Module 1 Introduction to Ethical Hacking
Information Security Threats and Attack Vectors05:55
Hacking Concepts05:19
Ethical Hacking Concepts03:02
Information Security Controls — part 108:23
Information Security Controls — part 208:36
Penetration Testing Concepts06:06
Information Security Laws and Standards00:00
Module 2 – Footprinting and Reconnaissance
Footprinting through Search Engines12:05
Footprinting through Web Services12:09
Footprinting through Social Networking Sites02:59
Website Footprinting14:17
Email Footprinting04:27
Competitive Intelligence05:43
Whois Footprinting04:36
DNS Footprinting03:04
Network Footprinting06:01
Footprinting through Social Engineering02:02
Footprinting Tools07:27
Footprinting Countermeasures02:01
Footprinting Penetration Testing04:51
lab1 – Open Source Information Gathering Using Windows Command Line Utilities05:34
lab 2 – Collecting Information About a Target Website Using Firebug06:01
lab 3 – Mirroring Website Using HTTrack Web Site Copier05:31
lab 4 – Advanced Network Route Tracing Using Path Analyzer Pro05:23
lab 5 – Information Gathering Using Metasploit10:38
Module 3 – Scanning Networks
Network Scanning Concepts06:15
Scanning Tools10:21
Scanning Techniques part 110:21
Scanning Techniques part 205:04
Scanning Beyond IDS and Firewall part 109:12
Scanning Beyond IDS and Firewall part 204:02
Banner Grabbing04:55
Draw Network Diagrams02:07
Scanning Pen Testing02:46
lab 1 – UDP and TCP Packet Crafting Techniques using HPING306:40
lab 2 – Scanning The Network Using The Colasoft Packet Builder04:05
lab 3 – Basic Network Troubleshooting Using MegaPing04:19
lab 4 – Understanding Network Scanning Using Nmap06:54
lab 5 – Exploring Various Network Scanning Techniques06:33
lab 6 – Scanning a Network Using NetScan Tools Pro06:37
lab 7 – Avoiding Scanning Detection using Multiple Decoy IP Addresses04:24
lab 8 – Drawing Network Diagrams Using Network Topology Mapper08:09
lab 9 – Checking for Live Systems Using Angry IP Scanner04:05
lab 10 – Scanning for Network Traffic Going Through a Computer’s Adapter Using IP-Tools05:22
lab 11 – Identify Target System OS with TTL and TCP Window Sizes using Wireshark03:42
Module 4 – Enumeration
Enumeration Concepts02:55
NetBIOS Enumeration06:16
SNMP Enumeration05:46
LDAP Enumeration02:26
NTP Enumeration03:45
SMTP and DNS Enumeration04:22
Other Enumeration Techniques03:48
Enumeration Countermeasures02:50
Enumeration Pen Testing03:29
lab 1 – NetBIOS Enumeration Using Global Network Inventory06:40
lab 2 – Enumerating Network Resources Using Advanced IP Scanner04:45
lab 3 – Performing Network Enumeration Using SuperScan03:57
lab 4 – Enumerating Resources in a Local Machine Using Hyena03:01
lab 5 – Performing Network Enumeration Using NetBIOS Enumerator02:36
lab 6 – Enumerating a Network Using SoftPerfect Network Scanner03:25
lab 7 – Enumerating a Target Network using Nmap and Net Use06:30
lab 8 – Enumerating Services on a Target Machine05:35
lab 9 – SNMP Enumeration Using snmp_enum06:17
lab 10 – LDAP Enumeration Using Active Directory Explorer (ADExplorer)03:34
lab 11 – Enumerating information from Windows and Samba host using Enum4linux04:11
Module 5 – Vulnerability Analysis
Vulnerability Assessment Concepts04:54
Vulnerability Assessment Solutions05:46
Vulnerability Scoring Systems02:13
Vulnerability Assessment Tools03:30
Vulnerability Assessment Reports00:55
lab1 – Vulnerability Analysis Using Nessus11:22
lab2 – CGI Scanning with Nikto03:44
Module 6 – System Hacking
System Hacking Concepts01:57
Cracking Passwords part 105:36
Cracking Passwords part 205:46
Cracking Passwords part 308:03
Escalating Privileges09:05
Executing Applications09:40
Hiding Files part 108:55
Hiding Files part 206:12
Hiding Files part 306:44
Covering Tracks07:03
Penetration Testing04:16
lab1 – Dumping and Cracking SAM Hashes to Extract Plaintext Passwords09:42
lab2 – Creating and Using Rainbow Tables04:43
lab3 – Auditing System Passwords Using L0phtCrack05:06
lab4 – Exploiting Client Side Vulnerabilities and Establishing a VNC Session08:37
lab5 – Escalating Privileges by Exploiting Client Side Vulnerabilities13:57
lab6 – Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpreter13:50
lab7 – User System Monitoring and Surveillance Using Spytech SpyAgent08:59
lab8 – Web Activity Monitoring and Recording using Power Spy04:53
lab9 – Hiding Files Using NTFS Streams06:27
lab10 – Hiding Data Using White Space Steganography04:57
lab11 – Image Steganography Using OpenStego06:04
lab12 – Image Steganography Using Quick Stego05:22
lab13 – Viewing, Enabling, and Clearing Audit Policies Using Auditpol03:45
lab14 – Hacking Windows Server 2012 with a Malicious Office Document Using TheFatRat04:10
lab15 – Active Online Attack using Responder12:13
Module 7 – Malware Threats
Malware Concepts03:46
Trojan Concepts part 107:46
Trojan Concepts part 207:10
Trojan Concepts part 305:46
Virus and Worm Concepts part 105:54
Virus and Worm Concepts part 206:48
Virus and Worm Concepts part 302:59
Malware Analysis part 107:12
Malware Analysis part 208:17
Malware Analysis part 305:59
Countermeasures02:37
Anti-Malware Software01:12
Malware Penetration Testing01:59
Module 8 – Sniffing
Sniffing Concepts06:40
Sniffing Techniques part 107:40
Sniffing Techniques part 207:11
Sniffing Techniques part 304:04
Sniffing tools03:46
Countermeasures02:08
Sniffing Detection Techniques02:43
Sniffing Pen Testing01:44
lab1 – Sniffing Passwords using Wireshark14:18
lab2 – Analyzing a Network Using Capsa Network Analyzer08:27
lab3 – Spoofing MAC Address Using SMAC06:24
lab4 – Performing Man-in-the-Middle Attack using Cain & Abel08:26
lab5 – Detecting ARP Poisoning in a Switch Based Network08:26
lab6 – Detecting ARP Attacks with XArp Tool|| lab duration05:26
Module 9 – Social Engineering
Social Engineering Concepts02:11
Social Engineering Techniques09:04
Insider Threats02:15
Impersonation on Social Networking Sites01:10
Identity Theft02:09
Countermeasures03:51
Social Engineering Pen Testing03:20
lab1 – Sniffing Website Credentials Using Social Engineering Toolkit (SET)06:49
Module 10 – Denail-Of-Service
DOS/DDoS Concepts01:15
DOS/DDOS Attack Techniques06:33
Botnets03:04
DDoS Case Study02:08
DoS/DDOS Attack Tools01:21
Countermeasures05:35
DoS/DDoS Protection Tools00:49
DoS/DDoS Penetration Testing01:08
lab1 – SYN Flooding a Target Host Using Metasploit11:23
lab2 – SYN Flooding a Target Host Using hping305:35
lab3 – Performing Distributed Denial of Service Attack Using HOIC10:12
Module 11 – Session Hijacking
Session Hijacking Concepts02:54
Application Level Session Hijacking05:52
Network Level Session Hijacking03:50
Session Hijacking Tools00:31
Countermeasures02:53
Penetration Testing01:21
lab1 – Session Hijacking Using the Zed Attack Proxy (ZAP)11:37
Module 12 – Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts part 107:29
IDS, Firewall and Honeypot Concepts part 200:00
IDS, Firewall and Honeypot Solutions05:00
Evading IDS07:09
Evading Firewalls07:33
IDS/Firewall Evading Tools00:52
Detecting Honeypots03:29
IDS/Firewall Evasion Countermeasures02:06
Penetration Testing03:08
lab1 – Detecting Intrusions Using Snort32:19
lab2 – Detecting Malicious Network Traffic Using HoneyBOT07:45
lab3 – Bypassing Windows Firewall Using Nmap Evasion Techniques06:52
Module 13 – Hacking Web Servers
Web Server Concepts04:04
Web Server Attacks08:02
Web Server Attack Methodology06:30
Web Server Attack Tools01:25
Countermeasures06:11
Patch Management02:43
Web Server Security Tools01:29
Web Server Pen Testing01:12
lab1 – Performing Web Server Reconnaissance using Skipfish06:39
lab 2 – Footprinting a Web Server Using the httprecon Tool04:40
lab3 – Footprinting a Web Server Using ID Serve02:30
lab4 – Cracking FTP Credentials Using Dictionary Attack07:02
lab5 – Uniscan Web Server Fingerprinting in Kali Linux07:05
Module 14 – Hacking Web Applications
00:00
00:00
00:00
00:00
00:00
00:00
lab1 – Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications09:37
lab2 – Enumerating and Hacking a Web Application Using WPScan and Metasploit14:28
lab3 – Exploiting Remote Command Execution Vulnerability to Compromise a Target Web Server11:26
lab4 – Auditing Web Application Framework Using Vega06:35
lab5 – Website Vulnerability Scanning Using Acunetix WVS10:44
lab6 – Exploiting File Upload Vulnerability at Different Security Levels11:54
lab7 – Performing Cross-Site Request Forgery (CSRF) Attack13:05
Module 15 – SQL Injection
SQL Injection Concepts07:27
Types of SQL Injection06:15
SQL Injection Methodology part 104:23
SQL Injection Methodology part 208:28
SQL Injection Tools00:43
Evasion Techniques03:53
Countermeasures05:40
lab1 – SQL Injection Attacks on an MS SQL Database14:36
lab2 – Scanning Web Applications Using N-Stalker Tool05:54
lab3 – Performing SQL Injection attack against MSSQL to extract Databases and WebShell using SQLMAP11:23
Module 16 – Hacking Wireless Networks
Wireless Concepts07:41
Wireless Encryption07:45
Wireless Threats07:12
Wireless Hacking Methodology part 105:44
Wireless Hacking Methodology part 203:19
Wireless Hacking Tools02:33
Wireless Hacking Tools03:33
Countermeasures04:44
Wireless Security Tools02:20
Wireless Pen Testing04:48
lab1 – WiFi Packet Analysis using Wireshark04:40
lab2 – Cracking a WEP with Aircrack-ng05:20
lab3 – Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng05:58
Module 17 – Hacking Mobile
Mobile Platform Attack Vectors06:44
Hacking Android OS part 107:44
Hacking Android OS part 204:23
Hacking iOS06:16
Mobile Spyware01:11
Mobile Device Management02:25
Mobile Security Guidelines and Tools03:16
Mobile Pen Testing01:16
lab 115:49
lab 206:37
Module 18 – loT Hacking
loT Concepts04:58
lot Attacks08:41
lot Hacking Methodology07:29
lot Hacking Tools01:26
Countermeasures02:51
lot Pen Testing02:07
Module 19 – Cloud Computing
Cloud Computing Concepts06:58
Cloud Computing Threats06:19
Cloud Computing Attacks06:18
Cloud Security07:38
Cloud Security Tools01:10
Cloud Penetration Testing04:18
lab1 – Creating User Accounts and Assigning User Rights in ownCloud17:11
lab2 – Securing ownCloud from Malicious File uploads using ClamAV04:42
lab3 – Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux11:54
lab4 – Implementing DoS Attack on Linux Cloud Server Using Slowloris Script07:50
Module 20 – Cryptography
Cryptography Concepts01:42
Encryption Algorithms11:04
Cryptography Tools01:15
Public Key Infrastructure (PKI)02:03
Email Encryption01:41
Disk Encryption01:38
Cryptanalysis11:23
Countermeasures01:21
lab1 – Calculating One-Way Hashes Using HashCalc04:21
lab2 – Calculating MD5 Hashes Using MD5 Calculator02:35
lab3 – Understanding File and Text Encryption Using CryptoForge02:59
lab4 – Encrypting and Decrypting the Data Using BCTextEncoder03:22
lab5 – Creating and Using Self-Signed Certificate08:07
lab6 – Basic Disk Encryption Using VeraCrypt06:43
lab7 – Basic Data Encryption Using CrypTool07:02
Information Security Overview