Ethical Hacking Using Kali Linux From A To Z
Published 7/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.84 GB | Duration: 8h 16m
Published 7/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.84 GB | Duration: 8h 16m
Learn Hacking using Kali from Scratch
What you'll learn
Information Security Professionals seeking to expand their skills.
IT Professionals responsible for network and system security.
Computer Science Students wanting a deeper understanding of information security.
Aspiring Ethical Hackers or Penetration Testers developing necessary skills.
Tech Enthusiasts curious about ethical hacking and related technologies.
Requirements
This course requires no prerequisites other than basic computer literacy and a strong interest in ethical hacking.
Description
Welcome to the comprehensive course "Hacking Using Kali Linux from A to Z." This program is designed for learners who are interested in ethical hacking and network security and wish to familiarize themselves with the world of cybersecurity using Kali Linux.This course starts from scratch, introducing you to the concept of hacking and how Kali Linux, a powerful tool for hackers (ethical ones), plays a crucial role. After a brief introduction, we start by guiding you on setting up your own virtual lab and workspace, which will act as your personal sandbox for practicing the concepts you'll learn.After setting up the workspace, we introduce you to the Kali Linux interface, exploring its functions, services, and integral tools. Here, we cover Penetration Testing Phases, ways to update and upgrade Kali Linux, and basic command-line functions. Further, we dig into managing Kali Linux Services such as HTTP and SSH.Next, we will dive into various essential tools used in hacking, like Netcat and Wireshark, and their functionalities. You will learn how to transfer files, perform remote administration, analyze network traffic, and explore multiple real-life examples.The course will then guide you through the methods of Passive and Active Information Gathering. You'll learn to use tools like NMAP, Zenmap, and Enum4Linux for network scanning and enumeration, and Google hacking for information gathering.In the password attacks section, you will understand the intricacies of password cracking using tools like XHydra and Ncrack, along with creating effective wordlists using Crunch.The subsequent parts of the course will focus on Web Application Attacks and Network Attacks. You'll get to learn about SQL Injection, DNS Spoofing, enabling routing, and using tools like SQLMAP and Ettercap.In the Social Engineering section, we introduce you to the human aspect of cybersecurity, where you will learn how to craft spoofed emails, use the Social Engineering Toolkit (SET), and manage Meterpreter sessions.Towards the end, we delve deeper into working with exploits using tools like Metasploit and Armitage. Here, we explain how to penetrate networks, manage sessions, and fix common issues in these tools.Finally, we discuss remote attacks and port forwarding, where you'll gain practical knowledge about hacking remote systems.This course is designed to give you a hands-on approach to ethical hacking. By the end of this course, you will have a solid understanding of Kali Linux, its tools, and methods used by ethical hackers to protect networks from threats. Embrace the world of ethical hacking with this course and step up your cybersecurity game.Please note: This course is purely educational and should not be misused for any illegal activities.
Overview
Section 1: Introduction
Lecture 1 Course Introduction
Section 2: Setup Your Lab
Lecture 2 Build your lab
Lecture 3 Setting up your virtual lab
Lecture 4 Setting up your workspace
Section 3: Getting Comfortable with Kali Linux
Lecture 5 Penetration Testing Phases
Lecture 6 Kali Linux
Lecture 7 Finding Your Way Around Kali
Lecture 8 Update-Upgrade-Kali-linux
Lecture 9 Find, Locate
Section 4: Managing Kali Linux Services
Lecture 10 HTTP Service
Lecture 11 SSH Service
Section 5: Essential Tools
Lecture 12 Netcat
Lecture 13 Grabbing the banner
Lecture 14 Transferring Files using Netcat
Lecture 15 Remote Administration using Netcat
Lecture 16 WireShark
Lecture 17 Analysis WireShark traffic in a simple way
Lecture 18 Another WireShark Example
Section 6: Passive Information Gathering
Lecture 19 Gather Passive Information
Lecture 20 Easy way to get critical information
Lecture 21 Passive Information 1
Lecture 22 Gathering Personal Information
Lecture 23 Maltego
Lecture 24 Using Maltego
Lecture 25 Related Entities in Maltego
Lecture 26 More Maltego
Lecture 27 Google Hacking
Lecture 28 Google Search Operator
Section 7: Active Information Gathering
Lecture 29 NMAP
Lecture 30 Sweeping the network
Lecture 31 Get more details about the victim
Lecture 32 NMAP NSE Scripts
Lecture 33 Zenmap
Lecture 34 SMB Enumeration
Lecture 35 SMB Null Session
Lecture 36 DNS Enumeration
Lecture 37 DNS Zone Transfer
Lecture 38 Enum4Linux
Section 8: Password Attacks
Lecture 39 Password attack
Lecture 40 XHydra
Lecture 41 SSH Cracking
Lecture 42 Ncrack
Lecture 43 Ncrack Different OS
Lecture 44 Use The right Wordlist
Lecture 45 Crunch
Lecture 46 The Most amazing and effective Wordlist
Lecture 47 Final Word about Password attack
Section 9: Web Application Attacks
Lecture 48 SQL Injection Introduction
Lecture 49 What is SQL Injection
Lecture 50 Setup your web application lab
Lecture 51 Is The site infected with SQLI
Lecture 52 The Amazing SQLMAP
Lecture 53 Live Example
Section 10: Network Attacks
Lecture 54 Introduction to Network Attacks
Lecture 55 Enable Routing
Lecture 56 MITM Attack Using Ettercap
Lecture 57 Start Xplico
Lecture 58 Ettercap and Xplico attack
Lecture 59 WireShark and Xplico
Lecture 60 DNS Spoofing
Lecture 61 DNS Spoofing attack
Section 11: Social Engineering
Lecture 62 Social Engineering Introduction
Lecture 63 Spoofed Email
Lecture 64 Social Engineering Toolkit
Lecture 65 Fixing Set
Lecture 66 Credential Harvest
Lecture 67 Another-SET-Attack-1
Lecture 68 Another-SET-Attack-2
Lecture 69 Meterpreter Sessions
Section 12: Working with Exploit
Lecture 70 Working with exploit
Lecture 71 Metasploit
Lecture 72 Using Meterpreter session
Lecture 73 Armitage
Lecture 74 Fixing armitage
Lecture 75 Armitage in Action
Lecture 76 Different Armitage usage
Lecture 77 Armitage Example 2
Lecture 78 Network Penetration using Armitage
Section 13: Remote Attacks
Lecture 79 Port Forwarding
Lecture 80 Hacking Remotely Demonstration
Section 14: Course Materials
Lecture 81 Kali Linux Lab
Lecture 82 How to setup your virtual lab
Anyone interested in learning how to protect systems and networks from cyber threats.