Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction
- Hunting Subdomains Part 1
- Hunting Subdomains Part 2
- Identifying Website Technologies
- Gathering Information w/ Burp Suite
- Google Fu
- Utilizing Social Media
- Installing Kioptrix
- Scanning w/ Nmap
- Enumerating HTTP/HTTPS Part 1
- Enumerating HTTP/HTTPS Part 2
- Enumerating SMB
- Enumerating SSH
- Researching Potential Vulnerabilities
- Our Notes So Far
- Scanning w/ Nessus Part 1
- Scanning w/ Nessus Part 2
- Reverse Shells vs Bind Shells
- Staged vs Non-Staged Payloads
- Gaining Root w/ Metasploit
- Manual Exploitation
- Brute Force Attacks
- Credential Stuffing & Password Spraying
- Our Notes, Revisited
- Downloading Our Materials
- Buffer Overflows Explained
- Spiking
- Fuzzing
- Finding the Offset
- Overwriting the EIP
- Finding Bad Characters
- Finding the Right Module
- Generating Shellcode and Gaining Root
- Python3 and More
- Capstone Introduction
- Setting up Blue
- Blue Walkthrough
- Academy Setup
- Academy Walkthrough
- Dev Walkthrough
- Butler Walkthrough
- Blackpearl Walkthrough
- Conclusion
Taught by
The Cyber Mentor
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX