Site news

New free complete course for ethical hacking

 
 
Picture of Admin ITSEC
New free complete course for ethical hacking
by Admin ITSEC - Friday, 1 December 2017, 9:33 AM
 
Complete Ethical Hacking Course
16 CPE
 

Time Stamps

01:01 Introduction to ethical hacking

09:02 Prerequisites for this course

16:31 Basic terminology: white hat, gray hat, black hat

28:31 Basic terminology: SQL injections, VPN, proxy, VPS, and keyloggers

46:49 VirtualBox installation

55:48 VirtualBox installation through the repositories

1:10:50 Creating a virtual environment

1:24:25 Installing VirtualBox on Windows

1:29:41 Kali Linux installation/setup

1:57:59 VirtualBox Guest Additions installation

2:12:39 Linux terminal basics

2:22:11 Linux command line interface basics

2:51:41 Tor browser setup

3:17:46 Proxychains

3:57:21 Virtual private network

4:15:50 Changing your mac address with macchanger

4:39:07 Footprinting with network mapper (nmap) and external resources

5:26:19 Attacking wireless networks cracking WPA/WPA2

5:41:33 Aircrack-ng & reaver installation

5:54:17 Installing aircrack-ng on Windows & Crunch on Linux

6:05:52 Aricrack-ng & crunch hacking example

6:48:03 Cracking WPS pins with reaver pt.1

7:03:27 Cracking WPS pins with reaver pt.2

7:14:09 Cracking WPS pins with reaver pt.3

7:30:34 Performing denial of service attacks on wireless networks pt.1

7:43:48 Performing denial of service attacks on wireless networks pt.2

8:01:44 SSL strip pt.1

8:10:33 SSL strip pt.2

8:21:11 SSL strip pt.3

8:39:24 Funny things pt.1

8:46:28 Funny things pt.2

8:58:40 Funny things pt.3

9:17:02 Evil twin pt.1

9:27:37 Evil twin pt.2

9:35:05 Evil twin pt.3

9:46:24 Using known vulnerabilities pt.1

9:56:04 Using know vulnerabilities pt.2

10:05:25 Using known vulnerabilities pt.3

10:24:20 Post authentication exploitation (DNS) pt.1

10:33:58 Post authentication exploitation (DNS) pt.2

10:46:20 Post authentication exploitation (DNS) pt.3

11:00:01 SQL injection pt.1

11:12:34 SQL injection pt.2

11:27:20 SQL injection pt.3

11:40:42 SQL injection pt.4

11:52:06 SQL injection pt.5

12:09:02 Brute force methods for cracking passwords – cracking hashes

12:21:06 Cracking linux passwords with john the ripper pt.1

12:33:51 Cracking linux passwords with john the ripper pt.2

12:42:41 Cracking windows passwords with john the ripper

13:02:06 Hydra usage pt.1

13:19:20 Hydra usage pt.2

13:37:41 DoS attack pt.1 introduction to denial of service attacks

13:56:18 DoS attack pt.2 combine slowloris.pl with nmap

14:04:38 DoS attack pt.3 featuring hackers.org

14:14:24 Intro to metasploit and reverse shells

14:32:52 Metasploit starting from a two terminal setup

14:51:16 Making reverse shells persistent on another system and escalating privileges

15:07:51 Creating a persistent shell with metasploit

15:18:48 Using netcat to make any kind of connection you may need

15:38:49 How to upload a reverse shell onto a web server