Ethical Hacking Kali Linux

Learn ethical hacking, penetration testing and network security skills with our comprehensive course!

Last updated 2022-01-10 | 4.4

- Ethical Hacking
- Linux Commands
- Kali Linux

What you'll learn

Ethical Hacking
Linux Commands
Kali Linux
Creating a Secure Environment
Footprinting
Scanning
Website Penetration Testing
Wireless Cracking
Man in the Middle Attacks
System Hacking
Python Programming Fundamentals
Coding Custom Pentesting Tools
Tips for Building a Career in Cyber Security

* Requirements

* An eager and open mind!

Description

  • Ethical Hacking
  • Linux Commands
  • Kali Linux
  • Creating a Secure Environment
  • Footprinting
  • Scanning
  • Website Penetration Testing
  • Wireless Cracking
  • Man in the Middle Attacks
  • System Hacking
  • Python Programming Fundamentals
  • Coding Custom Pentesting Tools
  • Tips for Building a Career in Cyber Security

Course content

14 sections • 148 lectures

Introduction to the course Preview 04:40

VirtualBox installation Preview 15:36

Kali Linux installation Preview 13:54

Enabling full-screen Preview 18:16

Basic commands part 1 Preview 09:41

Basic commands part 2 Preview 21:04

Basic commands part 3 Preview 12:45

Changing IP address and wireless adapter setup Preview 04:51

Creating a bootable Kali USB drive Preview 04:54

Essential networking terms Preview 10:15

Essential hacking terms Preview 17:58

Additional Kali tools to install Preview 08:30

Changing our MAC address with macchanger Preview 06:24

Google hacking Preview 13:08

Nikto basics Preview 10:55

Whois tool Preview 06:39

Email harvesting Preview 06:07

Shodan Preview 10:24

Zone transfer with Dig Preview 07:08

Installing Metasploitable Preview 06:58

Nmap part 1 Preview 15:32

Nmap part 2 Preview 11:43

Nmap part 3 Preview 12:24

Zenmap Preview 07:52

TCP scans Preview 15:50

Nmap bypassing defenses Preview 17:23

Nmap scripts part 1 Preview 09:28

Nmap scripts part 2 Preview 13:59

Installing OWASP Preview 08:26

HTTP request Preview 09:57

HTTP response Preview 10:27

Burpsuite configuration Preview 12:49

Editing packets in Burpsuite Preview 12:20

Whatweb and Dirb Preview 10:10

Password recovery attack Preview 15:32

Burpsuite login bruteforce Preview 11:01

Hydra login bruteforce Preview 08:44

Session fixation Preview 13:51

Injection attacks Preview 05:31

Simple command injection Preview 11:04

Exploiting command injection vulnerability Preview 07:38

Finding blind command injection Preview 13:39

SQL basics Preview 10:21

Manual SQL injection part 1 Preview 13:12

Manual SQL injection part 2 Preview 20:49

SQLmap basics Preview 16:34

XML injection Preview 15:54

Installing XCAT and preventing injection attacks Preview 05:50

Reflected XSS Preview 10:46

Stored XSS Preview 11:56

Changing HTML code with XSS Preview 07:28

XSSer and XSSsniper Preview 13:32

Wireless attacking theory Preview 10:49

Enabling monitor mode Preview 04:39

Capturing handshake with airodump Preview 14:35

RockYou.txt Preview 13:53

Cracking with Aircrack Preview 15:31

Cracking with Hashcat Preview 14:55

Creating password lists with Crunch Preview 18:20

Creating password lists with Cupp Preview 07:10

Rainbow tables part 1 Preview 16:34

Rainbow tables part 2 Preview 05:38

Installing Fluxion Preview 06:17

Finding and cracking hidden networks Preview 08:18

Preventing wireless attacks Preview 07:57

ARP protocol basics Preview 10:28

Man in the middle attack theory Preview 07:18

Installing MITMf Preview 06:36

Manual ARP spoofing Preview 12:47

Problems while installing MITMf Preview 06:18

HTTP traffic sniffing Preview 08:29

DNS spoofing and HTTPS password sniffing Preview 24:18

Hooking browsers with BEEF Preview 16:01

Screenshotting targets browser Preview 11:00

Cloning any webpage Preview 08:53

Ettercap basics Preview 06:57

MSFconsole environment Preview 16:05

Metasploit modules explained Preview 12:11

Bruteforcing SSH with Metasploit Preview 15:17

Attacking Tomcat with Metasploit Preview 08:49

Getting Meterpreter with command injection Preview 25:05

PHP code injection Preview 05:43

2 Metasploitable exploits Preview 06:57

Wine installation Preview 12:01

Creating Windows payloads with Msfvenom Preview 10:00

Encoders and Hex editor Preview 18:42

Windows 10 Meterpreter shell Preview 11:57

Meterpreter environment Preview 11:25

Windows 10 privilege escalation Preview 11:28

Preventing privilege escalation Preview 06:21

Post exploitation modules Preview 14:10

Getting Meterpreter over Internet with port forwarding Preview 10:39

Eternalblue exploit Preview 20:15

Persistence module Preview 13:14

Hacking over the internet with Ngrok Preview 10:24

Android device attack with Venom Preview 09:54

The real hacking begins now! Preview 02:25

Variables Preview 13:40

Raw input Preview 10:46

If-else statements Preview 10:17

For loops Preview 06:30

While loops Preview 08:23

Python lists Preview 08:03

Functions Preview 14:33

Classes Preview 10:20

Importing libraries Preview 06:59

Files in Python Preview 11:42

Try and except rule Preview 05:11

Theory behind reverse shells Preview 06:47

Simple server code Preview 12:40

Connection with reverse shell Preview 07:07

Sending and receiving messages Preview 10:46

Sending messages with while true loop Preview 07:52

Executing commands on target system Preview 09:37

Fixing backdoor bugs and adding functions Preview 20:08

First test using our backdoor Preview 17:59

Trying to connect every 20 seconds Preview 12:23

Creating persistence part 1 Preview 06:09

Creating persistence part 2 Preview 16:45

Changing directory Preview 11:51

Uploading and downloading files Preview 22:29

Downloading files from the internet Preview 22:42

Starting programs using our backdoor Preview 06:44

Capturing screenshot on the target PC Preview 18:43

Embedding backdoor in an image part 1 Preview 13:27

Embedding backdoor in an image part 2 Preview 08:37

Checking for administrator privileges Preview 12:10

Adding help option Preview 08:51

Importing Pynput Preview 10:19

Simple keylogger Preview 09:55

Adding report function Preview 10:32

Writing keystrokes to a file Preview 13:59

Adding the keylogger to our reverse shell part 1 Preview 22:59

Adding the keylogger to our reverse shell part 2 Preview 07:39

Final project test Preview 14:24

Printing banner Preview 11:19

Adding available options Preview 11:12

Starting threads for bruteforce Preview 08:23

Writing function to run the attack Preview 11:02

Bruteforcing router login Preview 09:37

Bypassing antivirus with your future programs Preview 13:41

Sending malware with spoofed email Preview 15:13

What will you learn in this section? Preview 02:33

Why is ethical hacking a valuable skill? Preview 23:00

What is the best ethical hacking certification? Preview 16:31

Tips for getting your first job as an ethical hacker Preview 18:23

How I started my career as an ethical hacker Preview 14:11

How to price your work Preview 10:47