1. Урок 1. 00:03:42
    Introduction and Course Overview
  2. Урок 2. 00:01:01
    Frequently Asked Questions Guide
  3. Урок 3. 00:16:50
    A Day in the Life of an Ethical Hacker
  4. Урок 4. 00:06:40
    Part 1: Effective Note Keeping
  5. Урок 5. 00:05:21
    Part 2: Important Tools
  6. Урок 6. 00:01:12
    Introduction
  7. Урок 7. 00:13:07
    IP Addresses
  8. Урок 8. 00:03:14
    MAC Addresses
  9. Урок 9. 00:05:13
    TCP, UDP, and the Three-Way Handshake
  10. Урок 10. 00:06:11
    Common Ports and Protocols
  11. Урок 11. 00:05:31
    The OSI Model
  12. Урок 12. 00:27:00
    Subnetting: Part 1 - Methodology
  13. Урок 13. 00:04:14
    Subnetting: Part 2 - Hands-On Challenge
  14. Урок 14. 00:06:16
    Installing VMWare / Virtualbox
  15. Урок 15. 00:01:34
    Linux Image Repository (UPDATE)
  16. Урок 16. 00:05:41
    Installing Kali Linux
  17. Урок 17. 00:05:21
    Exploring Kali Linux
  18. Урок 18. 00:12:00
    Navigating the File System
  19. Урок 19. 00:09:24
    Users and Privileges
  20. Урок 20. 00:05:53
    Common Network Commands
  21. Урок 21. 00:06:00
    Viewing, Creating, and Editing Files
  22. Урок 22. 00:07:57
    Starting and Stopping Kali Services
  23. Урок 23. 00:07:05
    Installing and Updating Tools
  24. Урок 24. 00:20:39
    Scripting with Bash
  25. Урок 25. 00:02:20
    Introduction
  26. Урок 26. 00:07:29
    Strings
  27. Урок 27. 00:05:55
    Math
  28. Урок 28. 00:11:13
    Variables & Methods
  29. Урок 29. 00:10:55
    Functions
  30. Урок 30. 00:04:30
    Boolean Expressions
  31. Урок 31. 00:06:55
    Releational and Boolean Operators
  32. Урок 32. 00:08:56
    Conditional Statements
  33. Урок 33. 00:10:24
    Lists
  34. Урок 34. 00:02:31
    Tuples
  35. Урок 35. 00:04:59
    Looping
  36. Урок 36. 00:06:03
    Importing Modules
  37. Урок 37. 00:13:20
    Advanced Strings
  38. Урок 38. 00:07:32
    Dictionaries
  39. Урок 39. 00:05:29
    Sockets
  40. Урок 40. 00:20:10
    Building a Port Scanner
  41. Урок 41. 00:05:17
    The Five Stages of Ethical Hacking
  42. Урок 42. 00:07:33
    Passive Reconnaissance Overview
  43. Урок 43. 00:03:34
    Identifying Our Target
  44. Урок 44. 00:05:16
    E-Mail Address Gathering with Hunter.io
  45. Урок 45. 00:07:18
    Gathering Breached Credentials with Breach-Parse
  46. Урок 46. 00:03:39
    Utilizing theharvester
  47. Урок 47. 00:05:32
    Hunting Subdomains - Part 1
  48. Урок 48. 00:04:49
    Hunting Subdomains - Part 2
  49. Урок 49. 00:07:07
    Identifying Website Technologies
  50. Урок 50. 00:08:49
    Information Gathering with Burp Suite
  51. Урок 51. 00:05:32
    Google Fu
  52. Урок 52. 00:05:38
    Utilizing Social Media
  53. Урок 53. 00:06:38
    Installing Kioptrix: Level 1
  54. Урок 54. 00:17:02
    Scanning with Nmap
  55. Урок 55. 00:15:02
    Enumerating HTTP/HTTPS - Part 1
  56. Урок 56. 00:15:09
    Enumerating HTTP/HTTPS - Part 2
  57. Урок 57. 00:14:20
    Enumerating SMB
  58. Урок 58. 00:04:10
    Enumerating SSH
  59. Урок 59. 00:14:50
    Researching Potential Vulnerabilities
  60. Урок 60. 00:03:07
    Our Notes, so Far
  61. Урок 61. 00:06:23
    Scanning with Masscan
  62. Урок 62. 00:02:55
    Scanning with Metasploit
  63. Урок 63. 00:10:35
    Scanning with Nessus - Part 1
  64. Урок 64. 00:06:20
    Scanning with Nessus - Part 2
  65. Урок 65. 00:07:01
    Reverse Shells vs Bind Shells
  66. Урок 66. 00:03:22
    Staged vs Non-Staged Payloads
  67. Урок 67. 00:07:41
    Gaining Root with Metasploit
  68. Урок 68. 00:12:41
    Manual Exploitation
  69. Урок 69. 00:07:50
    Brute Force Attacks
  70. Урок 70. 00:14:03
    Password Spraying and Credential Stuffing
  71. Урок 71. 00:03:04
    Our Notes, Revisited
  72. Урок 72. 00:08:03
    Introduction
  73. Урок 73. 00:34:20
    Walkthrough - Legacy
  74. Урок 74. 00:29:48
    Walkthrough - Lame
  75. Урок 75. 00:29:57
    Walkthrough - Blue
  76. Урок 76. 00:28:43
    Walkthrough - Devel
  77. Урок 77. 00:34:03
    Walkthrough - Jerry
  78. Урок 78. 00:31:21
    Walkthrough - Nibbles
  79. Урок 79. 00:28:31
    Walkthrough - Optimum
  80. Урок 80. 00:30:17
    Walkthrough - Bashed
  81. Урок 81. 00:14:32
    Walkthrough - Grandpa
  82. Урок 82. 00:25:50
    Walkthrough - Netmon
  83. Урок 83. 00:06:17
    Required Installations
  84. Урок 84. 00:04:09
    Buffer Overflows Explained
  85. Урок 85. 00:10:12
    Spiking
  86. Урок 86. 00:06:10
    Fuzzing
  87. Урок 87. 00:05:20
    Finding the Offset
  88. Урок 88. 00:03:25
    Overwriting the EIP
  89. Урок 89. 00:06:08
    Finding Bad Characters
  90. Урок 90. 00:08:27
    Finding the Right Module
  91. Урок 91. 00:05:57
    Generating Shellcode and Getting Root
  92. Урок 92. 00:05:14
    Active Directory Overview
  93. Урок 93. 00:05:46
    Physical Active Directory Components
  94. Урок 94. 00:07:29
    Logical Active Directory Components
  95. Урок 95. 00:03:03
    Lab Overview and Requirements
  96. Урок 96. 00:02:48
    Downloading Necessary ISOs
  97. Урок 97. 00:13:03
    Setting Up the Domain Controller
  98. Урок 98. 00:07:53
    Setting Up the User Machines
  99. Урок 99. 00:15:29
    Setting Up Users, Groups, and Policies
  100. Урок 100. 00:08:49
    Joining Our Machines to the Domain
  101. Урок 101. 00:03:56
    Introduction
  102. Урок 102. 00:07:27
    LLMNR Poisoning Overview
  103. Урок 103. 00:04:47
    Capturing NTLMv2 Hashes with Responder
  104. Урок 104. 00:11:32
    Password Cracking with Hashcat
  105. Урок 105. 00:02:49
    LLMNR Poisoning Defenses
  106. Урок 106. 00:05:24
    SMB Relay Attacks Overview
  107. Урок 107. 00:00:59
    Quick Lab Update
  108. Урок 108. 00:03:37
    Discovering Hosts with SMB Signing Disabled
  109. Урок 109. 00:04:55
    SMB Relay Attack Demonstration Part 1
  110. Урок 110. 00:04:08
    SMB Relay Attack Demonstration Part 2
  111. Урок 111. 00:02:34
    SMB Relay Attack Defenses
  112. Урок 112. 00:07:47
    Gaining Shell Access
  113. Урок 113. 00:04:01
    IPv6 Attacks Overview
  114. Урок 114. 00:01:19
    Installing mitm6
  115. Урок 115. 00:02:25
    Setting Up LDAPS
  116. Урок 116. 00:07:44
    IPv6 DNS Takeover via mitm6
  117. Урок 117. 00:03:01
    IPv6 Attack Defenses
  118. Урок 118. 00:08:44
    Other Attack Vectors and Strategies
  119. Урок 119. 00:02:02
    Introduction
  120. Урок 120. 00:02:14
    PowerView Overview
  121. Урок 121. 00:15:18
    Domain Enumeration with PowerView
  122. Урок 122. 00:03:33
    Bloodhound Overview and Setup
  123. Урок 123. 00:03:12
    Grabbing Data with Invoke-Bloodhound
  124. Урок 124. 00:07:35
    Enumerating Domain Data with Bloodhound
  125. Урок 125. 00:01:04
    Introduction
  126. Урок 126. 00:03:05
    Pass the Hash / Password Overview
  127. Урок 127. 00:00:39
    Installing crackmapexec
  128. Урок 128. 00:06:21
    Pass the Password Attacks
  129. Урок 129. 00:03:12
    Dumping Hashes with secretsdump.py
  130. Урок 130. 00:03:07
    Cracking NTLM Hashes with Hashcat
  131. Урок 131. 00:05:39
    Pass the Hash Attacks
  132. Урок 132. 00:02:43
    Pass Attack Mitigations
  133. Урок 133. 00:03:49
    Token Impersonation Overview
  134. Урок 134. 00:07:04
    Token Impersonation with Incognito
  135. Урок 135. 00:02:44
    Token Impersonation Mitigation
  136. Урок 136. 00:05:12
    Kerberoasting Overview
  137. Урок 137. 00:03:52
    Kerberoasting Walkthrough
  138. Урок 138. 00:01:10
    Kerberoasting Mitigation
  139. Урок 139. 00:03:24
    GPP / cPassword Attacks Overview
  140. Урок 140. 00:08:48
    Abusing GPP: Part 1
  141. Урок 141. 00:04:13
    Abusing GPP: Part 2
  142. Урок 142. 00:05:37
    Mimikatz Overview
  143. Урок 143. 00:09:21
    Credential Dumping with Mimikatz
  144. Урок 144. 00:07:19
    Golden Ticket Attacks
  145. Урок 145. 00:06:25
    Conclusion and Additional Resources
  146. Урок 146. 00:01:50
    Introduction
  147. Урок 147. 00:02:33
    File Transfers Review
  148. Урок 148. 00:03:33
    Maintaining Access Overview
  149. Урок 149. 00:06:31
    Pivoting Lab Setup
  150. Урок 150. 00:06:08
    Pivoting Walkthrough
  151. Урок 151. 00:02:49
    Cleaning Up
  152. Урок 152. 00:01:50
    Introduction
  153. Урок 153. 00:03:59
    Installing Go
  154. Урок 154. 00:07:44
    Finding Subdomains with Assetfinder
  155. Урок 155. 00:05:28
    Finding Subdomains with Amass
  156. Урок 156. 00:07:16
    Finding Alive Domains with Httprobe
  157. Урок 157. 00:03:30
    Screenshotting Websites with GoWitness
  158. Урок 158. 00:05:47
    Automating the Enumeration Process
  159. Урок 159. 00:01:37
    Introduction
  160. Урок 160. 00:10:27
    The OWASP Top 10 and OWASP Testing Checklist
  161. Урок 161. 00:06:49
    Installing OWASP Juice Shop
  162. Урок 162. 00:02:14
    Installing Foxy Proxy
  163. Урок 163. 00:11:29
    Exploring Burp Suite
  164. Урок 164. 00:02:51
    Introducing the Score Board
  165. Урок 165. 00:05:14
    SQL Injection Attacks Overview
  166. Урок 166. 00:10:07
    SQL Injection Walkthrough
  167. Урок 167. 00:02:50
    SQL Injection Defenses
  168. Урок 168. 00:05:44
    Broken Authentication Overview and Defenses
  169. Урок 169. 00:07:40
    Testing for Broken Authentication
  170. Урок 170. 00:04:54
    Sensitive Data Exposure Overview and Defenses
  171. Урок 171. 00:08:02
    Testing for Sensitive Data Exposure
  172. Урок 172. 00:09:55
    XML External Entities (XXE) Overview
  173. Урок 173. 00:08:04
    XXE Attack and Defense
  174. Урок 174. 00:03:30
    Broken Access Control Overview
  175. Урок 175. 00:04:29
    Broken Access Control Walkthrough
  176. Урок 176. 00:04:59
    Security Misconfiguration Attacks and Defenses
  177. Урок 177. 00:10:34
    Cross-Site Scripting (XSS) Overview
  178. Урок 178. 00:06:23
    Reflected XSS Walkthrough
  179. Урок 179. 00:06:17
    Stored XSS Walkthrough
  180. Урок 180. 00:03:49
    Preventing XSS
  181. Урок 181. 00:04:34
    Insecure Deserialization
  182. Урок 182. 00:04:39
    Using Components with Known Vulnerabilities
  183. Урок 183. 00:03:13
    Insufficient Logging and Monitoring
  184. Урок 184. 00:10:27
    Wireless Penetration Testing Overview
  185. Урок 185. 00:13:14
    WPA PSK Exploit Walkthrough
  186. Урок 186. 00:07:19
    Common Legal Documents
  187. Урок 187. 00:11:17
    Pentest Report Writing
  188. Урок 188. 00:12:33
    Reviewing a Real Pentest Report
  189. Урок 189. 00:11:11
    Career Advice
  190. Урок 190. 00:04:38
    BONUS LECTURE: Course Discord Channel and Other Author Resources