Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Hands-on: Complete Penetration Testing and Ethical Hacking

Video Introducing this tutorial


Introduction :
Introduction

Setting Up the Laboratory :
Setting Up the Laboratory
Virtual Platforms
Kali From the VMware Image - Step 1
Kali From the VMware Image - Step 2
Kali From the VMware Image - Step 3
Kali From the ISO File - Step 1
Kali From the ISO File - Step 2
Kali From the ISO File - Step 3
Metasploitable Linux
OWASP Broken Web Applications
Windows Systems as Victim
Connections of Virtual Machines

Introduction to Penetration Test :
Content of the Section
Definition of "Penetration Test"
Penetration Test Types
Security Audits
Vulnerability Scan
Terms: Asset, Threat, Vulnerability, Risk, Exploit
Penetration Test Approaches
Planning a Penetration Test
Penetration Test Phases
Legal Issues & Testing Standards

Network Scan :
Content of the Section
Network Scan Types
Passive Scan with Wireshark
Passive Scan with ARP Tables
Active Scan with Hping
Hping for Another Purpose: DDoS

NMAP: The Network Mapper :
Introduction to Nmap
Ping Scan
TCP/IP (Networking) Basics
TCP/IP Model on an Example
TCP & UDP Protocols Basics
Introduction to Port Scan
SYN Scan
Details of the Port Scan
TCP Scan
UDP Scan
Version Detection in Nmap
Operating System Detection
Input & Output Management in Nmap
Nmap Scripting Engine: Introduction
Nmap Scripting Engine: First Run
Nmap Scripting Engine: First Example
Nmap Scripting Engine: Second Example
How to Bypass Security Measures in Nmap Scans
Timing of the Scans
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan

Vulnerability Scan :
Introduction to Vulnerability Scan
Introduction to Nessus
Nessus: Download
Nessus: Install & Setup
Nessus: Creating a Custom Policy
Nessus: First Scan
An Aggressive Scan
Results of an Aggressive Scan
Results of an Aggressive Scan with Windows Systems
Nessus: Report Function

Exploitation (Gaining Session) :
Content of the Section
Exploitation Terminologies
Exploit Databases
Manual Exploitation
Exploitation Frameworks
Metasploit Framework (MSF): Introduction
Architecture of Metasploit Framework
Introduction to MSF Console
MSF Console: Initialisation
MSF Console: Search Function & Ranking of the Exploits
MSF Console: Configure & Run an Exploit
Introduction to Meterpreter
Running the First Exploit in Meterpreter
Meterpreter Basics on Linux
Meterpreter Basics on Windows
Pass the Hash: Hack Even There is No Vulnerability
Pass the Hash: Preparation
Pass the Hash: Gathering Some Hashes
Pass the Hash: Try Other Assets

Post Exploitation (Maintaining Access) :
Introduction to Post-Exploitation
Persistence: What is it?
Persistence Module of Meterpreter
Removing a Persistence Backdoor
Persist on a Windows 8 Using Meterpreter's Persistence Module
Another Way of Persistence: Persistence Exe - I
Another Way of Persistence: Persistence Exe - II
Meterpreter for Post-Exploitation
Meterpreter for Post-Exploitation: Core Extension
Meterpreter for Post-Exploitation: Core Extension - Session Commands
Meterpreter for Post-Exploitation: Core Extension - Channel Command
Meterpreter for Post-Exploitation: Core Extension - Migrate Commands
Meterpreter for Post-Exploitation: Stdapi Extension
Meterpreter for Post-Exploitation: Stdapi Extension - File System Commands
Meterpreter for Post-Exploitation: Stdapi Extension - System Commands
Meterpreter for Post-Exploitation: Stdapi Extension - User Interface Commands
Meterpreter for Post-Exploitation: Incognito Extension
Meterpreter for Post-Exploitation: Mimikatz Extension
Post Modules of Metasploit Framework (MSF)
Post Modules: Gathering Modules
Post Modules: Managing Modules

Password Cracking :
Introduction to Password Cracking
Password Hashes of Windows Systems
Password Hashes of Linux Systems
Classification of Password Cracking
Password Cracking Tools
Hydra: Cracking the Password of a Web App
Password Cracking with Cain & Abel
Cain & Abel - Step 1: Install & First Run
Cain & Abel: Gathering Hashes
Cain & Abel: Importing Hashes
Cain & Abel: A Dictionary Attack
Cain & Abel: A Brute Force Attack
John the Ripper

Information Gathering Over the Internet :
Content of the Section
Using Search Engines to Gather Information
Search Engine Tools: SiteDigger and SearchDiggity
Shodan
Gathering Information About the People
Web Archives
FOCA - Fingerprinting Organisations with Collected Archives
Fingerprinting Tools: The Harvester and Recon-NG
Maltego - Visual Link Analysis Tool
+
Web Application Penetration Testing
28 lectures
Content of the Section
Basic Terminologies - I
Basic Terminologies - II
Intercepting HTTP Traffic with Burp Suite
Intercepting HTTPS Traffic with Burp Suite
Classification of Web Attacks
Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner
ZAP: Installation & Quick Scan
ZAP: As a Personal Proxy
ZAP: Intercepting the HTTPS Traffic
ZAP: An Advanced Scan - Scanning a Website that Requires to Login
Information Gathering and Configuration Flaws - I
Information Gathering and Configuration Flaws - II
Input & Output Manipulation
XSS (Cross Site Scripting) - Reflected XSS
XSS (Cross Site Scripting) - Stored and DOM Based XSS
BeEF - The Browser Exploitation Framework
SQL Injection - Part I
SQL Injection - Part II
SQL Injection - Part III
Authentication
Authentication Attacks
Hydra: Cracking the Password of a Web App
Authorization Flaws
Path Traversal Attack Demo
Session Management
Session Fixation & Demo
Cross Site Request Forgery (CSRF)
+
Social Engineering & Phishing Attacks
21 lectures
Content of the Section
Social Engineering Terminologies - I
Social Engineering Terminologies - II
Creating Malware - Terminologies
MSF Venom - Part I
MSF Venom - Part II
Veil to Create Malware
Veil in Action
TheFatRat to Create Malware
TheFatRat in Action
TheFatRat - Overcoming a Problem
Embedding Malware in PDF Files
Embedding Malware in Word Documents
Embedding Malware in Firefox Add-ons
Empire Project - Installation
Empire in Action - Part I
Empire in Action - Part II
Exploiting Java Vulnerabilities
Social Engineering Toolkit (SET) for Phishing
Sending Fake Emails for Phishing
Social Engineering by Phone a.k.a. Vishing
+
Network Fundamentals
36 lectures
Content of the Section
Basic Terms of Networking
Reference Models
TCP/IP (Networking) Basics
OSI Reference Model vs. TCP/IP Reference Model
Network Layers in Real World
Layer 2 - Data Link Layer
Layer 2: Ethernet - Principles, Frames & Headers
Layer 2: ARP - Address Resolution Protocol
Layer 2: Analysing ARP Packets
Layer 2: VLANs (Virtual Local Area Networks)
Layer 2: WLANs (Wireless Local Area Networks)
Layer 3 - Network Layer
Layer 3: IP (Internet Protocol)
Layer 3: IPv4 Addressing System
Layer 3: IPv4 Packet Header
Layer 3: Subnetting - Classful Networks
Layer 3: Subnetting Masks
Layer 3: Understanding IPv4 Subnets
Layer 3: IPv4 Address Shortage
Layer 3: Private Networks
Layer 3: Private Networks - Demonstration
Layer 3: NAT (Network Address Translation)
Layer 3: IPv6, Packet Header & Addressing
Layer 3: DHCP - How the Mechanism Works
Layer 3: ICMP (Internet Control Message Protocol)
Layer 3: Traceroute
Layer 4 - Transport Layer
Layer 4: TCP (Transmission Control Protocol)
Layer 4: TCP Header
Layer 4: UDP (User Datagram Protocol)
Layer 5-7 - Application Layer
Layer 7: DNS (Domain Name System)
Layer 7: HTTP (Hyper Text Transfer Protocol)
Layer 7: HTTPS
Summary of Network Fundamentals
+
Network Layer & Layer 2 Attacks
28 lectures
Content of the Section
GNS3 - Graphical Network Simulator
GNS3: Setting Up the First Project
GNS3: Tool Components
GNS3: Building the Network
GNS3: Attaching VMware VMs (Including Kali) to the Network
GNS3: Configuring Switch & Router (Cisco) and creating VLANs
Introduction to Network Security
Sniffing
Sniffing Network with TCPDump
TCPDump in Action
Wireshark to Sniff the Network Traffic
Wireshark: Following Stream
Wireshark: Summarise Network
Active Network Devices: Router, Switch, Hub
How to Expand Sniffing Space?
MAC Flood: Switching
MAC Flood Using Macof
MAC Flood Countermeasures
ARP Spoof
ARP Cache Poisoning using Ettercap
DHCP Starvation & DHCP Spoofing
DHCP Mechanism
DHCP Starvation - Scenario
DHCP Starvation Demonstration with Yersinia
VLAN Hopping
VLAN Hopping: Switch Spoofing
VLAN Hopping: Double Tagging
+
Penetration Testing & Auditing Active Network Devices
12 lectures
Reconnaissance: Finding Open Ports & Services Using NMAP
Password Cracking
Online SSH Password Cracking With Hydra
Compromising SNMP: What is SNMP ?
Compromising SNMP: Finding Community Names Using NMAP Scripts
Compromising SNMP: Write Access Check Using SNMP-Check Tool
Compromising SNMP: Grabbing SNMP Configuration Using Metasploit
Weaknesses of the Network Devices
Password Creation Methods of Cisco Routers
Identity Management in the Network Devices
ACLs (Access Control Lists) in Cisco Switches & Routers
SNMP Protocol Security