Before we begin!4:44
Virtual Box install tutorial15:37
Kali Linux install tutorial13:57
Going full screen in Kali Linux!18:17
Basic commands – part 19:42
Basic commands – part 221:06
Basic commands – part 312:48
Changing IP address and setting up wireless adapter4:53
Creating bootable Kali USB5:00
Important networking terms10:18
Important hacking terms18:05
Few things to do after installing Kali Linux8:33
Changing our Mac Address – Macchanger6:27
Google hacking13:12
Nikto basics10:56
Whois tool6:41
Email harvesting6:09
Shodan10:25
Zone transfer with dig7:10
Installing Metasploitable7:00
Nmap – part 115:34
Nmap – part 211:44
Nmap – part 312:26
Zenmap7:55
TCP scans15:53
Nmap bypassing defences17:24
Nmap scripts 19:31
Nmap scripts 214:01
Installing Owasp8:28
HTTP request10:01
HTTP response10:30
Burp Suite configuration12:51
Editing packets in Burp Suite12:21
Whatweb & Dirb10:12
Password recovery attack15:35
Burp Suite login bruteforce11:06
Hydra login bruteforce8:48
Session fixation13:55
Injection attacks5:35
Simple command injection11:11
Exploiting command injection vulnerability7:44
Finding blind command injection13:46
Webpentest – basics of SQL10:27
Manual SQL injection – part 113:17
Manual SQL injection – part 221:00
SQLmap basics16:37
XML injection16:00
Installing XCAT and preventing injection attacks5:53
Reflected XSS10:53
Stored XSS12:01
Changing HTML code with XSS7:34
XSSer & XSSsniper13:40
Wireless attacks theory10:52
Putting network card in monitor mode4:41
Capturing handshake with Airodump14:40
RockYou.txt14:00
Cracking with Aircrack15:36
Cracking with Hashcat15:00
Making password lists with Crunch18:23
Making password lists with Cupp7:13
Rainbowtables – part 116:37
Rainbowtables – part 25:41
Installing fluxion6:21
Finding and cracking hidden network8:22
Preventing wireless attacks8:01
ARP protocol basics10:31
MITM attack theory7:22
Installing MITMf6:38
Manual Arpspoofing12:51
Problems while installing MITMf6:22
HTTP traffic sniffing8:32
DNS spoofing and HTTPS password sniffing24:21
Hooking browsers with BEEF16:04
Screenshotting targets browser11:04
Cloning any webpage8:57
Ettercap basics7:01
MSFconsole enviroment16:10
Metasploit modules explained12:14
Bruteforcing SSH with Metasploit15:20
Attacking Tomcat with Metasploit8:53
Getting Meterpreter with command injection25:08
PHP code injection5:46
2 Metasploitable exploits7:01
Wine installation12:05
Crafting Windows payloads with Msfvenom10:05
Encoders & Hexeditor18:45
Windows 10 Meterpreter shell12:02
Meterpreter enviroment11:31
Windows 10 privilege escalation11:31
Preventing privilege escalation6:24
Post exploitation modules14:14
Getting Meterpreter over Internet with port forwarding10:43
Eternalblue exploit20:20
Persistence module13:19
Hacking over Internet with Ngrok10:26
Real hacking begins now!2:26
Android device attack with Venom9:56
Variables13:45
raw_input10:50
IF ELSE statement10:20
FOR loop6:33
WHILE loop8:24
Python lists8:07
Functions14:34
Classes10:25
Importing libraries7:01
Try and Except rule5:14
Files in Python11:44
Theory behind reverse shell6:50
Simple server code12:44
Connection with reverse shell7:11
Sending and receiving messages10:49
Sending messages with while true loop7:54
Executing commands on target system9:38
Fixing backdoor bugs & adding functions20:10
Installing Pyinstaller2:26
First performance test of our backdoor18:01
Trying to connect every 20 seconds12:27
Creating persistence – part 16:12
Creating persistence – part 216:50
Changing directory11:55
Uploading & downloading files00:00:00
Downloading files from Internet00:00:00
Starting programs from our backdoor00:00:00
Capturing screenshot on target PC00:00:00
Embedding backdoor in image – part 100:00:00
Embedding backdoor in image – part 200:00:00
Checking for administrator privileges00:00:00
Adding help option00:00:00
Adding help option00:00:00
Importing Pynput00:00:00
Simple keylogger00:00:00
Adding report function00:00:00
Writing keystrokes to a file00:00:00
Adding keylogger to our reverse shell – part 100:00:00
Adding keylogger to our reverse shell – part 200:00:00
Final project test00:00:00
Printing banner00:00:00
Printing banner00:00:00
Adding available options00:00:00
Starting threads for bruteforce00:00:00
Making function to run the attack00:00:00
Bruteforcing router login00:00:00
Bypassing antivirus with all your future programs00:00:00
Sending malware with spoofed email00:00:00
What’s next00:00:00