Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Security Penetration Testing (The Art of Hacking Series)
Introduction
Security Penetration Testing The Art of Hacking Series LiveLessons: Introduction (4:29)
Lesson 1: Overview of Ethical Hacking and Penetration Testing
1.0 Learning objectives (1:03)
1.1 Introducing Ethical Hacking and Pen Testing (3:54)
1.2 Getting Started with Ethical Hacking and Pen Testing (6:26)
1.3 Understanding the Legal Aspects of Penetration Testing (7:33)
1.4 Exploring Penetration Testing Methodologies (3:39)
1.5 Exploring Penetration Testing and other Cyber Security Certifications (8:19)
1.6 Building Your Own Lab: Overview (17:07)
1.7 Building Your Own Lab: VIRL and Operating System Software (2:54)
1.8 Understanding Vulnerabilities, Threats, and Exploits (7:13)
1.9 Understanding the Current Threat Landscape (7:06)
Lesson 2: Kali Linux
2.0 Learning objectives (0:32)
2.1 Installing Kali (6:16)
2.2 Examining Kali Modules and Architecture (7:34)
2.3 Managing Kali Services (6:39)
Lesson 3: Passive Reconnaissance
3.0 Learning objectives (0:31)
3.1 Understanding Passive Reconnaissance (2:09)
3.2 Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information (25:24)
3.3 Exploring Passive Reconnaissance Methodologies: Searching for Files (13:26)
3.4 Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information (5:53)
3.5 Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover (9:07)
3.6 Surveying Essential Tools for Passive Reconnaissance: Recon-ng (20:33)
Lesson 4: Active Reconnaissance
4.0 Learning objectives (0:32)
4.1 Understanding Active Reconnaissance (2:26)
4.2 Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective (1:59)
4.3 Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review (18:37)
4.4 Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners (6:02)
Lesson 5: Hacking Web Applications
5.0 Learning objectives (0:39)
5.1 Understanding Web Applications (5:24)
5.2 Understanding Web Architectures (1:54)
5.3 Uncovering Web Vulnerabilities (9:22)
5.4 Testing Web Applications: Methodology (24:24)
5.5 Testing Web Applications: Reconnaissance (10:12)
5.6 Testing Web Applications: Mapping (3:13)
5.7 Testing Web Applications: Vulnerability Discovery (11:54)
5.8 Understanding the Exploitation of Web Applications (10:12)
5.9 Surveying Defenses to Mitigate Web Application Hacking (3:13)
Lesson 6: Hacking User Credentials
6.0 Learning objectives (0:27)
6.1 Understanding Authentication and Authorization Mechanisms (2:57)
6.2 Understanding Authentication and Authorization Attacks (5:43)
6.3 Exploring Password Storage Mechanisms (2:55)
6.4 Understanding Password Storage Vulnerability (25:38)
6.5 Cracking Passwords with John the Ripper (2:12)
6.6 Cracking Passwords with hashcat (9:19)
6.7 Improving Password Security
Lesson 7: Hacking Databases
7.0 Learning objectives (0:31)
7.1 Reviewing Database Fundamentals (7:43)
7.2 Attacking a Database: Discovery, Validation, and Exploitation (18:03)
7.3 Attacking a Database: Automated Scanners (6:36)
7.4 Surveying Defenses to Mitigate Database Hacking (6:36)
Lesson 8: Hacking Networking Devices
8.0 Learning objectives (1:05)
8.1 Understanding the Reasons for and the Steps to Hacking a Network (22:39)
8.2 Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models (28:30)
8.3 Reviewing Networking Technology Fundamentals: Forwarding Device Architecture and Communication (28:14)
8.4 Building an Internetwork Topology Using VIRL (12:35)
8.5 Hacking Switches: Reviewing Ethernet Fundamentals (16:28)
8.6 Hacking Switches: Demo (6:23)
8.7 Hacking Switches: ARP Vulnerabilities and ARP Cache Poisoning (6:47)
8.8 Reviewing Router Fundamentals (16:18)
8.9 Examining ICMP, First Hop Redundancy and Routing Protocol Attacks (11:57)
8.10 Hacking the Management Plane (19:56)
8.11 Understanding Firewall Fundamentals and Levels of Inspection (10:45)
8.12 Performing Firewall Reconnaissance and Tunneling (5:50)
8.13 Surveying Essential Tools for Hacking Network Devices: Packet Capture (9:36)
8.14 Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools (5:04)
8.15 Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools (9:35)
8.16 Surveying Essential Tools for Hacking Network Devices: MiTM Tools (2:51)
8.17 Surveying Essential Tools for Hacking Network Devices: Linux Tools (3:52)
8.18 Using Network Device Hacking Tools to Perform a MiTM ttack 00:03:53 (3:53)
Lesson 9: Fundamentals of Wireless Hacking
9.0 Learning objectives (0:34)
9.1 Reviewing Wireless Technology Fundamentals (9:15)
9.2 Surveying Wireless Hacking Tools: Wireless Adapters (13:39)
9.3 Surveying Wireless Hacking Tools: Software (13:07)
9.4 Hacking WEP, WPA, and Other Protocols (15:22)
9.5 Understanding Hacking Wireless Clients (15:22)
Lesson 10: Buffer Overflows
10.0 Learning objectives (0:34)
10.1 Understanding Buffer Overflows (17:26)
10.2 Exploiting Buffer Overflows (16:18)
10.3 Overcoming Defenses for Buffer Overflow Vulnerabilities (9:29)
10.4 Understanding Fuzzing (3:25)
10.5 Creating a Fuzzing Strategy (7:47)
10.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers (5:20)
10.7 Surveying Tools to Find and Exploit Buffer Overflows (18:56)
Lesson 11: Powershell Attacks
11.0 Learning objectives (0:21)
11.1 Understanding Powershell (6:56)
11.2 Pwning Windows Using PowerShell: Empire Components, Setup, and Basic Exploits (4:19)
11.3 Pwning Windows Using PowerShell: Empire Modules and Advanced Exploits (25:07)
11.4 Gathering Network Information Using PowerShell (4:19)
Lesson 12: Evasion and Post Exploitation Techniques
12.0 Learning objectives (0:28)
12.1 Understanding Security Evasion Techniques (11:05)
12.2 Exploring Post Exploitation Techniques (2:39)
12.3 Covering Your Tracks (2:59)
Lesson 13: Social Engineering
13.0 Learning objectives (0:33)
13.1 Understanding Social Engineering (15:23)
13.2 Exploring the Social Engineering Toolkit (SET) (8:38)
13.3 Exploring Maltego (7:51)
13.4 Surveying Social Engineering Case Studies (16:05)
Lesson 14: Maintaining Persistence, Pivoting, and Data Exfiltration
14.0 Learning objectives (0:35)
14.1 Understanding Persistence (4:12)
14.2 Gaining Network Access (12:10)
14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and LLMNR Poisoning (2:03)
14.4 Maintaining Persistence (9:04)
14.5 Understanding Pivoting and Lateral Movement (9:04)
14.6 Defending Against the Advanced Persistent Threat \ (3:29)
Lesson 15: Writing Penetration Testing Reports
15.0 Learning objectives (0:39)
15.1 Understanding Pen Test Reports and How They Are Used (1:42)
15.2 Planning and Organizing Your Report (6:57)
15.3 Understanding the Pen Test Report Format (3:10)
15.4 Exploring Risk Ratings (3:38)
15.5 Distributing Pen Test Reports (2:57)
Summary
Security Penetration Testing The Art of Hacking Series LiveLessons: Summary (1:02)
6.6 Cracking Passwords with hashcat
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock