Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Kali Linux Red Team Mastery: Hack Like a Pro
1 - Introduction
1 - What is Ethical Hacking (3:05)
3 - Why Kali Linux (2:54)
2 - Getting Started with Kali Linux
4 - Booting Up Kali Linux (5:23)
5 - The Linux Filesystem (10:50)
6 - Basic Linux Commands (12:58)
7 - Managing Kali Linux Services (8:20)
8 - Searching Installing and Removing Tools (7:04)
3 - Kali Linux Command Line CLI
9 - Environment Variables (7:38)
10 - Bash History Command (1:56)
11 - Piping and Redirection (11:43)
12 - Text Searching and Manipulation (7:49)
13 - Editing Files (2:21)
14 - Comparing Files (2:43)
15 - Managing Processes (3:30)
16 - File and Command Monitoring (3:23)
17 - Downloading Files (1:07)
18 - Customizing the Bash Environment (2:32)
4 - Netcat nc Essentials
19 - Netcat nc (7:17)
5 - Wireshark
20 - What is Wireshark and why should you learn it (1:58)
22 - OSI model (5:07)
23 - Install Wireshark (1:43)
24 - WireShark Getting Started (1:53)
25 - Sets a conversation filter between two specific IP addresses (2:13)
26 - Sets a filter to display all http and dns protocols (2:17)
27 - Sets filters for any TCP packet with a specific source or destination port (1:55)
28 - displays all TCP packets that contain a certain term (1:35)
29 - filters all HTTP GET and POST requests (1:25)
30 - filter out certain types of protocols (2:11)
33 - Capture Insecure Connections Net Cat (1:45)
34 - Capture FTP Passwords (2:47)
35 - Extract files from FTP using Wireshark (2:48)
36 - Capture HTTP Passwords (1:58)
37 - Capture files images from HTTP traffic (2:10)
6 - Bash Scripting Shell Scripting
38 - Our First Bash Script (2:10)
39 - Variables (7:23)
40 - If Else Elif Statements (6:00)
41 - Loops (4:10)
42 - Functions (0:45)
7 - Passive Information Gathering Techniques
44 - Whois Enumeration (1:34)
45 - Google Hacking (1:49)
46 - Netcraft (1:19)
47 - Shodan (1:28)
48 - Security Headers Scanner (1:07)
49 - Email Harvesting (2:04)
50 - Information Gathering Frameworks (1:42)
8 - Active Information Gathering Techniques
52 - DNS Enumeration (8:41)
9 - Scanning with Nmap
53 - Port Scanners Essentials (5:19)
54 - What is Nmap (1:01)
55 - Preparing the Environment (12:14)
63 - Basic Nmap Scan against IP or host Hands On (1:37)
64 - Nmap Ping Scan Hands On (1:13)
65 - Scan specific ports or scan entire port ranges Hands On (1:48)
66 - Scan multiple IP addresses Hands On (0:59)
67 - Scan the most popular ports Hands On (0:46)
68 - Scan hosts and IP addresses reading from a text file Hands On (1:40)
69 - Save your Nmap scan results to a file Hands On (1:06)
70 - Disabling DNS name resolution Hands On (0:52)
71 - Scan OS and service detection with fast execution Hands On (1:06)
72 - Detect servicedaemon versions Hands On (0:41)
73 - Scan using TCP or UDP protocols Hands On (0:44)
76 - CVE detection using Nmap Hands On (2:41)
77 - Launching DOS with Nmap Hands On (2:11)
78 - Launching brute force attacks Hands On (1:27)
79 - Detecting malware infections on remote hosts Hands On (2:29)
10 - Web Application Attacks
81 - Web Application Assessment Tools DIRB (1:16)
82 - Web Application Assessment Tools Burp Suite (4:18)
83 - Web Application Assessment Tools Nikto (1:02)
11 - The Metasploit Framework Essentials
86 - Metasploit User Interfaces and Setup (1:05)
87 - Getting Familiar with MSF Syntax (3:41)
88 - Metasploit Database Access (5:40)
89 - Auxiliary Modules (2:40)
90 - Metasploit Payloads Meterpreter Payloads (2:18)
12 - HandsOn Practice Lab 1
92 - Setup the Environment (2:52)
93 - HandsOn Practice Lab 1 Walkthrough (19:54)
13 - HandsOn Practice Lab 2
95 - Setup the Environment (1:32)
96 - HandsOn Practice Lab 2 Walkthrough (17:08)
14 - HandsOn Practice Lab 3
98 - Setup the Environment (1:41)
99 - HandsOn Practice Lab 3 Walkthrough (20:33)
Teach online with
24 - WireShark Getting Started
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock