-
Урок 1.
00:03:42
Introduction and Course Overview
-
Урок 2.
00:01:01
Frequently Asked Questions Guide
-
Урок 3.
00:16:50
A Day in the Life of an Ethical Hacker
-
Урок 4.
00:06:40
Part 1: Effective Note Keeping
-
Урок 5.
00:05:21
Part 2: Important Tools
-
Урок 6.
00:01:12
Introduction
-
Урок 7.
00:13:07
IP Addresses
-
Урок 8.
00:03:14
MAC Addresses
-
Урок 9.
00:05:13
TCP, UDP, and the Three-Way Handshake
-
Урок 10.
00:06:11
Common Ports and Protocols
-
Урок 11.
00:05:31
The OSI Model
-
Урок 12.
00:27:00
Subnetting: Part 1 - Methodology
-
Урок 13.
00:04:14
Subnetting: Part 2 - Hands-On Challenge
-
Урок 14.
00:06:16
Installing VMWare / Virtualbox
-
Урок 15.
00:01:34
Linux Image Repository (UPDATE)
-
Урок 16.
00:05:41
Installing Kali Linux
-
Урок 17.
00:05:21
Exploring Kali Linux
-
Урок 18.
00:12:00
Navigating the File System
-
Урок 19.
00:09:24
Users and Privileges
-
Урок 20.
00:05:53
Common Network Commands
-
Урок 21.
00:06:00
Viewing, Creating, and Editing Files
-
Урок 22.
00:07:57
Starting and Stopping Kali Services
-
Урок 23.
00:07:05
Installing and Updating Tools
-
Урок 24.
00:20:39
Scripting with Bash
-
Урок 25.
00:02:20
Introduction
-
Урок 26.
00:07:29
Strings
-
Урок 27.
00:05:55
Math
-
Урок 28.
00:11:13
Variables & Methods
-
Урок 29.
00:10:55
Functions
-
Урок 30.
00:04:30
Boolean Expressions
-
Урок 31.
00:06:55
Releational and Boolean Operators
-
Урок 32.
00:08:56
Conditional Statements
-
Урок 33.
00:10:24
Lists
-
Урок 34.
00:02:31
Tuples
-
Урок 35.
00:04:59
Looping
-
Урок 36.
00:06:03
Importing Modules
-
Урок 37.
00:13:20
Advanced Strings
-
Урок 38.
00:07:32
Dictionaries
-
Урок 39.
00:05:29
Sockets
-
Урок 40.
00:20:10
Building a Port Scanner
-
Урок 41.
00:05:17
The Five Stages of Ethical Hacking
-
Урок 42.
00:07:33
Passive Reconnaissance Overview
-
Урок 43.
00:03:34
Identifying Our Target
-
Урок 44.
00:05:16
E-Mail Address Gathering with Hunter.io
-
Урок 45.
00:07:18
Gathering Breached Credentials with Breach-Parse
-
Урок 46.
00:03:39
Utilizing theharvester
-
Урок 47.
00:05:32
Hunting Subdomains - Part 1
-
Урок 48.
00:04:49
Hunting Subdomains - Part 2
-
Урок 49.
00:07:07
Identifying Website Technologies
-
Урок 50.
00:08:49
Information Gathering with Burp Suite
-
Урок 51.
00:05:32
Google Fu
-
Урок 52.
00:05:38
Utilizing Social Media
-
Урок 53.
00:06:38
Installing Kioptrix: Level 1
-
Урок 54.
00:17:02
Scanning with Nmap
-
Урок 55.
00:15:02
Enumerating HTTP/HTTPS - Part 1
-
Урок 56.
00:15:09
Enumerating HTTP/HTTPS - Part 2
-
Урок 57.
00:14:20
Enumerating SMB
-
Урок 58.
00:04:10
Enumerating SSH
-
Урок 59.
00:14:50
Researching Potential Vulnerabilities
-
Урок 60.
00:03:07
Our Notes, so Far
-
Урок 61.
00:06:23
Scanning with Masscan
-
Урок 62.
00:02:55
Scanning with Metasploit
-
Урок 63.
00:10:35
Scanning with Nessus - Part 1
-
Урок 64.
00:06:20
Scanning with Nessus - Part 2
-
Урок 65.
00:07:01
Reverse Shells vs Bind Shells
-
Урок 66.
00:03:22
Staged vs Non-Staged Payloads
-
Урок 67.
00:07:41
Gaining Root with Metasploit
-
Урок 68.
00:12:41
Manual Exploitation
-
Урок 69.
00:07:50
Brute Force Attacks
-
Урок 70.
00:14:03
Password Spraying and Credential Stuffing
-
Урок 71.
00:03:04
Our Notes, Revisited
-
Урок 72.
00:08:03
Introduction
-
Урок 73.
00:34:20
Walkthrough - Legacy
-
Урок 74.
00:29:48
Walkthrough - Lame
-
Урок 75.
00:29:57
Walkthrough - Blue
-
Урок 76.
00:28:43
Walkthrough - Devel
-
Урок 77.
00:34:03
Walkthrough - Jerry
-
Урок 78.
00:31:21
Walkthrough - Nibbles
-
Урок 79.
00:28:31
Walkthrough - Optimum
-
Урок 80.
00:30:17
Walkthrough - Bashed
-
Урок 81.
00:14:32
Walkthrough - Grandpa
-
Урок 82.
00:25:50
Walkthrough - Netmon
-
Урок 83.
00:06:17
Required Installations
-
Урок 84.
00:04:09
Buffer Overflows Explained
-
Урок 85.
00:10:12
Spiking
-
Урок 86.
00:06:10
Fuzzing
-
Урок 87.
00:05:20
Finding the Offset
-
Урок 88.
00:03:25
Overwriting the EIP
-
Урок 89.
00:06:08
Finding Bad Characters
-
Урок 90.
00:08:27
Finding the Right Module
-
Урок 91.
00:05:57
Generating Shellcode and Getting Root
-
Урок 92.
00:05:14
Active Directory Overview
-
Урок 93.
00:05:46
Physical Active Directory Components
-
Урок 94.
00:07:29
Logical Active Directory Components
-
Урок 95.
00:03:03
Lab Overview and Requirements
-
Урок 96.
00:02:48
Downloading Necessary ISOs
-
Урок 97.
00:13:03
Setting Up the Domain Controller
-
Урок 98.
00:07:53
Setting Up the User Machines
-
Урок 99.
00:15:29
Setting Up Users, Groups, and Policies
-
Урок 100.
00:08:49
Joining Our Machines to the Domain
-
Урок 101.
00:03:56
Introduction
-
Урок 102.
00:07:27
LLMNR Poisoning Overview
-
Урок 103.
00:04:47
Capturing NTLMv2 Hashes with Responder
-
Урок 104.
00:11:32
Password Cracking with Hashcat
-
Урок 105.
00:02:49
LLMNR Poisoning Defenses
-
Урок 106.
00:05:24
SMB Relay Attacks Overview
-
Урок 107.
00:00:59
Quick Lab Update
-
Урок 108.
00:03:37
Discovering Hosts with SMB Signing Disabled
-
Урок 109.
00:04:55
SMB Relay Attack Demonstration Part 1
-
Урок 110.
00:04:08
SMB Relay Attack Demonstration Part 2
-
Урок 111.
00:02:34
SMB Relay Attack Defenses
-
Урок 112.
00:07:47
Gaining Shell Access
-
Урок 113.
00:04:01
IPv6 Attacks Overview
-
Урок 114.
00:01:19
Installing mitm6
-
Урок 115.
00:02:25
Setting Up LDAPS
-
Урок 116.
00:07:44
IPv6 DNS Takeover via mitm6
-
Урок 117.
00:03:01
IPv6 Attack Defenses
-
Урок 118.
00:08:44
Other Attack Vectors and Strategies
-
Урок 119.
00:02:02
Introduction
-
Урок 120.
00:02:14
PowerView Overview
-
Урок 121.
00:15:18
Domain Enumeration with PowerView
-
Урок 122.
00:03:33
Bloodhound Overview and Setup
-
Урок 123.
00:03:12
Grabbing Data with Invoke-Bloodhound
-
Урок 124.
00:07:35
Enumerating Domain Data with Bloodhound
-
Урок 125.
00:01:04
Introduction
-
Урок 126.
00:03:05
Pass the Hash / Password Overview
-
Урок 127.
00:00:39
Installing crackmapexec
-
Урок 128.
00:06:21
Pass the Password Attacks
-
Урок 129.
00:03:12
Dumping Hashes with secretsdump.py
-
Урок 130.
00:03:07
Cracking NTLM Hashes with Hashcat
-
Урок 131.
00:05:39
Pass the Hash Attacks
-
Урок 132.
00:02:43
Pass Attack Mitigations
-
Урок 133.
00:03:49
Token Impersonation Overview
-
Урок 134.
00:07:04
Token Impersonation with Incognito
-
Урок 135.
00:02:44
Token Impersonation Mitigation
-
Урок 136.
00:05:12
Kerberoasting Overview
-
Урок 137.
00:03:52
Kerberoasting Walkthrough
-
Урок 138.
00:01:10
Kerberoasting Mitigation
-
Урок 139.
00:03:24
GPP / cPassword Attacks Overview
-
Урок 140.
00:08:48
Abusing GPP: Part 1
-
Урок 141.
00:04:13
Abusing GPP: Part 2
-
Урок 142.
00:05:37
Mimikatz Overview
-
Урок 143.
00:09:21
Credential Dumping with Mimikatz
-
Урок 144.
00:07:19
Golden Ticket Attacks
-
Урок 145.
00:06:25
Conclusion and Additional Resources
-
Урок 146.
00:01:50
Introduction
-
Урок 147.
00:02:33
File Transfers Review
-
Урок 148.
00:03:33
Maintaining Access Overview
-
Урок 149.
00:06:31
Pivoting Lab Setup
-
Урок 150.
00:06:08
Pivoting Walkthrough
-
Урок 151.
00:02:49
Cleaning Up
-
Урок 152.
00:01:50
Introduction
-
Урок 153.
00:03:59
Installing Go
-
Урок 154.
00:07:44
Finding Subdomains with Assetfinder
-
Урок 155.
00:05:28
Finding Subdomains with Amass
-
Урок 156.
00:07:16
Finding Alive Domains with Httprobe
-
Урок 157.
00:03:30
Screenshotting Websites with GoWitness
-
Урок 158.
00:05:47
Automating the Enumeration Process
-
Урок 159.
00:01:37
Introduction
-
Урок 160.
00:10:27
The OWASP Top 10 and OWASP Testing Checklist
-
Урок 161.
00:06:49
Installing OWASP Juice Shop
-
Урок 162.
00:02:14
Installing Foxy Proxy
-
Урок 163.
00:11:29
Exploring Burp Suite
-
Урок 164.
00:02:51
Introducing the Score Board
-
Урок 165.
00:05:14
SQL Injection Attacks Overview
-
Урок 166.
00:10:07
SQL Injection Walkthrough
-
Урок 167.
00:02:50
SQL Injection Defenses
-
Урок 168.
00:05:44
Broken Authentication Overview and Defenses
-
Урок 169.
00:07:40
Testing for Broken Authentication
-
Урок 170.
00:04:54
Sensitive Data Exposure Overview and Defenses
-
Урок 171.
00:08:02
Testing for Sensitive Data Exposure
-
Урок 172.
00:09:55
XML External Entities (XXE) Overview
-
Урок 173.
00:08:04
XXE Attack and Defense
-
Урок 174.
00:03:30
Broken Access Control Overview
-
Урок 175.
00:04:29
Broken Access Control Walkthrough
-
Урок 176.
00:04:59
Security Misconfiguration Attacks and Defenses
-
Урок 177.
00:10:34
Cross-Site Scripting (XSS) Overview
-
Урок 178.
00:06:23
Reflected XSS Walkthrough
-
Урок 179.
00:06:17
Stored XSS Walkthrough
-
Урок 180.
00:03:49
Preventing XSS
-
Урок 181.
00:04:34
Insecure Deserialization
-
Урок 182.
00:04:39
Using Components with Known Vulnerabilities
-
Урок 183.
00:03:13
Insufficient Logging and Monitoring
-
Урок 184.
00:10:27
Wireless Penetration Testing Overview
-
Урок 185.
00:13:14
WPA PSK Exploit Walkthrough
-
Урок 186.
00:07:19
Common Legal Documents
-
Урок 187.
00:11:17
Pentest Report Writing
-
Урок 188.
00:12:33
Reviewing a Real Pentest Report
-
Урок 189.
00:11:11
Career Advice
-
Урок 190.
00:04:38
BONUS LECTURE: Course Discord Channel and Other Author Resources