O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mastering Ethical Hacking

Video Description

Hack your way to a secure and threat-free environment using best-in-class tools and techniques.

About This Video

  • A comprehensive but fast and friendly guide to help you Master Ethical Hacking.
  • Covers the latest version of Ethical Hacking with fully up-to-date techniques and code examples
  • Shows you how to secure your system and make it more robust.

In Detail

Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and Ethical Hacking. Security is a major issue that organizations are now facing. Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security.

This course takes your Ethical Hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. This course will start by showing you how to install Kali Linux on your system and how to work with it. The course will then show you how to gather information using different methods such as fingerprinting and open ports.

The course will then help you check your system's vulnerability using Nessus and OpenVAS. You will then learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You'll then escalate privileges in your system to improve your design and program, and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system.

By the end of the course, you will be a Master of Ethical Hacking and will have learned to prevent unwanted hackers from hacking into your system.

Table of Contents

  1. Chapter 1 : Installing and Configuring Kali Linux
    1. The Course Overview 00:09:17
    2. Downloading Kali Linux 00:05:57
    3. Downloading and Installing VMware 00:05:29
    4. Downloading and Installing VirtualBox 00:04:51
    5. Installing Kali Linux 00:17:52
  2. Chapter 2 : Working with Kali Linux
    1. Installing VMware Tools 00:11:52
    2. Updating Kali Linux 00:04:55
    3. Setting Up Proxychains 00:09:12
    4. Starting Network Services 00:05:58
  3. Chapter 3 : Information Gathering
    1. DNS Enumeration 00:10:00
    2. Information Gathering – Whois Lookup and Subdomain Enumeration 00:10:46
    3. Finding Open Ports with Nmap 00:07:03
    4. OS and Service Fingerprinting 00:07:10
    5. Exploring Maltego 00:11:33
  4. Chapter 4 : Vulnerability Assessment
    1. Installing and Configuring Nessus 00:11:24
    2. Finding Local Vulnerabilities Using Nessus 00:16:30
    3. Checking for Linux Specific Vulnerabilities with Nessus 00:11:00
    4. Checking for Windows Specific Vulnerabilities with Nessus 00:08:06
    5. Installing and Configuring OpenVAS 00:05:20
    6. Checking for Linux and Windows Vulnerabilities with OpenVAS 00:21:49
  5. Chapter 5 : Exploitation
    1. Mastering Metasploit – Metasploit Console MSFconsole 00:18:07
    2. Exploring Armitage – The Metasploit Graphical User Interface 00:17:28
    3. MySQL Database Exploitation with Metasploit 00:08:42
    4. Client Side Attacks – BeEF Browser Exploitation 00:17:52
    5. Client Side Attacks – Using the Social Engineering Toolkit (SET) 00:11:41
  6. Chapter 6 : Password Cracking
    1. Generating Wordlists with Crunch 00:11:05
    2. Password Cracking with John the Ripper 00:12:00
    3. Password Cracking with Hydra 00:08:26
    4. Password Cracking with Medusa 00:08:03
  7. Chapter 7 : Network Sniffing and Spoofing
    1. Network Discovery with Netdiscover 00:10:10
    2. Network Sniffing with Tcpdump 00:10:44
    3. Network Sniffing with Wireshark 00:09:37
    4. ARP Spoofing with arpspoof 00:06:39
    5. MITM with Ettercap 00:05:53