Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
Full Course:
All Course Resources/Links:
A shout out to all those involved with helping out on this course:
Alek - Creating “Academy“, “Dev“, and “Black Pearl“ Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the “Blue“ Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I’d like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
❓Info❓
___________________________________________
Pentests & Security Consulting:
Get Trained:
Get Certified:
Merch:
Sponsorship Inquiries: info@
📱Social Media📱
___________________________________________
Twitter:
Twitch:
Instagram:
LinkedIn:
Discord:
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
Support the stream (one-time):
My Build:
lg 32gk850g-b 32“ Gaming Monitor:
darkFlash Phantom Black ATX Mid-Tower Case:
EVGA 2080TI:
MSI Z390 MotherBoard:
Intel 9700K:
32GB DDR4 RAM:
My Recording Equipment:
Panasonic G85 4K Camera:
Logitech C922x Pro Webcam:
Aston Origin Microphone:
Rode VideoMicro:
Mackie PROFX8V2 Mixer:
Elgato Cam Link 4K:
Elgate Stream Deck:
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to and affiliated sites.
1 view
144
54
7 months ago 00:10:18 1
Signs Your PC Has Been Hacked
7 months ago 00:33:44 1
Best Hacking Laptop 2023
7 months ago 03:31:01 1
What is wireshark | Complete wireshark tutorial | Introduction
7 months ago 00:27:01 2
60 Hacking Commands You NEED to Know
7 months ago 00:27:16 1
Top Hacking Books for 2023
7 months ago 08:55:22 3
A Complete Ethical Bootcamp Hack #3
7 months ago 08:10:12 6
A Complete Ethical Bootcamp Hack #2
7 months ago 08:07:06 15
A Complete Ethical Bootcamp Hack #1
7 months ago 00:17:21 1
Predator OS for Penetration Testing, Ethical Hacking, Privacy, Hardening, & Secure, Anonymized Linux
7 months ago 00:35:01 1
How Hackers Bypass Two-Factor Authentication (2FA)?!
7 months ago 01:03:52 1
Hack Like a Pro: Finding Hidden Data Exposures 🕵️♂️💥
8 months ago 00:01:47 1
Whiteout Survival Hack 2024 -- How To Get Unlimited Gems in Whiteout Survival - [Android/iOS] omg
8 months ago 03:06:00 1
Immortality Is Closer Than You Think: AI, War, Religion, Consciousness & Elon Musk | Bryan Johnson
8 months ago 00:03:37 1
Arena Of Valor HACK - Getting Infinite Vouchers in Few Steps with AOV mod apk (ios, android)
8 months ago 02:25:34 1
The Complete Open Source Intelligence (OSINT) Training Course