学习道德黑客和渗透测试 - 实践
Learn Ethical Hacking and Pentesting - Hands-on
- 1. Course Overview
- 1. Video - Course Overview
- 2. Section 2
- 1. Video - Section Overview
- 2. Video - Downloading ISO and OVA Files for VirtualBox
- 3. Video and lab - Creating a Virtual install of Kali using VirtualBox
- 4. Video and Lab - Create a Virtual Install of Windows 10 Pro Using VirtualBox
- 5. Video and lab - Installing Metasploitable2 Using VirtualBox
- 6. Video and lab - Creating an Install of Metasplotable3-w2k8
- 7. Video and Lab - Creating a Virtual Install of CSI Linux 2021.2
- 3. Troubleshooting VirtualBox
- 1. Video - Adding a NAT Network in VirtualBox 7.0.2
- 2. Video - Installing the VirtualBox Extension Pack
- 3. Video - Fix Duplicate IP Address Issue With VirtualBox
- 4. Video - Taking a Snapshot of Your Current Configuration
- 4. Passive Reconnaissance
- 1. Video - Section Overview
- 2. Video and Lab - Gathering Information Using Maltego
- 3. Video and Lab - Gathering Information Using CSI Linux Investigator
- 4. Video and Lab - Preparing CSI Linux to Use Shodan
- 5. Video and Lab - Using Shodan to Find Vulnerable Devices
- 6. Video and lab - Using Shodan to Search for Vulnerable Databases
- 5. Active Scanning with Nmap
- 1. Video - Section Overview
- 2. Video and Lab - Introduction to Nmap
- 3. Video - Service and Open Port scan
- 4. Video - OS Detection
- 5. Video - Host Discovery
- 6. Video - Analyzing NMap Results
- 7. Video and lab - NMap Scripting Engine (NSE)
- 8. Video and lab - Scanning for WannaCry Ransomware
- 6. Scanning for Vulnerabilities Using Nessus
- 1. Video and Lab - Installing NESSUS Using Docker
- 2. Video and lab - Scanning for Vulnerabilities Using Nessus
- 3. Video - Using Your Nessus Scan Results
- 7. Scanning for Vulnerabilities Using OpenVAS
- 1. Video and Lab - Installing OpenVAS Using Docker
- 2. Video and Lab - Scanning for Vulnerabilities Using OpenVAS
- 8. Exploiting Microsoft Windows
- 1. Video and Lab - Dumping Wi-Fi Credentials Using netsh
- 2. Video and Lab - Post-Exploitation of Microsoft Windows
- 3. Video and Lab - Performing an RDP Brute Force Attack
- 9. MSFVENOM
- 1. Video and Lab - Use MSFVENOM to Create a BIND Shell Payload
- 2. Video and Lab - Use MSFVENOM to Create a Reverse TCP Payload
- 3. Video and Lab - Use MSFVENOM to Create a HTTPS Payload
- 4. Video and Lab - Use MSFVENOM to Create a Hidden Bind TCP Payload
- 5. Video and Lab - HTML Smuggling Attack
- 10. Exploiting Linux
- 1. Video - Section Overview
- 4. Video - Exploiting the UNIXLinux rlogin Vulnerability
- 5. Video - Exploiting VSFTPD v2.3.4 Using Metasploit
- 11. Social Engineering
- 1. Video and lab - Lab - Social Engineering with ZPhisher
- 12. BASH Scripting for Pentesters
- 1. Video and Lab - Introduction to BASH Scripting
- 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports
- 13. Password Cracking
- 1. Video and Lab - Password Cracking Using Hydra
- 2. Video and Lab – Password Cracking Using Medusa
- 3. Video and Lab - Passwords Cracking Using Mimikatz
- 14. Pentesting Wireless Networks
- 1. Video and Lab - Installing a Wireless Adapter in Kali
- 2. Video and Lab - Hacking a Wireless Network Using Kali Linux
- 3. Video and Lab - Wireless Deauthentication Attack
- 4. Video and Lab - PMKID Client-less Wireless Attack Using Bettercap
- 15. Web Based Application Attacks
- 1. Video and Lab - Installing w3af in Kali Linux Using Docker
- 2. Video and Lab – Conducting A Website Vulnerability Scan Using w3af
- 3. Video and Lab – Performing a Browser Based Attack
- 4. Video and lab - SQL Injection Attack Using SQLmap
- 16. Browser Exploitation Framework (BeEF)
- 1. Video - Configure Kali for Exploitation the WAN
- 2. Video and lab - The Browser Exploitation Framework (BeEF)
- 17. Remaining Anonymous
- 1. Video and Lab - Anonymize Kali Using Whonix
- 18. Capture the Flag Walkthrough - Mr. Robot
- 2. Video Walk Through -Key #1
- 3. Video Walk through - Key #2
- 4. Video Walk Through - Key #3
- 19. Capture the Flag Walkthrough – Stapler
- 2. Video - Capture the Flag - Stapler Part 1
- 3. Video - Capture the Flag - Stapler Part 2
- 4. Video - Capture the Flag - Stapler Part 3