完成道德黑客训练营
Complete Ethical Hacking Bootcamp
- 01 - Introduction
- 001 Course Outline
- 002 Join Our Online Classroom!
- 004 What Is Ethical Hacking
- 006 ZTM Resources
- 02 - Setting Up Our Hacking Lab
- 001 What is A Virtual Machine
- 002 Why Linux
- 004 Downloading Virtual Box & Kali Linux
- 006 Creating Our First Virtual Machine
- 008 Installing Kali Linux Operating System
- 009 Update 1 - New & Old Versions of Kali Linux
- 011 Full Screen Mode & Network Settings
- 012 Troubleshooting Network Connection in Kali Linux
- 014 5 Stages Of A Penetration Test
- 03 - Linux Operating System
- 001 Navigating Through Linux System
- 002 Creating Files & Managing Directories
- 003 Network Commands & Sudo Privileges In Kali
- 04 - Reconnaissance & Information Gathering
- 001 What is Information Gathering
- 002 Obtaining IP Address, Physical Address Using Whois Tool
- 003 Whatweb Stealthy Scan
- 004 Aggressive Website Technology Discovering on IP Range
- 006 Gathering Emails Using theHarvester & Hunter.io
- 007 How To Download Tools Online
- 008 Finding Usernames With Sherlock
- 009 Bonus - Email Scraper Tool In Python 3
- 05 - Scanning
- 001 Theory Behind Scanning
- 002 TCP & UDP
- 004 Installing Vulnerable Virtual Machine
- 005 Netdiscover
- 006 Performing First Nmap Scan
- 007 Different Nmap Scan Types
- 009 Discovering Target Operating System
- 010 Detecting Version Of Service Running On An Open Port
- 011 Filtering Port Range & Output Of Scan Results
- 012 What is a FirewallIDS
- 013 Using Decoys and Packet Fragmentation
- 014 Security Evasion Nmap Options
- 06 - Python Coding Project #1 - Portscanner
- 003 Coding a Portscanner in Python 3
- 07 - Vulnerability Analysis
- 001 Finding First Vulnerability With Nmap Scripts
- 002 Manual Vulnerability Analysis & Searchsploit
- 003 Nessus Installation
- 004 Discovering Vulnerabilities With Nessus
- 005 Scanning Windows 7 Machine With Nessus
- 006 Lets cool down for a bit!
- 08 - Exploitation & Gaining Access
- 001 What is Exploitation
- 002 What is a Vulnerability
- 003 Reverse Shells, Bind Shells
- 004 Metasploit Framework Structure
- 005 Msfconsole Basic Commands
- 006 Our First Exploit - vsftp 2.3.4 Exploitation
- 007 Misconfigurations Happen - Bindshell Exploitation
- 008 Information Disclosure - Telnet Exploit
- 009 Software Vulnerability - Samba Exploitation
- 010 Attacking SSH - Bruteforce Attack
- 011 Exploitation Challenge - 5 Different Exploits
- 012 Explaining Windows 7 Setup
- 013 Eternal Blue Attack - Windows 7 Exploitation
- 014 DoublePulsar Attack - Windows Exploit
- 015 BlueKeep Vulnerability - Windows Exploit
- 017 Update 2 - Routersploit
- 018 Update 3 - Router Default Credentials
- 019 Exercise Imposter Syndrome
- 09 - SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
- 002 Setting Up Vulnerable Windows 10
- 003 Crashing Windows 10 Machine Remotely
- 004 Exploiting Windows 10 Machine Remotely
- 10 - Gaining Access (Viruses, Trojans, Payloads ...)
- 001 Generating Basic Payload With Msfvenom
- 002 Advance Msfvenom Usage Part 1
- 003 Advance Msfvenom Usage Part 2
- 004 Generating Powershell Payload Using Veil
- 005 TheFatRat Payload Creation
- 007 Hexeditor & Antiviruses
- 008 Making Our Payload Open An Image
- 11 - Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
- 001 Post Exploitation Theory
- 002 Meterpreter Basic Commands Part 1
- 003 Meterpreter Basic Commands Part 2
- 004 Elevating Privileges With Different Modules
- 005 Creating Persistence On The Target System
- 006 Post Exploitation Modules
- 007 Exploitation Recap
- 12 - Python Coding Project #2 - Backdoor
- 001 What Are We Creating
- 002 Connecting Server And Backdoor
- 003 Processing Instructional Commands
- 004 Sending and Receiving Data
- 005 Executing Commands And Compiling The Program
- 006 Changing Directory Inside Of Our Backdoor
- 007 Uploading & Downloading Files
- 008 Testing All The Commands
- 13 - Website Application Penetration Testing
- 001 Website Penetration Testing Theory
- 002 HTTP Request & Response
- 003 Information Gathering & Dirb Tool
- 004 Burpsuite Configuration
- 005 ShellShock Exploitation
- 006 Command Injection Exploitation
- 007 Getting Meterpreter Shell With Command Execution
- 008 Reflected XSS & Cookie Stealing
- 009 Stored XSS
- 010 HTML Injection
- 011 SQL Injection
- 012 CSRF Vulnerability
- 013 Hydra Bruteforce Attack Example 1
- 014 Hydra Bruteforce Attack Example 2
- 015 Burpsuite Intruder
- 14 - Python Coding Project #3 - Login Bruteforce, Directory Discovery
- 001 Creating 2 Programs
- 002 Bruteforcer In Python
- 003 Hidden Directory Discovery
- 15 - Man In The Middle - MITM
- 001 Theory - Man In The Middle Attack
- 002 Bettercap ARP Spoofing
- 003 Ettercap Password Sniffing
- 004 Manually Poisoning Targets ARP Cache With Scapy
- 16 - Extra Wireless Access Point Cracking
- 001 Wireless Cracking Theory
- 002 Putting Wireless Card In Monitor Mode
- 003 Deauthenticating Devices & Grabbing Password
- 004 Aircrack Password Cracking
- 005 Hashcat Password Cracking
- 17 - Extra Gaining Access To An Android Device
- 001 Android Hacking Theory
- 002 Android VM Install
- 003 Gaining Access With Android Meterpreter
- 004 Evil Droid
- 005 Is it Flappy Bird or Malware
- 006 Hack Any Device On Any Network With Ngrok
- 18 - Extra Introduction To Anonymity
- 001 Anonymity Theory
- 002 Tor Browser
- 003 Proxychains With Nmap
- 004 Installing VPN in Kali Linux
- 005 WhoAmI Anonymity Tool
- 19 - Extra Hacking Active Directory
- 001 Enumerating Active Directory
- 002 Exploiting Active Directory
- 003 Escalating Privileges on the Domain
- 20 - Where To Go From Here
- 003 What is Next
- 21 - Learn Python Basics
- 001 What Is A Programming Language
- 002 Python Interpreter
- 003 How To Run Python Code
- 004 Latest Version Of Python
- 005 Our First Python Program
- 006 Python 2 vs Python 3
- 007 Exercise How Does Python Work
- 22 - Learn Python Intermediate
- 001 Learning Python
- 002 Python Data Types
- 004 Numbers
- 005 Math Functions
- 006 DEVELOPER FUNDAMENTALS I
- 007 Operator Precedence
- 009 Optional bin() and complex
- 010 Variables
- 011 Expressions vs Statements
- 012 Augmented Assignment Operator
- 013 Strings
- 014 String Concatenation
- 015 Type Conversion
- 016 Escape Sequences
- 017 Formatted Strings
- 018 String Indexes
- 019 Immutability
- 020 Built-In Functions + Methods
- 021 Booleans
- 022 Exercise Type Conversion
- 023 DEVELOPER FUNDAMENTALS II
- 024 Exercise Password Checker
- 025 Lists
- 026 List Slicing
- 027 Matrix
- 028 List Methods
- 029 List Methods 2
- 030 List Methods 3
- 031 Common List Patterns
- 032 List Unpacking
- 033 None
- 034 Dictionaries
- 035 DEVELOPER FUNDAMENTALS III
- 036 Dictionary Keys
- 037 Dictionary Methods
- 038 Dictionary Methods 2
- 039 Tuples
- 040 Tuples 2
- 041 Sets
- 042 Sets 2
- 043 Breaking The Flow
- 044 Conditional Logic
- 045 Indentation In Python
- 046 Truthy vs Falsey
- 047 Ternary Operator
- 048 Short Circuiting
- 049 Logical Operators
- 050 Exercise Logical Operators
- 051 is vs ==
- 052 For Loops
- 053 Iterables
- 054 Exercise Tricky Counter
- 055 range()
- 056 enumerate()
- 057 While Loops
- 058 While Loops 2
- 059 break, continue, pass
- 060 Our First GUI
- 061 DEVELOPER FUNDAMENTALS IV
- 062 Exercise Find Duplicates
- 063 Functions
- 064 Parameters and Arguments
- 065 Default Parameters and Keyword Arguments
- 066 return
- 067 Methods vs Functions
- 068 Docstrings
- 069 Clean Code
- 070 args and kwargs
- 071 Exercise Functions
- 072 Scope
- 073 Scope Rules
- 074 global Keyword
- 075 nonlocal Keyword
- 076 Why Do We Need Scope
- 077 Modules in Python
- 079 Optional PyCharm
- 080 Packages in Python
- 081 Different Ways To Import
- 23 - Learn Python 3 Error Handling
- 001 Errors in Python
- 002 Error Handling
- 003 Error Handling 2
- 004 Exercises Error Handling
- 005 Error Handling 3
- 24 - Learn Python 4 File IO
- 001 Working With Files In Python
- 002 File Paths
- 003 File IO Errors
- 004 Read, Write, Append
- 006 Exercise Translator