Booking options
£33.99
£33.99
On-Demand course
27 hours 12 minutes
All levels
This video course takes you through the basic and advanced concepts of penetration testing. From setting up your own virtual lab to developing brute force attacking tools using Python, you'll learn it all with the help of engaging activities.
Are you looking to pursue a career in cybersecurity and want to master the art of penetration testing? You've come to the right place. With this carefully tailored and structured video course, you'll grasp the basic and advanced topics of penetration testing with ease. The course starts by taking you through the process of setting up a penetration testing lab. Next, you'll become familiar with the Linux OS and Linux commands and explore the basic concepts of TCP/IP and the OSI model. Moving along, you'll learn how to gather information about computer systems and networks passively and actively and use the Metasploit tool to perform privilege escalation. Next, you'll perform web application pen testing and learn modern techniques to exploit common web application vulnerabilities such as SQL injection, XSS, CSRF, and command injection. You'll also learn how to perform wireless network pen testing to crack Wi-Fi passwords using Aircrack-ng, capturing packets, traffic sniffing, and Hashcat. Towards the end, you'll grasp the fundamentals of Python programming and develop offensive Python tools for pen testing and automation. By the end of this course, you'll have developed all the essentials skills needed for ethical hacking and penetration testing.
Set up your own virtual hacking lab with a VirtualBox
Use Nmap to perform network scanning and mapping
Become familiar with footprinting and port scanning
Exploit web applications with BurpSuite
Perform SQL injection on vulnerable web apps
Develop a brute force attacker tool in Python
If you are looking to get started in the field of cybersecurity and penetration testing, this course is for you. System administrators who want to secure their systems and networks will also find this course useful. A basic understanding of Linux and TCP/IP is needed to get started with this course.
With the help of interesting activities, this video course will help you become an expert in ethical hacking and penetration testing.
Become familiar with the concepts of networking, ethical hacking, and penetration testing * Gain a good understanding of the Linux OS and Linux commands * Learn how to write flawless penetration testing scripts in Python
HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, data breaches, malware, and ransomware. They believe in achieving this by providing essential training in the protection of systems, and by providing industry-standard defense solutions protecting web applications to enterprise networks. They also offer individual and corporate training packages in Infosec, penetration testing and Red Team Operations, web application security, and cybersecurity awareness. So far, they have trained over 500,000 students in ethical hacking, penetration testing, and Linux system administration.
1. Introduction
1. Introduction to the Course This video gives you an introduction to the course. |
2. Setting Up a Pentesting Lab
1. Installing VirtualBox This video shows you how to install VirtualBox. |
2. Installing Kali Linux In this video, you'll learn to install Kali Linux. |
3. Installing VirtualBox Guest Additions This video shows you how to install VirtualBox guest additions. |
4. Creating a Bootable Kali USB Flash Drive In this video, you'll learn how to create a bootable Kali USB flash drive. |
5. Important Things to do After Installing Kali Linux In this video, you'll see a few steps that you need to keep in mind after installing Kali Linux. |
3. Linux Essentials for Hackers
1. Basic Commands 1 This video is part of a 3-part series that teaches you the basic commands in Kali Linux. |
2. Basic Commands 2 This is the 2nd video in the series. |
3. Basic Commands 3 This is the 3rd video that teaches you the basic commands in Kali Linux. |
4. Networking Tools and Essential Terminology
1. Networking Terminology In this video, you'll learn the basic terminology used in networking. |
2. Changing Our IP and Setting Up Your Wireless Adapter In this video, you'll learn to change your IP address and set up your wireless adapter. |
3. Hacking Terminology This video teaches you the terminology used in hacking. |
5. Passive Information Gathering and Footprinting
1. Google Hacking This video shows you how to perform simple hacking with Google. |
2. Whois Information Gathering In this video, you'll learn about a footprinting tool called 'whois'. |
3. Email Harvesting In this video, you'll learn to gather information using the email harvesting tool called 'harvester'. |
4. Information Gathering with Shodan This video shows you how to gather information using a tool called Shodan. |
5. DNS Zone Transfers with Dig In this video, you'll learn to perform DNS zone transfers and how to use 'dig'. |
6. Active Information Gathering and Port Scanning
1. installing Metasploitable In this video, you'll learn what Metasploitable is and how to install it. |
2. Nmap - 1 This video is part of a 3-part video series where you'll learn about network mapping. |
3. Nmap - 2 In this video, you'll continue to learn about Nmap. |
4. Nmap - 3 This is the last video on Nmap. |
5. Scanning with Zenmap In this video, you'll learn how to perform scanning using zenmap. |
6. TCP Scans In this video, you'll learn the importance of TCP scans and how to do it. |
7. Bypassing Firewalls with Nmap In this video, you'll learn another use of Nmap - to bypass firewalls. |
8. Using Nmap Scripts - 1 In this video, you'll learn to use Nmap scripts for information gathering. |
9. Using Nmap Scripts - 2 In this video, you'll continue to learn about Nmap scripts. |
7. Web Application Penetration Testing
1. Installing Open Web Application Security Project (OWASP) In this video, you'll get an intro to OWASP and how to install it. |
2. HTTP Requests This video shows you how to perform pen testing using http requests. |
3. HTTP Responses This video shows you how to perform pen testing using http responses. |
4. Configuring BurpSuite In this video, you'll get an introduction to BurpSuite and how to configure it. |
5. Modifying Packets in BurpSuite In this video, you'll learn to modify packets in BurpSuite. |
6. Whatweb and Dirb In this video, you'll learn the uses of Whatweb and Dirb tools in ethical hacking. |
7. Password Recovery Attacks This video shows you the attacks you can perform when recovering passwords. |
8. Brute Force Attacks with BurpSuite In this video, you'll learn to perform brute force attacks with the BurpSuite tool. |
9. Brute Force Attacks with Hydra In this video, you'll learn to perform brute force attacks with the Hydra tool. |
10. Session Fixation This video shows you what session fixation is with an example. |
11. Injection Attacks This video shows you how to perform injection attacks. |
12. Command Injection In this video, you'll learn about command injection in ethical hacking. |
13. Exploiting Command Injection In this video, you'll learn to exploit command injection, which you learnt in the previous video. |
14. Finding Blind Command Injection In this video, you'll learn about blind command injection and how to find it. |
15. SQL Basics In this video, you'll learn the basics of SQL needed for SQL injection. |
16. Manual SQL Injection - 1 This video shows you how to perform SQL injection manually. |
17. Manual SQL Injection - 2 In this video, you'll continue to learn about SQL injection. |
18. SQLmap Basics In this video, you'll learn the basics of SQLmap. |
19. XML Injection In this video, you'll learn about XML injection to manipulate or compromise the logic of an XML application or service. |
20. Installing Extreme Cloud Administration Toolkit (xCAT) and Preventing Injection Attacks In this video, you'll learn how to install xCAT and how to prevent injection attacks. |
21. Reflected Cross-Site Scripting (XSS) In this video, you'll learn what reflected XSS is and how to use it. |
22. Stored XSS In this video, you'll learn how to use stored XSS (persistent XSS) for your web applications. |
23. Modifying HTML Code with XSS In this video, you'll learn to modify your HTML code with XSS. |
24. XSSer and XSSsniper In this video, you'll learn how to use 2 more pen testing tools: XSSer and XSSsniper. |
8. Wireless Penetration Testing
1. Wireless Attacks Fundamentals In this video, you'll learn the fundamentals of wireless attacks and how they're done. |
2. Enabling Monitor Mode This video shows you how to use monitor mode in Kali Linux. |
3. Capturing Handshakes with Airodump-ng In this video, you'll get an introduction to Airodump-ng and its uses. |
4. Rockou.txt Wordlist In this video, you'll get an introduction to the Rockou.txt Wordlist and how to use it. |
5. Cracking Passwords with Aircrack-ng In this video, you'll learn about the tools in the Aircrack-ng and how to crack passwords using it. |
6. Cracking Passwords with Hashcat In this video, you'll learn how to crack passwords using Hashcat. |
7. Making Password Lists with Crunch In this video, you'll learn about Crunch and how to create password lists using Crunch. |
8. Making Password Lists with Cupp In this video, you'll learn about Cupp and how to make password lists using this tool. |
9. Rainbow Tables - 1 In this video, you'll learn to use rainbow tables to derive passwords. |
10. Rainbow Tables - 2 In this video, you'll continue to use rainbow tables to derive passwords. |
11. Installing Fluxion This video introduces you to a new pen testing tool called fluxion and how to install it. |
12. Finding and Cracking Hidden Networks This video shows you how to find and crack hidden networks using fluxion. |
13. Preventing Wireless Attacks In this video, you'll learn how to prevent the most common wireless attacks. |
9. System Hacking and Exploitation
1. The Metasploit Console This video introduces you to the Metasploit console. |
2. Metasploit Modules Explained In this video, you'll get an introduction to the Metasploit modules. |
3. Brute Forcing SSH with Metasploit This video shows you how to use Metasploit to perform brute force SSH. |
4. Exploiting Apache Tomcat with Metasploit In this video, you'll learn how to use Apache Tomcat with Metasploit. |
5. Getting a Meterpreter Session with Command Injection In this video, you'll learn what a Meterpreter session is and how to use it with command injection. |
6. PHP Code Injection This video shows you how to use PHP code to perform system hacking. |
7. Exploiting Metasploitable2 In this video, you'll learn to use Metasploitable2. |
8. Wine Installation In this video, you'll get an introduction to wine and you'll learn how to install it. |
9. Crafting Windows Payloads with Msfvenom This video teaches you about Msfvenom and how to craft Windows payloads using it. |
10. Encoders and Hexeditor In this video, you'll learn about two new tools called Encoders and Hexeditor. |
11. Windows 10 Meterpreter Session In this video, you'll learn to run Meterpreter in Windows 10. |
12. Meterpreter Environment This video teaches you to work with the Meterpreter environment. |
13. Windows 10 Privilege Escalation In this video, you'll learn about privilege escalation with Windows 10. |
14. Preventing Privilege Escalation In this video, you'll learn how to prevent privilege escalation. |
15. Post Exploitation Modules This video introduces you to exploitation modules. |
16. Getting a Meterpreter Session Over the Internet with Port Forwarding In this video, you'll learn to use port forwarding to get a Meterpreter session. |
17. EternalBlue Exploit This video introduces you to a cyberattack exploit, EternalBlue. |
18. Persistence Module In this video, you'll learn about the persistence module and how to use it. |
19. Hacking Over the Internet with Ngrok This video teaches you to perform hacking over the Internet with Ngrok. |
20. Creating Android Payloads with Msfvenom In this video, you'll learn to create Android payloads with Msfyenom. |
21. The Real Hacking Begins Now! Using everything you've learned, this video begins with the hacking process. |
10. MITM Attacks (Man in the Middle)
1. ARP Protocol Basics This video shows you the basics of the ARP protocol. |
2. MITM Attacks Explained This video shows you all the attacks that can be performed using MITM. |
3. Installing MITMf This video gives you an overview of MITMf and how to install it. |
4. Manual Arp Spoofing In this video, you'll learn the art of manual spoofing. |
5. Problems while Installing MITMf This video highlights the problems while installing MITMf. |
6. HTTP Traffic Sniffing This video teaches you the process of HTTP traffic sniffing. |
7. DNS Spoofing and HTTPS Password Sniffing In this video, you'll learn about DNS spoofing and HTTPS password sniffing. |
8. Hooking Browsers with BEEF In this video, you'll learn to how to hook browsers. |
9. Taking a Screenshot of the Target's Browser This video teaches you to take a screenshot of the target system's browser. |
10. Cloning Any Webpage In this video, you'll learn to clone any webpage. |
11. Man In The Middle Attack - Ettercap Basics In this video, you'll learn the basics of the man in the middle attack. |
11. Python Basics
1. Variables This video gives you an introduction to variables in Python. |
2. Raw Input In this video you'll learn how to work with raw input in Python. |
3. If Else Statement This video teaches you about the if-else statement in Python. |
4. For Loop This video teaches you about the for loop in Python. |
5. While Loop In this video, you'll learn about the while loop in Python. |
6. Python Lists This video teaches you about lists in Python. |
7. Functions In this video, you'll learn about functions in Python. |
8. Classes This video teaches you about classes in Python. |
9. Importing Libraries In this video, you'll learn how to import libraries in Python. |
10. Files in Python This video shows you the file types in Python. |
11. Try and Except Rule In this video, you'll learn about the try and except rule in Python. |
12. Developing an Advanced Backdoor
1. The Theory Behind Reverse Shell This video discusses the theory behind the reverse shell session. |
2. Simple Server Code In this video, you'll learn the simple server code in reverse shell. |
3. Connection with Reverse Shell In this video, you'll learn how to connect with reverse shell. |
4. Sending and Receiving Messages In this video, you'll learn how to send and receive messages in reverse shell. |
5. Sending Messages Using the While Loop In this video, you'll learn to send messages using the while loop. |
6. Executing Commands on the Target System In this video, you'll learn to execute commands on the target system. |
7. Fixing Backdoor Bugs and Adding Functions In this video, you'll learn to fix backdoor bugs and add functions. |
8. Installing Pyinstaller This video gives you an introduction to Pyinstaller and how to install it. |
9. First Performance Test of Your Backdoor In this video, you'll do a first test of your backdoor. |
10. Trying to Connect Every 20 Seconds This video shows you what to do to establish a connection to your backdoor. |
11. Creating Persistence Part 1 This video introduces you to persistence and how to create it. |
12. Creating Persistence Part 2 In this video, you'll continue to learn about persistence. |
13. Changing Directory In this video, you'll learn to change directories. |
14. Uploading and Downloading Files In this video, you'll learn to upload and download files. |
15. Downloading Files from the Internet This video teaches you how to securely download files from the Internet. |
16. Starting Programs from Our Backdoor In this video, you'll learn to start programs from our backdoor. |
17. Capturing Screenshot on Target PC In this video, you'll learn how to capture screenshots on the target PC. |
18. Embedding Backdoor in Image Part 1 In this video, you'll learn how to embed backdoor techniques in an image. |
19. Embedding Backdoor in Image Part 2 In this video, you'll continue to embed backdoor in your image. |
20. Checking for Administrator Privileges In this video, you'll learn how to check for administrator privileges in the target application. |
21. Adding Help Option This video teaches you to add a help option. |
13. Developing a Keylogger
1. Importing Pynput In this video, you'll learn to import the Pynput library. |
2. Simple Keylogger This video teaches you to work with a simple keylogger. |
3. Adding Report Function In this video, you'll add a report function. |
4. Writing Keystrokes to a File This video teaches you to write keystrokes to a file. |
5. Adding Keylogger to Your Reverse Shell Part 1 This video teaches you another use of the keylogger by adding it to your reverse shell. |
6. Adding Keylogger to Your Reverse Shell Part 2 In this video, you'll continue to add keylogger to your reverse shell. |
7. Final Project Test In this video, you'll test your final project. |
14. Developing a Brute Force Attacker
1. Printing Banner In this video, you'll learn what a banner is and how to print it. |
2. Adding Available Options In this video, you'll learn to add available options to your attack. |
3. Starting Threads for Brute Force This video teaches you to start threads for your brute force attack. |
4. Making Function to Run the Attack In this video, you'll learn to make functions to run your brute force attack. |
5. Brute Forcing Router Login In this video, you'll learn to add a router login to your attack. |
6. Bypassing Antivirus with All Your Future Programs In this video, you'll learn how to bypass the antivirus with all your future programs. |
7. Sending Malware with Spoofed Email This video teaches you to send malware with spoofed emails. |