reaver 8:52:10 Hacking Wps Network using Wpa wps Network 8:54:13 What is deauthentication attack 8:58:24 How to Perform deauthentication Attack and Capturing Handshake file 9:10:32 Cracking Handshake file 9:14:02 Jamming Wifi Networks using mdk3 9:18:17 Wifi Hacking for Red teamers and pentesters 9:22:26 Red Team Analyst Training 9:29:46 what is buffer overflow 9:33:26 basics of buffer overflow(EAX EDX EBP ESP EIP stack) 9:41:53 risks of buffer overflow 9:43:39 what is fuzzing and offset 9:45:46 what are bad characters 9:50:35 setup a lab for practice 9:52:23 Scanning machine 9:59:59 setting up immunity Debugger and Mona.py 10:03:47 crashing a software 10:15:35 immunity debugger (EIP) 10:27:06 Exploit development and Fuzzing 10:32:15 offset - unique characters 10:39:38 offset - controlling EIP 10:47:25 finding bad characters 10:54:14 return address 11:00:44 pointing to EIP 11:06:35 Generating a shell 11:12:26 Gaining Access to windows 11:19:20 Gaining Access to linux COURSE LINK >

Post a Comment

Previous Post Next Post