Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Bug Bounty - Infrastructure Track
Introduction
About the intructor (0:30)
What to expect (1:55)
Techniques and Terms (3:53)
Introduction to Ethical Hacking. Footprinting and Reconnaissance
Introduction to Ethical Hacking. Footprinting and Reconnaissance (24:55)
Demo - Information Gathering using Google Dorks and DNS Queris (4:17)
Demo - Scanning and Enumeration (8:58)
Do it yourself - Information Gathering Exercise
Information Gathering
Information Gathering using websites - part 1 (12:59)
Information Gathering using websites - part 2 (17:17)
Introduction to Maltego (4:58)
Maltego Demo (9:16)
Scanning Networks, Enumeration and Discovering Vulnerabilities
Scanning and enumeration (8:58)
Vulnerabilities Identification (8:28)
Demo - Installing Nessus Scanner (3:31)
Demo - Use Nessus to Discover Vulnerabilities (4:42)
Demo - Using Nikto to discover Web Vulnerabilities (4:42)
Demo - Using Paros for Vulnerability Discovery (4:48)
Demo - Use Dirbuster to brute force sub-directories and filenames (2:50)
Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
Social Engineering Toolkit (SET)
About Social Engineering Toolkit (1:50)
Use SET to get facebook credentials (6:11)
System Hacking and Vulnerability Exploitation
System hacking - vulnerability exploitation (5:58)
Passwords (11:56)
Authentication (6:55)
Metasploit
Metasploit Introduction (17:08)
Demo - Exploiting FTP Server Vulnerability using Metasploit (11:48)
Demo - Post Exploitation Example (1:06)
Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC (10:07)
Demo - Eploiting Samba Service on Linux using Metasploit (3:09)
Do it yourself - Vulnerability Exploitation using Metasploit Exercise
Social Engineering using Metasploit
Backdoor for Windows (14:06)
Android backdoor (6:58)
Trojans, Backdoors, Viruses and Worms
Trojans and Backdoors (5:00)
Computer viruses and worms (9:14)
Cryptography
Cryptography concepts (4:56)
Cryptographic Algorithms (11:09)
Cryptography and cryptanalysis tools. Cryptographic attacks (3:02)
Demo - Hack SSH passwords using Medusa (5:14)
Hack the SSH Password using Hydra (5:05)
Hack Linux Passwords using John the Ripper (3:29)
Do it yourself - Passwords Protection Exercise
Penetration Testing on Wireless Networks
Penetration Testing on Wireless Networks (6:56)
Do it yourself - WiFi Networks Security - practical approach
Case Study – Windows Hosted Network Bug or Feature (10:42)
Sniffing. Attacking Authentication and Session Management - Session Hijacking
Sniffing (15:00)
Theoretical Overview of Attacking Authentication and Session Management
Session Hijacking trough Man In The Middle Attack (11:05)
Intercept and access traffic over HTTPS. Get Gmail and Facebook passwords. (8:56)
Final Words
Countermeasures for Social Engineering (6:48)
Final words (0:15)
About the intructor
1. About Myself.pdf
Complete and Continue