This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Analyst - Offensive Approach With Kali Linux, Python, Java Script
1. Introduction
2. Teaser 1 BEEF Framework (6:47)
3. Teaser 2 Lock PC Using Backdoor (1:46)
2. Hacking with Kali Linux
1. Installing Hacker & Victim Machine in Virtual Box (20:07)
10. Crack WPA with Wordlist (7:07)
11. Man In The Middle Framework ARP Spoof (5:47)
12. ARP Spoofing and Capturing Packets with MITMF (9:40)
13. MITMF Plugins (13:50)
14. Inject Keylogger and take Screenshots with MITMF (6:31)
15. Wireshark and MITMF Together to Hijack HTTP requests (13:30)
16. Installing and configuring Veil Framework (7:30)
17. Custom Payload with Veil (11:50)
18. Making Backdoor Reverse_HTTPS with Veil (10:46)
19. Configuring Listener with msfconsole (16:12)
2. Linux Commands (25:01)
20. Veil in action to get Connection from Client (12:24)
21. Introduction to Beef Framework (12:04)
22. Beef & MITMF in action to exploit Client Browser (9:59)
3. apt-get command (11:12)
4. chmod command (11:56)
5. Networking Basics Before Hacking (7:07)
6. Information Gathering (16:36)
7. Airmon-ng Change Default mode of adapter to monitor mode (9:31)
8. Change Managed Mode to Monitor Mode Manual Method (8:00)
9. Crack WPA airodump-ng and crunch (21:09)
3. Hacking with Python
1. Start Python Crash Course Command, Statement & Scripts (3:19)
10. File Handling with Python (7:21)
11. Data Structure Lists (15:55)
12. Strings and inbuilt_methods (14:44)
13. Data Structure Dictionary (9:41)
14. Data Structure Tuples (11:17)
15. Object Oriented Programming (18:08)
16. Python Inheritance (9:09)
17. List Comprehension (4:43)
2. Keywords and types (6:53)
3. Variables in Python (13:24)
4. Formatting your text (10:16)
5. Operators, Operands and Logic (14:29)
6. Flow Controls Conditionals (8:55)
7. Flow Controls Looping (17:32)
8. User Defined and Lambda Functions (14:09)
9. Scope and Packing, Unpacking Arguments (8:34)
4. Making MACChanger with Python
1. Regular Expression (15:37)
2. Intro to Mac Address Changer (10:03)
3. Scripts for running commands in the Shell (12:20)
4. Change MAC address (12:56)
5. Random MAC Changer (15:39)
5. Remain Anonymous While Hacking
1. TOR for Anonymous Browsing (25:04)
2. Host Your Own Website with TOR (14:28)
3. Remain Anonymous with Virtual Private Networks (VPN) (9:25)
4. Prevent DNS Leaks with Proxychains (20:56)
6. Nmap & Port Scanner with Python
1. Introduction to NMAP Scanner & nmap module (20:36)
2. TCP, UDP and Comprehensive scan with nmap (9:38)
3. Making PortScanner Clone of NetDiscover tools of Kali (12:46)
4. Using Scapy Module to implement ARP protocols (11:36)
5. Formatting Responses to get IP and MAC addresses of Clients (17:59)
7. Making KeyLogger with Python
1. Keylogger with Pynput Module (19:06)
2. Keylogger using pyperclip module (8:22)
8. Creating Malware with Python
1. Scripts for running commands on Clients (6:03)
10. Packaging technique to bypass Antiviruses (11:54)
11. Convert Backdoor to Trojans (7:43)
2. WIFI Password of Client with Delivery Method to Gmail (15:51)
3. Downloading files Script (10:30)
4. Beelogger Modify your Keylogger (26:54)
5. Making Advance Keylogger (17:54)
6. Deliver Keylogger and Observe Keylogs (8:58)
7. Implementation of Download file feature in Client (22:27)
8. LaZagne Capture Password with Our Malware (14:59)
9. Packaging of Python File in Linux (16:47)
9. Creating Undetectable Backdoor with Python
1. Threading with Python (15:15)
10. Send Message to Client From Backdoor (14:14)
11. Open Web Browser of Windows Machine from Backdoor (6:46)
12. Take Screenshots from Backdoor (34:00)
13. Lock Client using Backdoor (5:47)
14. Hijack Command Shell of Client Server Side (24:27)
15. Hijack Command Shell of Client Client Side (16:54)
16. Test Backdoor with Antiviruses (7:25)
2. Backdoor and Socket Programming (12:37)
3. Send and Recieve Data Between Server & Client (10:48)
4. Start Advance Payloads making Listener Kali Linux (24:25)
5. Run Multiple Threads with threading module (12:30)
6. List all connections (23:17)
7. Client Sandboxie, Mutex and VMs (20:03)
8. Connect to Server and List Connections (20:21)
9. Interact with connection (18:22)
10. Web Crawler with Python
1. Getting response with requests module (8:26)
2. Crawl all subdomains of main site (12:08)
3. Discover Hidden URL of websites and Formatting (19:33)
4. BeautifulSoup Easy method to make Crawler (8:18)
11. Hacking With JavaScript
1. Variables and its types Local & Global (10:12)
10. JS HTML DOM (8:58)
11. JS Challenge HACK THIS SITE mission 1-3 (16:07)
12. JS Challenge HACK THIS SITE mission 4 (7:45)
13. JS Challenge HACK THIS SITE mission 5-6 (8:07)
14. JS Obfuscation Challenge, Mission 7 (10:38)
2. Comments in JS (4:52)
3. Data Types (7:22)
4. Conditionals (10:40)
5. Looping (12:20)
6. User-Defined Functions (9:50)
7. let and const (8:19)
8. JS Objects (12:17)
9. JS Events (10:33)
12. JavaScript KeyLogger
1. Introduction to JS KeyLogger (3:44)
2. Implement KeyStroke Listener with JS (9:28)
3. PHP code write keylogs to File (11:03)
13. BurpSuite Web Application Penetrating Tool
1. Install BurpSuite and Configure Certificates (8:59)
2. Configuration of BurpSuite (9:39)
3. Tools of BurpSuite (10:40)
4. Hunt for vulnerability with Burp in Live website (4:43)
5. BurpSuite on Test Website (7:58)
14. Cross-site scripting (XSS)
1. Introduction to XSS (7:22)
10. Exploitation of XSS URL Redirection (5:32)
11. Advance Payload Part 1 (17:57)
12. Advance Payload Part 2 (11:49)
2. Types of XSS with Examples (9:55)
3. Learn to build XSS payloads (28:03)
4. XSS-gameSpot for Payloads (15:37)
5. XSS on test Website (8:27)
6. Load Lines of Payload with Intruder (14:49)
7. XSS hunting on Live Website 1 (4:29)
8. XSS hunting on Live Website 2 (11:34)
9. Phising with XSS attacks (8:41)
15. Attacks HTML Injection, Host Header Injection
1. Introduction to HTML Injection (2:53)
2. HTML Injection on Live Website (4:56)
3. HTML Injection on Test Website (5:57)
4. Post Exploitation HTMLI (3:17)
5. Introduction to Host Header Injection (4:42)
6. Host Header Injection on Live Website (14:38)
16. URL Redirection
1. Introduction to Open URL Redirection (3:26)
2. URL Redirection through Path PayloadsFragments (19:22)
3. URL Redirection through Parameter (2:43)
4. URL Redirection through Parameter with Example (7:14)
17. XML External Entity (XXE)
1. Introduction to XEE (4:34)
2. XXE on test Web App (12:16)
5. Looping
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock