Course curriculum

  • 1

    Introduction

  • 2

    Lab Setup

    • Lab Introduction

    • Installing Kali Linux Using A Pre-Built Image

    • Installing Kali Linux Using An ISO Image

    • Installing Windows

    • Installing Metasploitable

    • Creating VirtualBox Snapshots

  • 3

    Kali Linux Fundamentals

    • Overview

    • Terminal & Basic Linux Commands

    • Updating Source List & Installing Programs

  • 4

    Network Penetration Testing

    • Introduction To Network Penetration Testing

    • How Networks Operate

    • Connecting A Wireless Adapter

    • Changing MAC Addresses

    • Wireless Monitor Modes & How To Alter Them

  • 5

    Network Penetration Testing - Pre Connection Attacks

    • Packet Sniffing Using Airodump-ng1

    • Targeted Packet Sniffing Using Airodump-ng1

    • Deauthentication Attack

    • Creating A Fake Access Point - Theory

    • Creating A Fake Access Point - Practical

  • 6

    Network Penetration Testing - Obtaining Access To Networks

    • Introduction To Gaining Access to the Networks

    • Cracking WEP Encryption - Theory

    • Cracking WEP Encryption (Basic Case)

    • Cracking WEP Encryption (Fake Authentication)

    • Cracking WEP Encryption (ARP Replay Attack)

    • Cracking WPA & WPA2 Encryption (Exploiting WPS) - Theory

    • Cracking WPA & WPA2 Encryption (Exploiting WPS) - Practical

    • Cracking WPA & WPA2 Encryption (Using Wifite)

    • Cracking WPA & WPA2 Encryption (Capturing Handshake) - Theory

    • Cracking WPA & WPA2 Encryption (Capturing Handshake) - Practical

    • Creating a Wordlist Using Crunch

    • Launching a Wordlist Attack To Crack WPA & WPA2 Password

    • Securing Yourself From Above Attacks

  • 7

    Network Penetration - Post Connection Attacks

    • Introduction To Post Connection Attacks

    • Gathering Information Using Netdiscover

    • Introduction To Nmap & How To Use It

    • Network Scanning Using Nmap

    • Network Scanning Using Zenmap

    • MITM Attack - ARP Poisoning (Theory)

    • MITM Attack - ARP Poisoning Using arpspoof

    • MITM Attack - ARP Poisoning Using MITMF

    • Bypassing HTTPS Using MITMF

    • Session Hijacking & Stealing Cookies

    • DNS Spoofing Using MITMF

    • Capturing Keystrokes & Running Any Code On Target's Browser

    • Launching MITM Attacks In A Real Environment

    • Basic Overview Of Wireshark

    • Capturing & Analysing Packets Using Wireshark

    • Reading Usernames Passwords & Cookies From Packet Capture

  • 8

    Network Penetration - Detection & Security

    • Detecting ARP Poisoning Attacks

    • Detecting Suspicious Activities Using Wireshark

  • 9

    Gaining Access to Computers - Server Side Attacks

    • Introduction To Gaining Access To Computers

    • Introduction To Server Side Attacks

    • Information Gathering & Exploiting A Misconfiguration

    • Using A Public Exploit To Hack Into A Server

    • Exploiting A Remote Code Execution Vulnerability

    • Installing & Setting Up Metasploit Community

    • Initializing A Scan Using Metasploit Community

    • Analyzing Scan Results & Exploiting Vulnerabilities

    • Installing & Setting Up Nexpose

    • Initializing a Scan Using Nexpose