Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Real-World Ethical Hacking Hands-on Cybersecurity
1. Real-World Ethical Hacking 1 Hacking Windows!
1. Introduction (1:05)
2. Overview What is Ethical Hacking (11:21)
3. Hacking Windows (2:15)
4. The Sticky Keys Hack (2:38)
5. Burning a Legal Windows 10 Install Disc (4:01)
6. The Sticky Keys Hack First Reboot and Exploit (7:14)
7. The Hack (cont.) Second Reboot and Compromise (4:36)
8. Hack Finale Logging in as Administrator! (6:55)
9. Review (4:17)
10. BONUS Mac Root Hack! (8:40)
Mac-Hack
Windows-Sticky-Keys-Hack
2. Create Your Own Virtual Hacking Lab!
1. Virtual Lab Intro and VirtualBox Installation (5:13)
2. Building a Kali Linux Virtual Machine (6:37)
3. Create a Windows 10 VM (7:44)
4. Create an Android PhoneTablet VM for Mobile Hacking! (10:42)
5. The Ultimately Hackable Metasploitable! (5:46)
3. Important Linux and Windows Terminal Commands
1. Intro to Command-Line Linux and Windows (1:34)
2. Basic Linux Commands (7:43)
3. Command-Line Linux File Magic! (6:10)
4. More Helpful Linux Commands (7:06)
5. BONUS Fun Linux Terminal Commands (Optional) (11:30)
6. Basic Command-Line Commands for Windows (5:04)
7. Windows File Commands (5:05)
8. Advanced Windows Command-Line Commands (5:04)
9. Command-Line Review for Linux and Windows (5:07)
Real-World-Linux-and-Windows-Commands
4. Create a Virtual Network for Ethical Hacking!
2. Creating the Private, Host-Only 10.0.3.x Network (6:49)
1. Virtual Networking in VirtualBox (3:58)
3. Connecting Your VMs to the Host-Only Network (9:52)
4. Creating and Using a Public NAT Network in VBox (7:37)
5. Updating Kali and Windows VMs (7:05)
5. Social Engineering Capturing Usernames and Passwords via Phishing
1. Intro to Social Engineering (7:57)
2. The Social Engineer's Toolkit in Kali Linux (4:37)
3. Cloning Facebook and Harvesting User Passwords (9:58)
4. Intro to Spear-Phishing (6:20)
5. Advanced IP Address Masking Hiding Your Real URL (8:21)
6. Crafting the Perfect Spear-Phishing Email (7:54)
7. Capturing the User's Login and Password in Kali (7:51)
8. BONUS Cloning Twitter - Easy as 1-2-3-2! (3:22)
9. Review Social Engineering Techniques (7:26)
10. Stopping Phishing at Work and at Home (8:59)
6. Recon Information Gathering, Scanning and Enumeration
1. Information Gathering Passive vs. Active Reconnaissance (3:44)
2. OSINT (Open-Source INTelligence) Framework Domain Dossier (4:59)
3. theHarvester How hackers find users and email information for phishing (10:24)
4. Recon-ng Enumeration of servershosts with Recon-ng (5:59)
5. nmap Active Scanning with nmap (10:09)
6. Legion Active network and vulnerability scanning with LEGION GUI (10:20)
7. Remote Hacking Win10 Attack Phase
2. Intro to Metasploit The Hacker's Swiss Army Knife (3:55)
1. Hacking Win10 The Attack Phase (4:02)
3. Creating Your Own Virus with Metasploit (7:20)
4. Sharing the Malware over the Web (4:16)
5. Prep Win10 for Hacking USB, WebCam, Firewall and Antivirus (6:28)
6. Infecting Your Windows 10 VM with the Virus (8:09)
8. Hacking Win10 Command & Control Phase
1. Attack Phase RecapReconnecting in Meterpreter (7:10)
2. Intro to Meterpreter Your Remote Attack Shell! (5:43)
3. Viewing, Downloading and Uploading Files with Meterpreter (5:19)
4. Stealing Screenshots, Keystrokes, and ,Webcams (10:23)
5. How Attackers Steal Windows 10 Passwords Privilege Escalation (13:26)
6. Defending Yourself from Malware Attacks (8:31)
9. BONUS Section Car Hacking in Kali Linux!
2. Update Installing can-utils and ICSim on Kali 2020 and newer (7:51)
1. Intro to Car Hacking! (4:41)
3. Running the Car Dashboard Simulator ICSim (8:02)
4. Capturing CAN Traffic with CanSniffer (5:56)
5. The Replay Attack Replaying CAN Packets with CANplayer (7:19)
6. Car Hacking Review (7:52)
7. BONUS Reverse Engineering the CAN Bus (13:52)
8. BONUS Hacking the Car Hacking Software, to 1000 mph! (11:34)
9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017 (9:44)
10. BONUS Hacking Windows 7 with Metasploit!
1. Intro to Hacking a Real Win7 Box (4:16)
2. Intro to Metasploit (4:01)
3. Setting up Guest Additions in VirtualBox (6:46)
4. Creating an Exploit Payload with Metasploit (6:15)
5. Sharing the Exploit over the Web (4:42)
6. Running the Exploit to Hack Windows 7 (4:34)
7. Intro to Meterpreter Your Remote Attack Shell! (3:06)
8. Privilege Escalation Gaining Root Access and Dumping Password Hashes (9:05)
9. Metasploit & Meterpreter Review (4:30)
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking
2. Hijacking Stored Passwords from Chrome and Firefox (8:15)
1. Six Problems with Passwords (4:31)
3. Sniffing the Network Installing Wireshark (6:53)
4. Sniffing Unencrypted Passwords with Wireshark (7:58)
5. Cracking Passwords with Kali and Online Tools (9:08)
6. Seven Things You Can Do for Safer Passwords (8:58)
12. Web Hacking - Testing and Securing Web Applications
2. Hands-on Cross-Site Scripting (XSS) Attacks That Work! (8:21)
1. Intro to Web Hacking (3:54)
3. SQL (Structured Query Language) Injection Messing with Databases (4:07)
4. Advanced SQLi Attacks (6:01)
5. Securing Web Applications from XSS, SQLi and More (5:56)
13. Mobile Hacking on Android
2. Creating the Meterpreter Payload for Android (6:24)
1. Intro to Hacking Android with Metasploit (1:50)
3. Exploiting Android from Kali Linux using Meterpreter (6:07)
4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files (8:12)
14. Bonus Videos National Cyber Warrior Academy, Interviews and More
2. NCWA 2016 (1:21)
1. Bonus videos from the National Cyber Warrior Academy (1:08)
3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming (19:53)
4. WDUN Radio Interview July 2017 on Cybersecurity Jobs and NCWA (7:57)
5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy (15:17)
Teach online with
6. Legion Active network and vulnerability scanning with LEGION GUI
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock