- 9 Sections
- 49 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- 01 - Introduction to metasploit, metasploit framework, penetration testing, oscpVirtualisation Platforms + Lab's Architecture Diagram + Install & Run Oracle VM VirtualBox + Installing Kali using the VMware Image - Step 1 + Installing Kali using the VMware Image - Step 2 + Installing Kali using the VMware Image - Step 3 + Installing Kali using the ISO file for VMware - Step 1 + Installing Kali using the ISO file for VMware - Step 2 + Installing Kali using the ISO file for VMware - Step 3 + Installing Kali on VirtualBox using the OVA file - Step 1 + Installing Kali on VirtualBox using the OVA file - Step 2 + Installing Kali on VirtualBox using the OVA file - Step 3 + Installing Kali using the ISO file for VirtualBox - Step 1 + Installing Kali using the ISO file for VirtualBox - Step 2 + Installing Kali using the ISO file for VirtualBox - Step 3 + Free Windows Operating Systems on VMware Fusion + Free Windows Operating Systems on Oracle VM VirtualBox + Windows Systems as Victim + Configuring NAT Network in Oracle VM VirtualBox + Connections of Virtual Machines20
- 1.1Virtualisation Platforms Lessons 12 Minutes
- 1.2Lab’s Architecture Diagram Lessons 22 Minutes
- 1.3Install & Run Oracle VM VirtualBox Lessons 35 Minutes
- 1.4Installing Kali using the VMware Image – Step 1 Lessons 44 Minutes
- 1.5Installing Kali using the VMware Image – Step 2 Lessons 55 Minutes
- 1.6Installing Kali using the VMware Image – Step 3 Lessons 65 Minutes
- 1.7Installing Kali using the ISO file for VMware – Step 1 Lessons 72 Minutes
- 1.8Installing Kali using the ISO file for VMware – Step 2 Lessons 87 Minutes
- 1.9Installing Kali using the ISO file for VMware – Step 3 Lessons 93 Minutes
- 1.10Installing Kali on VirtualBox using the OVA file – Step 1 Lessons 104 Minutes
- 1.11Installing Kali on VirtualBox using the OVA file – Step 2 Lessons 117 Minutes
- 1.12Installing Kali on VirtualBox using the OVA file – Step 3 Lessons 125 Minutes
- 1.13Installing Kali using the ISO file for VirtualBox – Step 1 Lessons 132 Minutes
- 1.14Installing Kali using the ISO file for VirtualBox – Step 2 Lessons 147 Minutes
- 1.15Installing Kali using the ISO file for VirtualBox – Step 3 Lessons 155 Minutes
- 1.16Free Windows Operating Systems on VMware Fusion Lessons 166 Minutes
- 1.17Free Windows Operating Systems on Oracle VM VirtualBox Lessons 173 Minutes
- 1.18Windows Systems as Victim Lessons 181 Minute
- 1.19Configuring NAT Network in Oracle VM VirtualBox Lessons 192 Minutes
- 1.20Connections of Virtual Machines Lessons 203 Minutes
- 02 - Social Engineering TerminologiesTerminologies Part 1 + Terminologies Part 22
- 03 - Creating Malware and Malware ToolsCreating Malware and Terminologies + SFvenom Part 1 + MSFvenom Part 2 + Veil Installation + Veil in Action + TheFatRat Installation + TheFatRat in Action + TheFatRat Overcoming a Problem8
- 3.1SFvenom Part 1 Lessons 215 Minutes
- 3.2MSFvenom Part 2 Lessons 33 Minutes
- 3.3Veil Installation Lessons 43 Minutes
- 3.4Veil in Action Lessons 56 Minutes
- 3.5TheFatRat Installation Lessons 65 Minutes
- 3.6TheFatRat in Action Lessons 712 Minutes
- 3.7TheFatRat Overcoming a Problem Lessons 81 Minute
- 3.8Creating Malware and Terminologies Lessons 14 Minutes
- 04 - Embedding MalwareEmbedding Malware in PDF + Embedding Malware in WORD + Embedding Malware in Firefox Add-on3
- 05 - Empire ProjectEmpire Installation + Empire in Action Part 1 + Empire in Action Part 23
- 06 - Exploiting Java VulnerabilitiesExploiting Java Vulnerabilities1
- 07 - Social Engineering ToolkitSocial Engineering Toolkit1
- 08 - Phishing and VishingSending Fake Emails - Phishing + Vishing - Voice Phishing2
- 09 - Information Gathering Through the InternetIntroduction + Using Search Engines & Google Hacking to Gather Information + Search Engine Tool SearchDiggity + Shodan + Gathering Information About the People + Web Archives + FOCA Fingerprinting Organisations with Collected Archives + The Harvester & Recon-NG + Maltego - Visual Link Analysis Tool9
- 9.1Introduction Lessons 17 Minutes
- 9.2Using Search Engines & Google Hacking to Gather Information Lessons 24 Minutes
- 9.3Search Engine Tool SearchDiggity Lessons 34 Minutes
- 9.4Shodan Lessons 43 Minutes
- 9.5Gathering Information About the People Lessons 54 Minutes
- 9.6Web Archives Lessons 62 Minutes
- 9.7FOCA Fingerprinting Organisations with Collected Archives Lessons 77 Minutes
- 9.8The Harvester & Recon-NG Lessons 84 Minutes
- 9.9Maltego – Visual Link Analysis Tool Lessons 98 Minutes
