Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Anatomy of a Cyber Attack: A beginners course on hacking!

Video Introducing this tutorial

Welcome to "The Anatomy of a Cyber Attack" :
Introduction (...and now the moment you've all been waiting for!)
Creating Our Lab Environment (...our own special little place to hack)
Installing Kali Linux (...our attack platform)
An Important Course Message
Installing Windows (…our first victim)
Installing Metasploitable (...another victim for our amusement)
Create Your Own Lab Environment


Security (...and the threats to it) :
The CIA Triad (...we aren't talking about intelligence)
Hackers, Crackers, and Attackers (...Oh My!)
Security (...and the threats to it)
5 questions


The Hacker Methodology (...a malicious mindset) :
The Hacker's Methodology (...a malicious mindset)
Ethical Hackers (...isn't that an oxymoron?)
The Hacker's Methodology (...a malicious mindset)
3 questions


Step 1: Reconnaissance (...I can see you but you can't see me) :
Reconnaissance (...I can see you but you can't see me)
Lab (...Getting Creepy)
Lab (...OSINT with CentralOps)


Step 2: Scanning and Enumeration (...poke, poke, poke) :
Scanning and Enumeration (...poke, poke, poke)
Lab Introduction and Setup (...you've got to find the hole)
Lab (...you've got to find the hole)


Step 3: Gaining Access (...finding my foothold) :
Gaining Access (...finding a foothold)
Buffer Overflows (...dissecting the exploit)
Lab: Buffer Overflows (...dissecting the exploit)
Introduction to Shellcode (...finding my foothold)
The MS08-067 Vulnerability (…aka, everyone’s first hack)
Lab: Exploiting Windows (...making it look easy)
Meterpreter (...a crowd favorite for payloads)
Lab (...give 'em an inch, they take a mile)


Step 4: Escalation of Privileges (...I've got the power) :
Escalation of Privileges (...I've got the power)
Lab (...become super man without the fear of kryptonite)


Step 5: Maintaining Access (...hold on tight) :
Maintaining Access (...hold on tight)
Lab (...spread out and grab on)


Step 6: Covering Tracks and Placing Backdoors (...dig in deep) :
Covering Tracks and Placing Backdoors (...dig in deep)
Lab (...hide in case the lights turn on)


Conclusion (...and what should I do next?) :
Conclusion (...scared yet?)
BONUS LECTURE: What's next? (...deep discount on my Network+ course and more!)
BONUS: Congratulations and Where to Go From Here!
Promotional Video (...the real reason you signed up!)


COURSE UPDATES: EternalBlue and WannaCry (Windows 7/2008 Hacking) :
Intro to EternalBlue (...same methods work on Windows 7/2008 with new exploits)
Lab (...Exploiting Windows 7/2008 with Eternal Blue [MS17-010])