The Complete Ethical Hacking Course

Video description

Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools with Python.

About This Video

  • Kali Linux tools
  • Basic Linux commands
  • Fundamental ethical hacking attacks and protection methods
  • Learn Metasploit and Python

In Detail

This course is highly practical and is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system so that you can practice all the skills and techniques you learn in real-time. You'll start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We'll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time!

In this course, you'll learn:

  • How hackers launch attacks on different systems, computers, users, websites, and wireless networks
  • What tools hackers use, why, and how they work
  • How to protect yourself (or your clients!) against these attacks
  • How to build your security and hacking tools with Python—from scratch and with no programming experience necessary!
  • How to create your own ethical hacking tool portfolio.

In the relevant sections, you'll learn about subjects such as Kali Linux, Wireshark, Maltego, net discover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crunch, Meterpreter, Beef, Apache, Nmap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger, and more. We start with practical information without excessive detail and progress accordingly without neglecting the theory at the end.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Introduction
    1. Introduction 00:01:12
    2. Course Manual 00:04:56
  2. Chapter 2 : Hacking Lab Setup
    1. Hacking Lab Setup Introduction 00:00:46
    2. What is Virtual Machine 00:02:10
    3. Installing Virtualbox (Windows) 00:07:58
    4. Installing Virtualbox (MAC) 00:09:13
    5. Installing Kali Linux 00:15:55
    6. Installing Windows 10 00:13:53
    7. Snapshots 00:09:20
    8. Quick Reminder Before We Move On 00:02:25
    9. Hacking Lab Setup Outro 00:00:18
  3. Chapter 3 : Kali Linux 101
    1. Kali Linux 101 Introduction 00:00:59
    2. Kali Overview 00:07:57
    3. Linux Terminal 00:14:06
    4. Changing Kali Password 00:04:06
    5. Kali Linux 101 Outro 00:00:41
  4. Chapter 4 : Anonymity Online
    1. Anonymity Online Introduction 00:00:32
    2. How Networks Work 00:05:07
    3. DNS Usage 00:03:43
    4. Changing DNS Servers 00:09:18
    5. Using VPN Books 00:08:56
    6. Anonymity Online Outro 00:00:38
  5. Chapter 5 : Dark Web
    1. Dark Web Introduction 00:01:11
    2. What is Dark Web? 00:03:57
    3. Installing Tor On Kali 00:15:41
    4. Browsing Dark Web 00:10:48
    5. Dark Web Outro 00:00:41
  6. Chapter 6 : Network Pentesting
    1. Network Pentesting Introduction 00:01:18
    2. What is Network Pentesting? 00:04:33
    3. Chipsets 00:06:49
    4. Connecting WiFi USB 00:08:24
    5. MAC Address 00:05:19
    6. Monitor vs Managed 00:08:33
    7. Network Pentesting Outro 00:00:38
  7. Chapter 7 : Gathering Information From Networks
    1. Gathering Information From Networks Introduction 00:00:41
    2. Network Sniffing 00:08:08
    3. Airodump Specific Target 00:08:24
    4. Deauthentication Attacks 00:08:50
    5. Realtime Deauth Attack 00:03:04
    6. Gathering Information From Networks Outro 00:00:24
  8. Chapter 8 : Wireless Attacks
    1. Wireless Attacks Introduction 00:00:36
    2. Encryption Models 00:05:11
    3. Cracking WEP 00:12:33
    4. Fake Authentication 00:08:16
    5. Packet Injection 00:08:11
    6. How WPA Works? 00:02:50
    7. Capturing Handshakes 00:05:35
    8. Creating Wordlists 00:04:15
    9. WPA Live Cracking 00:02:29
    10. Safe Routers 00:04:37
    11. Wireless Attacks Outro 00:00:43
  9. Chapter 9 : Post Connection Attacks
    1. Post Connection Attacks Introduction 00:00:58
    2. Post Connection Settings 00:02:50
    3. Netdiscover 00:05:24
    4. nMap 00:12:53
    5. Man In The Middle 00:04:56
    6. Manual ARP Poison 00:08:41
    7. Man In The Middle Framework 00:15:20
    8. How Hackers Steal Passwords 00:04:37
    9. Breaking HTTPS 00:07:01
    10. Creating Web Server 00:07:43
    11. DNS Attacks 00:05:54
    12. Bettercap Installation 00:08:49
    13. ARP Attack 00:06:09
    14. Capturing Information 00:07:44
    15. Caplet Usage 00:14:48
    16. HSTS Settings 00:06:44
    17. Breaking HTTPS 00:11:37
    18. HSTS Downgrade Attempt 00:08:00
    19. Javascript Injection 00:09:22
    20. Wireshark Intro 00:07:21
    21. Wireshark Analysis 00:12:09
    22. How to Protect Yourself 00:03:54
    23. Post Connection Attacks Outro 00:00:29
  10. Chapter 10 : System Pentesting
    1. System Pentesting Introduction 00:01:19
    2. Gaining Access 00:03:02
    3. Installing Metasploitable 00:06:54
    4. Finding Vulnerabilities 00:07:42
    5. Exploiting First Vulnerability 00:09:25
    6. Exploiting Username Map Script 00:05:46
    7. Exploiting Username Map Script 00:05:22
    8. System Pentesting Outro 00:00:47
  11. Chapter 11 : Attacks On Users
    1. Attacks On Users Introduction 00:01:08
    2. Attacking to Users 00:02:56
    3. Installing Veil 00:07:12
    4. Veil Overview 00:05:45
    5. Creating First Backdoor 00:06:43
    6. Bypassing Antivirus Solutions 00:09:29
    7. Using Multi Handler 00:04:35
    8. Testing Backdoor 00:06:32
    9. Attacks On Users Outro 00:00:32
  12. Chapter 12 : Social Engineering
    1. Social Engineering Introduction 00:00:51
    2. What is Maltego? 00:04:01
    3. Maltego Overview 00:08:00
    4. Strategy 00:07:56
    5. Downloading Combiner 00:05:48
    6. Combining Files 00:07:02
    7. More Convincing File 00:06:49
    8. Messing With Characters 00:06:20
    9. Faking Mails 00:06:52
    10. Social Engineering Outro 00:00:43
  13. Chapter 13 : Social Media Security
    1. Social Media Security Introduction 00:00:50
    2. Instagram Brute Force Attacks 00:08:49
    3. Instagram Social Engineering 00:10:59
    4. How to Protect Ourselves 00:03:08
    5. Social Media Security Outro 00:00:24
  14. Chapter 14 : Beef
    1. What is Beef? 00:00:49
    2. Browser Exploitation 00:05:40
    3. Hooking Target 00:05:48
    4. Injection 00:11:12
    5. Taking Screenshots 00:03:37
    6. How Hackers Steal Facebook Passwords? 00:03:58
    7. Backdoor Delivery 00:09:17
    8. How to Protect Yourself? 00:02:35
    9. Beef Outro 00:00:28
  15. Chapter 15 : External Network Attacks
    1. External Network Attacks Introduction 00:00:35
    2. External Backdoor 00:02:30
    3. Port Forwarding 00:07:15
    4. Disable CDP 00:04:47
    5. External Network Attacks Outro 00:00:46
  16. Chapter 16 : Fake Game Website Attacks Introduction
    1. Fake Game Website Attacks Introduction 00:01:03
    2. External Beef Attack 00:07:22
    3. Ubuntu Server Creation 00:07:00
    4. Creating Game Website 00:11:57
    5. Installing Beef 00:05:23
    6. Beef in Ubuntu 00:07:39
    7. Embedding JavaScript 00:05:35
    8. What is No IP? 00:06:59
    9. Hooking iPhone 00:03:15
    10. How to Stay Safe 00:03:10
    11. Fake Game Website Attacks Outro 00:00:29
  17. Chapter 17 : Post Hacking Sessions
    1. Post Hacking Sessions Introduction 00:00:32
    2. Meterpreter Sessions 00:07:17
    3. Migration 00:04:55
    4. Downloading Files 00:04:54
    5. Capturing Keylogs 00:02:39
    6. Sustaining The Session 00:09:03
    7. Post Hacking Sessions Outro 00:00:19
  18. Chapter 18 : Hacker Methodology
    1. Hacker Methodology Introduction 00:01:00
    2. Ethical Hacker's Steps 00:03:49
    3. Detailed Explanation of Methodology 00:05:58
    4. Hacker Methodology Outro 00:00:38
  19. Chapter 19 : Website Reconnaissance
    1. Website Reconnaissance Introduction 00:00:25
    2. Website Pentesting Setup 00:05:01
    3. Maltego One More Time 00:08:39
    4. Netcraft 00:05:28
    5. Reverse DNS Lookup 00:04:23
    6. Whois Lookup 00:04:01
    7. Robots 00:06:25
    8. Subdomains 00:05:52
    9. Website Reconnaissance Outro 00:00:30
  20. Chapter 20 : Website Pentesting
    1. Website Pentesting Introduction 00:00:20
    2. Code Execution Vulnerability 00:06:07
    3. Reverse TCP Commands 00:08:50
    4. File Upload Vulnerability 00:07:37
    5. File Inclusion 00:06:38
    6. Website Pentesting Outro 00:00:20
  21. Chapter 21 : Cross Site Scripting
    1. Cross Site Scripting Introduction 00:00:45
    2. What is XSS? 00:03:32
    3. Reflected XSS 00:04:04
    4. Stored XSS 00:03:25
    5. Real Hacking with XSS 00:05:54
    6. How to Protect Yourself? 00:03:39
    7. Cross Site Scripting Outro 00:00:20
  22. Chapter 22 : SQL 101
    1. SQL 101 Introduction 00:00:52
    2. Database and SQL 00:01:47
    3. Database Structure 00:04:36
    4. Adding a New Value 00:05:51
    5. Updating and Deleting Values 00:04:55
    6. Filtering 00:04:37
    7. SQL 101 Outro 00:00:21
  23. Chapter 23 : SQL Injection
    1. SQL Injection Introduction 00:00:49
    2. Metasploitable Databases 00:05:31
    3. Working with Mutillidae 00:07:48
    4. Vulnerability Test 00:05:21
    5. Post Method SQLi 00:04:02
    6. Get Method SQLi 00:04:08
    7. Every Password On Database 00:03:27
    8. Learning Database Name 00:05:39
    9. Finding Out More 00:05:17
    10. Retrieving Everything 00:04:21
    11. SQL Injection Outro 00:00:27
  24. Chapter 24 : Website Pentesting Tools
    1. Website Pentesting Tools Introduction 00:00:36
    2. Sqlmap 00:10:12
    3. Zap 00:05:11
    4. Zap Analysis 00:05:01
    5. Website Pentesting Tools Outro 00:00:26
  25. Chapter 25 : Ethical Hacking Certifications
    1. Ethical Hacking Certifications Introduction 00:00:41
    2. Options for Certification 00:02:28
    3. Certified Ethical Hacker 00:06:37
    4. OSCP 00:06:13
    5. Ethical Hacking Certifications Outro 00:01:09
  26. Chapter 26 : Python For Ethical Hacking Setup
    1. Python For Ethical Hacking Setup Introduction 00:00:44
    2. Anaconda Installation (Windows) 00:13:01
    3. Anaconda Installation (MAC) 00:11:45
    4. Python For Ethical Hacking Setup Outro 00:00:24
  27. Chapter 27 : Python Data Types & Structures Introduction
    1. Python Data Types & Structures Introduction 00:00:43
    2. Numbers 00:08:36
    3. Variables 00:11:32
    4. Downloading Notebooks 00:04:08
    5. String 00:07:53
    6. String Advanced 00:13:58
    7. Variable Attributes 00:14:08
    8. Lists 00:10:54
    9. Lists Advanced 00:05:07
    10. Dictionary 00:11:42
    11. Sets 00:09:12
    12. Tuples 00:05:50
    13. Boolean 00:04:09
    14. Python Data Types & Structures Outro 00:00:56
  28. Chapter 28 : Control Statements & Loops
    1. Control Statements & Loops Introduction 00:00:35
    2. Logical Comparisons 00:06:31
    3. If Statements 00:08:35
    4. If Statements Continued 00:09:53
    5. If Statements Practical Usage 00:05:07
    6. For Loop 00:09:06
    7. For Loop Practical Usage 00:05:51
    8. Break Continue Pass 00:07:44
    9. While Loop 00:11:33
    10. Control Statements & Loops Outro 00:00:27
  29. Chapter 29 : Essentials
    1. Essentials Introduction 00:00:28
    2. Useful Methods 00:10:39
    3. Zip and Random 00:08:02
    4. Lists Advanced 00:05:21
    5. Sublime Text (Windows) 00:07:09
    6. Command Prompt (Windows) 00:03:41
    7. Sublime Text (MAC) 00:06:19
    8. Terminal (MAC) 00:03:47
    9. Essentials Outro 00:00:32
  30. Chapter 30 : Functions
    1. Functions Introduction 00:00:39
    2. Functions Explained 00:09:09
    3. Functions Explained 00:11:38
    4. Functions Advanced 00:09:58
    5. Functions Practical Usage 00:10:54
    6. Scope 00:13:50
    7. Functions Outro 00:00:26
  31. Chapter 31 : Object Oriented Programming
    1. Object Oriented Programming Introduction 00:00:28
    2. Class 00:13:33
    3. Methods 00:05:57
    4. Class Practical Usage 00:07:07
    5. Inheritance 00:07:38
    6. Special Methods 00:08:25
    7. Error Handling 00:11:05
    8. Object Oriented Programming Outro 00:00:29
  32. Chapter 32 : Modules
    1. Modules Introduction 00:00:24
    2. Using Libraries 00:12:38
    3. Writing Our Own Modules 00:05:53
    4. Imported vs Direct 00:06:54
    5. Modules Outro 00:00:22
  33. Chapter 33 : MAC Changer
    1. MAC Changer Introduction 00:00:49
    2. Installing PyCharm On Kali 00:16:17
    3. MAC and IP Address 00:06:44
    4. Changing MAC Manually 00:07:49
    5. Using Subprocess 00:07:13
    6. Introducing Variables 00:09:42
    7. Processing Tuples 00:12:03
    8. Beautifying the Code 00:08:02
    9. Saving Subprocess 00:05:00
    10. Regex 101 00:06:46
    11. New MAC Control 00:06:34
    12. Python3 Compatibility 00:04:02
    13. MAC Changer Outro 00:00:25
  34. Chapter 34 : Network Scanner
    1. Network Scanner Introduction 00:00:28
    2. ARP Refreshed 00:04:44
    3. How Network Scanners Work 00:05:59
    4. ARP Request 00:09:47
    5. Broadcast Request 00:08:56
    6. Processing Response 00:05:32
    7. Adding Features 00:08:22
    8. Python3 Compatibility 00:00:52
    9. Network Scanner Outro 00:00:32
  35. Chapter 35 : Man In The Middle
    1. Man In The Middle Introduction 00:00:37
    2. MITM Refreshed 00:04:30
    3. ARP Response Creation 00:07:43
    4. ARP Poison 00:07:15
    5. Getting MAC Address 00:13:46
    6. Looping Continuously 00:09:37
    7. Displaying Better Logs 00:04:02
    8. Handling Specific Error 00:10:01
    9. Getting User Input 00:08:06
    10. Man In The Middle Outro 00:00:21
  36. Chapter 36 : Packet Listener
    1. Packet Listener Introduction 00:00:25
    2. Wireshark Refreshed 00:07:29
    3. Wireshark Analysis 00:07:32
    4. Gathering Packets 00:08:42
    5. Working With Layers 00:06:41
    6. Downgrading HTTPS 00:15:15
    7. Protecting Ourselves 00:02:51
    8. Packet Listener Outro 00:00:36
  37. Chapter 37 : Keylogger
    1. Keylogger Introduction 00:00:27
    2. Setting Up Windows 00:13:35
    3. Working With Files 00:13:55
    4. Logging Keyboard 00:08:46
    5. Saving Logs 00:06:14
    6. Handling Errors 00:07:36
    7. Sending Email 00:09:13
    8. Reason Behind Threading 00:08:53
    9. Threading Library 00:05:45
    10. Testing On Windows 00:04:16
    11. Keylogger Outro 00:00:28
  38. Chapter 38 : Backdoor
    1. Backdoor Introduction 00:00:23
    2. How To Write a Backdoor? 00:06:42
    3. Opening a Connection 00:07:39
    4. Running Commands 00:08:35
    5. Writing Listener 00:09:11
    6. Sending Commands With Listener 00:06:10
    7. Class Structure 00:09:20
    8. Finishing Classes 00:05:37
    9. What is JSON? 00:10:26
    10. Processing JSON 00:08:29
    11. Sending Commands With List 00:12:36
    12. Cd Command Implementation 00:08:42
    13. Getting Contents 00:07:00
    14. Saving Files 00:06:18
    15. Encoding Downloads 00:07:09
    16. Upload Functionality 00:08:53
    17. Handling Errors 00:07:11
    18. Python3 Compatibility 00:12:14
    19. Backdoor Outro 00:00:36
  39. Chapter 39 : Packaging & Malicious Files
    1. Packaging & Malicious Files Introduction 00:00:28
    2. Malicious Files 00:06:01
    3. Creating Executables 00:05:27
    4. What is Regedit? 00:06:34
    5. Copying Files 00:07:53
    6. Running Executables On Startup 00:05:31
    7. Adding PDF to File 00:08:37
    8. Changing Icons 00:07:24
    9. Changing Extensions 00:06:35
    10. Packaging & Malicious Files Outro 00:00:36
  40. Chapter 40 : Closing & Ethical Hacker's Handbook
    1. Closing 00:02:38

Product information

  • Title: The Complete Ethical Hacking Course
  • Author(s): Rob Percival, Atil Samancioglu
  • Release date: September 2019
  • Publisher(s): Packt Publishing
  • ISBN: 9781839210495