There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Hands-on: Complete Penetration Testing and Ethical Hacking

Video Introducing this tutorial

Introduction :

Setting Up the Laboratory :
Setting Up the Laboratory
Virtual Platforms
Kali From the VMware Image - Step 1
Kali From the VMware Image - Step 2
Kali From the VMware Image - Step 3
Kali From the ISO File - Step 1
Kali From the ISO File - Step 2
Kali From the ISO File - Step 3
Metasploitable Linux
OWASP Broken Web Applications
Windows Systems as Victim
Connections of Virtual Machines

Introduction to Penetration Test :
Content of the Section
Definition of "Penetration Test"
Penetration Test Types
Security Audits
Vulnerability Scan
Terms: Asset, Threat, Vulnerability, Risk, Exploit
Penetration Test Approaches
Planning a Penetration Test
Penetration Test Phases
Legal Issues & Testing Standards

Network Scan :
Content of the Section
Network Scan Types
Passive Scan with Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDoS

NMAP: The Network Mapper :
Introduction to Nmap
Ping Scan
TCP/IP (Networking) Basics
TCP/IP Model on an Example
TCP & UDP Protocols Basics
Introduction to Port Scan
SYN Scan
Details of the Port Scan
TCP Scan
UDP Scan
Version Detection in Nmap
Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine: Introduction
Nmap Scripting Engine: First Run
Nmap Scripting Engine: First Example
Nmap Scripting Engine: Second Example
How to Bypass Security Measures in Nmap Scans
Timing of the Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan

Vulnerability Scan :
Introduction to Vulnerability Scan
Introduction to Nessus
Nessus: Download
Nessus: Install & Setup
Nessus: Creating a Custom Policy
Nessus: First Scan
An Aggressive Scan
Results of an Aggressive Scan
Results of an Aggressive Scan with Windows Systems
Nessus: Report Function

Exploitation (Gaining Session) :
Content of the Section
Exploitation Terminologies
Exploit Databases
Manual Exploitation
Exploitation Frameworks
Metasploit Framework (MSF): Introduction
Architecture of Metasploit Framework
Introduction to MSF Console
MSF Console: Initialisation
MSF Console: Search Function & Ranking of the Exploits
MSF Console: Configure & Run an Exploit
Introduction to Meterpreter
Running the First Exploit in Meterpreter
Meterpreter Basics on Linux
Meterpreter Basics on Windows
Pass the Hash: Hack Even There is No Vulnerability
Pass the Hash: Preparation
Pass the Hash: Gathering Some Hashes
Pass the Hash: Try Other Assets

Post Exploitation (Maintaining Access) :
Introduction to Post-Exploitation
Persistence: What is it?
Persistence Module of Meterpreter
Removing a Persistence Backdoor
Persist on a Windows 8 Using Meterpreter's Persistence Module
Another Way of Persistence: Persistence Exe - I
Another Way of Persistence: Persistence Exe - II
Meterpreter for Post-Exploitation
Meterpreter for Post-Exploitation: Core Extension
Meterpreter for Post-Exploitation: Core Extension - Session Commands
Meterpreter for Post-Exploitation: Core Extension - Channel Command
Meterpreter for Post-Exploitation: Core Extension - Migrate Commands
Meterpreter for Post-Exploitation: Stdapi Extension
Meterpreter for Post-Exploitation: Stdapi Extension - File System Commands
Meterpreter for Post-Exploitation: Stdapi Extension - System Commands
Meterpreter for Post-Exploitation: Stdapi Extension - User Interface Commands
Meterpreter for Post-Exploitation: Incognito Extension
Meterpreter for Post-Exploitation: Mimikatz Extension
Post Modules of Metasploit Framework (MSF)
Post Modules: Gathering Modules
Post Modules: Managing Modules

Password Cracking :
Introduction to Password Cracking
Password Hashes of Windows Systems
Password Hashes of Linux Systems
Classification of Password Cracking
Password Cracking Tools
Hydra: Cracking the Password of a Web App
Password Cracking with Cain & Abel
Cain & Abel - Step 1: Install & First Run
Cain & Abel: Gathering Hashes
Cain & Abel: Importing Hashes
Cain & Abel: A Dictionary Attack
Cain & Abel: A Brute Force Attack
John the Ripper

Information Gathering Over the Internet :
Content of the Section
Using Search Engines to Gather Information
Search Engine Tools: SiteDigger and SearchDiggity
Gathering Information About the People
Web Archives
FOCA - Fingerprinting Organisations with Collected Archives
Fingerprinting Tools: The Harvester and Recon-NG
Maltego - Visual Link Analysis Tool
Web Application Penetration Testing
28 lectures
Content of the Section
Basic Terminologies - I
Basic Terminologies - II
Intercepting HTTP Traffic with Burp Suite
Intercepting HTTPS Traffic with Burp Suite
Classification of Web Attacks
Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner
ZAP: Installation & Quick Scan
ZAP: As a Personal Proxy
ZAP: Intercepting the HTTPS Traffic
ZAP: An Advanced Scan - Scanning a Website that Requires to Login
Information Gathering and Configuration Flaws - I
Information Gathering and Configuration Flaws - II
Input & Output Manipulation
XSS (Cross Site Scripting) - Reflected XSS
XSS (Cross Site Scripting) - Stored and DOM Based XSS
BeEF - The Browser Exploitation Framework
SQL Injection - Part I
SQL Injection - Part II
SQL Injection - Part III
Authentication Attacks
Hydra: Cracking the Password of a Web App
Authorization Flaws
Path Traversal Attack Demo
Session Management
Session Fixation & Demo
Cross Site Request Forgery (CSRF)
Social Engineering & Phishing Attacks
21 lectures
Content of the Section
Social Engineering Terminologies - I
Social Engineering Terminologies - II
Creating Malware - Terminologies
MSF Venom - Part I
MSF Venom - Part II
Veil to Create Malware
Veil in Action
TheFatRat to Create Malware
TheFatRat in Action
TheFatRat - Overcoming a Problem
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Empire Project - Installation
Empire in Action - Part I
Empire in Action - Part II
Exploiting Java Vulnerabilities
Social Engineering Toolkit (SET) for Phishing
Sending Fake Emails for Phishing
Social Engineering by Phone a.k.a. Vishing
Network Fundamentals
36 lectures
Content of the Section
Basic Terms of Networking
Reference Models
TCP/IP (Networking) Basics
OSI Reference Model vs. TCP/IP Reference Model
Network Layers in Real World
Layer 2 - Data Link Layer
Layer 2: Ethernet - Principles, Frames & Headers
Layer 2: ARP - Address Resolution Protocol
Layer 2: Analysing ARP Packets
Layer 2: VLANs (Virtual Local Area Networks)
Layer 2: WLANs (Wireless Local Area Networks)
Layer 3 - Network Layer
Layer 3: IP (Internet Protocol)
Layer 3: IPv4 Addressing System
Layer 3: IPv4 Packet Header
Layer 3: Subnetting - Classful Networks
Layer 3: Subnetting Masks
Layer 3: Understanding IPv4 Subnets
Layer 3: IPv4 Address Shortage
Layer 3: Private Networks
Layer 3: Private Networks - Demonstration
Layer 3: NAT (Network Address Translation)
Layer 3: IPv6, Packet Header & Addressing
Layer 3: DHCP - How the Mechanism Works
Layer 3: ICMP (Internet Control Message Protocol)
Layer 3: Traceroute
Layer 4 - Transport Layer
Layer 4: TCP (Transmission Control Protocol)
Layer 4: TCP Header
Layer 4: UDP (User Datagram Protocol)
Layer 5-7 - Application Layer
Layer 7: DNS (Domain Name System)
Layer 7: HTTP (Hyper Text Transfer Protocol)
Layer 7: HTTPS
Summary of Network Fundamentals
Network Layer & Layer 2 Attacks
28 lectures
Content of the Section
GNS3 - Graphical Network Simulator
GNS3: Setting Up the First Project
GNS3: Tool Components
GNS3: Building the Network
GNS3: Attaching VMware VMs (Including Kali) to the Network
GNS3: Configuring Switch & Router (Cisco) and creating VLANs
Introduction to Network Security
Sniffing Network with TCPDump
TCPDump in Action
Wireshark to Sniff the Network Traffic
Wireshark: Following Stream
Wireshark: Summarise Network
Active Network Devices: Router, Switch, Hub
How to Expand Sniffing Space?
MAC Flood: Switching
MAC Flood Using Macof
MAC Flood Countermeasures
ARP Spoof
ARP Cache Poisoning using Ettercap
DHCP Starvation & DHCP Spoofing
DHCP Mechanism
DHCP Starvation - Scenario
DHCP Starvation Demonstration with Yersinia
VLAN Hopping
VLAN Hopping: Switch Spoofing
VLAN Hopping: Double Tagging
Penetration Testing & Auditing Active Network Devices
12 lectures
Reconnaissance: Finding Open Ports & Services Using NMAP
Password Cracking
Online SSH Password Cracking With Hydra
Compromising SNMP: What is SNMP ?
Compromising SNMP: Finding Community Names Using NMAP Scripts
Compromising SNMP: Write Access Check Using SNMP-Check Tool
Compromising SNMP: Grabbing SNMP Configuration Using Metasploit
Weaknesses of the Network Devices
Password Creation Methods of Cisco Routers
Identity Management in the Network Devices
ACLs (Access Control Lists) in Cisco Switches & Routers
SNMP Protocol Security