4:54 hours
Introduction
Welcome To The Course 00:03:27
About The Author 00:01:12
About Security Testing
Kali Linux 00:03:22
Virtual Machines 00:03:00
Obtaining Vulnerable Operating Systems 00:03:57
Using Windows 00:02:04
A Methodology 00:03:38
Get Out Of Jail Free Cards/Ethics 00:04:11
Basic Tools – Telnet Client 00:03:28
Basic Tools – Netcat 00:02:16
Basic Tools – Ping 00:04:06
Useful Browser Extensions 00:02:45
Useful Web Sites 00:03:30
Information Storage 00:03:22
Google Hacking 00:02:32
Google Hacking Database 00:02:41
Reconnaissance
Using Whois 00:02:58
Using Dig 00:03:20
Using Host/Nslookup 00:02:38
Using Web-Based Tools 00:03:16
Passive Recon 00:03:03
Passive Fingerprinting 00:03:58
Packet Captures 00:03:03
Using Wireshark 00:05:01
Banner Grabbing 00:03:40
Basic Protocol Interaction – HTTP 00:03:43
Basic Protocol Interaction – FTP 00:02:48
Basic Protocol Interaction – SMTP 00:03:49
Using Theharvester 00:03:05
Using Recon-NG 00:04:06
Using Snmpwalk 00:05:29
Using Dnswalk 00:02:31
Scanning
Ports 00:03:09
Using Nmap 00:03:23
Using Nmap For TCP Scanning 00:04:01
Using Nmap For TCP Scan Variations 00:04:03
Using Nmap For UDP Scanning 00:03:58
Using Nmap Scripting 00:03:59
Creating Nmap Scripts For Scanning 00:05:17
Saving Scan Output 00:03:24
High-Speed Scanning 00:02:57
Using Hping3 00:04:13
Using Zenmap 00:03:46
Zenmap Output 00:03:09
Vulnerability Scanning
Vulnerabilities Vs Exploits 00:02:47
Getting Started With Nexpose 00:01:41
Scanning Using Nexpose 00:03:37
Reviewing Reports From Nexpose 00:04:38
Exporting Reports From Nexpose 00:03:23
Getting Started With Nessus 00:01:52
Scanning Using Nessus 00:04:08
Reviewing Reports Using Nessus 00:03:36
Exporting Reports From Nessus 00:03:41
Getting Started With OpenVAS 00:03:41
Scanning Using OpenVAS 00:03:16
Reviewing Reports From OpenVAS 00:03:59
Exporting Reports From OpenVAS 00:04:19
Using Exploit-db 00:02:17
Exploiting Vulnerabilities
Exploit Types 00:03:36
Metasploit 00:02:48
Msfconsole 00:02:57
Msfcli 00:03:03
Importing To Metasploit 00:02:37
Identifying Vulnerabilities And Hosts 00:03:20
Searching Within Metasploit 00:02:36
Scanning With Metasploit 00:03:15
Running An Exploit With Metasploit 00:02:21
Payloads With Metasploit 00:03:15
Using Meterpreter 00:02:38
Acquiring Loot Using Meterpreter 00:02:32
Pivoting 00:04:04
Passing The Hash 00:04:26
Privilege Exploitation 00:05:48
Persistence 00:02:49
Using Armitage 00:03:10
Integrating Nexpose And Metasploit 00:02:53
Using The Metasploit Web Interface 00:02:59
Client Side Attacks
Browser Attacks Using Metasploit 00:03:41
Other Client Attacks Using Metasploit 00:02:35
Using SEToolkit For Phishing 00:02:55
Using SEToolkit For Web Attacks 00:03:17
Client-Side Attacks Using BeEF 00:03:21
File-Based Attacks Using Metasploit 00:03:43
Password Cracking Using John 00:04:26
Rainbow Tables 00:02:22
Using Hydra 00:03:31
Using Patator 00:02:45
Conclusion
Wrap Up And Thank You 00:02:23