Ethical hacking and Penetration testing course by whitesec cyber security consultancy pvt ltd.
0:00 introduction must watch
0:21 cybersecurity (common cyber threats)
5:19 setting up a Attacker machine
11:21 setting up victim machine
16:19 kali Linux Terminal
31:23 File Permissions in kali linux
51:34 Users and groups in linux
57:38 passwd and shadow file in linux
1:06:45 Man tool in linux
1:09:51 installing packages and scripts in linux
1:19:29 Networking for hackers - Must watch
1:22:28 What is ip
1:26:58 what is static ip address
1:32:50 what is dynamic ip address and dhcp
1:36:21 what is a public ip
1:40:46 what is a private ip
1:44:49 Difference between public and private ip
1:51:27 Hacker point of view
2:02:56 ipv4 and its features
2:11:41 ipv6 and its features
2:16:17 Tcp and udp (protocols)
2:22:03 About well know, registered, dynamic ports
2:28:05 what is mac address
2:38:27 difference between mac address and ip address
2:41:52 Programming languages for hackers
2:45:40 analyze network using Wireshark
2:54:53 setting up lab for web hacking
2:59:20 How to Perform google Hacking
3:38:06 OWASP top 10 web
3:41:06 setting up burpsuit
3:48:08 HTTP response status codes
3:52:25 Creating wordlist by scrapping website
4:01:37 Creating wordlist according to target user
4:09:14 Phases of hacking
4:20:49 what is html injection
4:25:48 impact of html injection
4:27:43 Html injection (reflected and stored)
4:44:43 what is command injection
4:50:09 impact and consequences of command injection vulnerability
4:53:08 command injection(practical)
4:57:38 what is xss and how does it work
5:02:07 what is the impact of xss
5:03:54 xss attack(practical
5:10:38 what is csrf and how its work
5:14:22 csrf - get and post requests
5:17:38 what is the impact of csrf
5:18:38 csrf attack (practical)
5:25:20 what is broken authentication and session management and examples
5:31:53 impact of broken authentication and session management
5:37:12 what is sql injection
5:39:17 impact of sql injection
5:41:38 sql injection (Practical)
5:48:46 Vulnerability scanning - lab setup
5:51:30 Scanning using nmap
6:01:58 scanning using zenmap
6:06:42 scanning using nikto
6:10:06 Exploiting Ftp
6:14:30 Exploiting ssh
6:19:39 Exploiting telnet, smtp, PostgreSQL, javarmi, proftpd
6:21:25 Penetration testing
6:21:55 setup Lab
6:22:55 Scanning
6:36:20 User Enumeration
6:44:10 Bruteforce Attack
6:51:02 Gaining shell access
6:55:45 Privilege escalation from web to User
7:03:17 Privilege escalation to root
7:09:34 Introduction to wifi hacking
7:10:36 Learning About wep Network
7:14:43 Learning About wpa wpa2 Network
7:21:38 Downloading vmware and installing kali linux
7:26:38 Choosing a wifi adapter for hacking
7:31:04 What is Monitor and Managed Mode (Theory)
7:38:47 How to Change your wifi adapter to monitor mode
7:47:22 Wps Attacks
7:53:45 Wps vulnerabilities and types of wps attacks
7:58:19 wps bruteforce Attacks
8:01:14 Wps - Pixie Dust Attacks
8:02:31 Conditions to Hack wpa2 Network
8:08:38 wifi hacking tool
8:23:39 Scanning wps wep wpa Networks
8:32:35 Hacking wep wps wpa wpa2 Network
8:38:02 How to Perform dictionary Attack
8:45:13 WPS Bruteforce Attack Using Reaver
8:52:10 Hacking Wps Network using Wpa wps Network
8:54:13 What is deauthentication attack
8:58:24 How to Perform deauthentication Attack and Capturing Handshake file
9:10:32 Cracking Handshake file
9:14:02 Jamming Wifi Networks using mdk3
9:18:17 Wifi Hacking for Red teamers and pentesters
9:22:26 Red Team Analyst Training
9:29:46 what is buffer overflow
9:33:26 basics of buffer overflow(EAX EDX EBP ESP EIP stack)
9:41:53 risks of buffer overflow
9:43:39 what is fuzzing and offset
9:45:46 what are bad characters
9:50:35 setup a lab for practice
9:52:23 Scanning machine
9:59:59 setting up immunity Debugger and Mona.py
10:03:47 crashing a software
10:15:35 immunity debugger (EIP)
10:27:06 Exploit development and Fuzzing
10:32:15 offset - unique characters
10:39:38 offset - controlling EIP
10:47:25 finding bad characters
10:54:14 return address
11:00:44 pointing to EIP
11:06:35 Generating a shell
11:12:26 Gaining Access to windows
11:19:20 Gaining Access to linux
Udemy - https://www.udemy.com/user/whitesec-23/
telegram channel for free tutorials - https://t.me/whiteseconlinecybersecur...
Disclaimer -
This video is made available for educational and informational purposes only.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. whitesec cybersecurity is not responsible for any misuse of the provided information.
join our Red team training - contact us WhatsApp
https://wa.me/918019263448?text=Hello
our website - https://trainings.whitesec.org
advance android training -
https://wa.me/918019263448
website - https://trainings.whitesec.org/adv
#cybersecurity