K_Ethical Hacking_ Exploits

00_01_ Welcome. 00_02_ Whatyoushouldknow. 00_03_ Disclaimer. 01_01_ Whatareexploits. 01_02_ Introductiontoassembler. 01_03_ Writingyourfirstassemblerprogram. 01_04_ DebuggingCprograms. 01_05_ UsingNasminKali. 01_06_ Extendingfurtherintoassembler. 02_01_ Writingavulnerableassemblerprogram. 02_02_ Takingcontrolflow. 02_03_ Executingcodefromthedatasection. 03_01_ Exploitingwithpython. 03_02_ ExploitingtheFTPclient. 03_03_ Takingafirstlookatstatesponsoredexploits. 04_01_ UsingMetasploit. 04_02_ UsingArmitage. 04_03_ LookingatMetasploitmodules. 04_04_ AddingnewexploitstoMetasploit. 05_01_ Whatsnext.

Ethical Hacking Enumeration

00_01_WX30_introduction. 00_02_XR15_whatyoushouldknow. 01_01_XR15_whatis. 01_02_XR15_understanding. 01_03_XR15_working. 01_04_XR15_netbios. 02_01_XR15_profiling. 02_02_XR15_contexts. 02_03_XR15_working. 02_04_XR15_SMBSAMBA. 03_01_XR15_enumerating. 03_02_XR15_Episode1. 03_03_XR15_episode2. 03_04_XR15_episode3. 03_05_XR15_EnumEp1. 03_06_XR15_EnumEp2. 03_07_XR15_SNMPEnumeration. 03_08_XR15_RPC. 03_09_XR15_UsingWMI. 03_10_XR15_Finger. 04_01_XR15_tracing. 04_02_XR15_shodan. 04_03_XR15_scanning. 05_01_XR15_superscan. 05_02_XR15_netscantools. 05_03_XR15_LDAP. 05_04_XR15_SMTP. 06_01_XR15_outtro.

K_Ethical Hacking_ Mobile Devices and Platforms

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Course_disclaimer. 01_01_ Understanding_and_testing_for_mobile_vulnerabilities. 01_02_ Static_Analysis_of_mobile_applications. 01_03_ Dynamic_analysis_of_mobile_applications. 02_01_ Understanding_the_Android_operating_system. 02_02_ Understanding_the_Android_security_model. 02_03_ Preparing_the_Android_testing_environments. 02_04_ Extracting_and_reading_the_Manifest_file_PART1. 02_05_ Extracting_and_reading_the_source_code. 02_06_ Extracting_Java_source_code_files_with_JAD. 02_07_ Browsing_applications_directly_with_JADX. 02_08_ Getting_command_line_access_with_ADB. 02_09_ Installing_an_emulated_Android_device. 02_10_ Dynamic_analysis_of_Android_applications. 02_11_ Using_Drozer_to_analyse_applications. 02_12_ Setting_up_a_KitKat_VM. 03_01_ Understanding_iOS_applications. 03_02_ Securing_iOS_applications_by_design. 03_03_ Jailbreaking_for_command_line_access_to_iOS_applications. 03_04_ Preparing_to_test_iOS_applications. 03_05_ Extracting_properties_and_class_headers_from_iOS_applications. 03_06_ Disassembling_iOS_executable_code. 03_07_ Advancing_to_dynamic_analysis_of_iOS_applications. 04_01_ Whats_next.

K_Ethical Hacking_ Perimeter Defenses

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Course_disclaimer. 01_01_ Understanding_firewalls. 01_02_ Applying_the_basic_Windows_firewall. 01_03_ Using_advanced_features_in_the_Windows_firewall. 01_04_ Understanding_detection_through_firewall_logs. 01_05_ Understanding_Linux_IPTables. 01_06_ Setting_up_a_Linux_IPTables_firewall. 01_07_ Managing_rules_with_Firewall_Builder. 01_08_ Port_testing. 02_01_ Setting_up_a_CISCO_PIX_firewall. 02_02_ Creating_a_secure_enclave. 03_01_ Installing_GNS3. 03_02_ Obtaining_network_device_images. 03_03_ Setting_up_a_network. 03_04_ Emulating_the_ASA_firewall. 03_05_ Integrating_Kali_into_GNS3. 04_01_ Understanding_web_application_firewalls. 04_02_ Exposing_API_services_through_the_WSO2_Gateway. 04_03_ Understanding_honeypots. 04_04_ Running_the_Cowrie_honeypot. 04_05_ Detecting_intrusions_with_Security_Onion. 05_01_ Whats_next.

K_Ethical Hacking_ Website and Web Application Testing

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Disclaimer. 01_01_ Elements_of_web_applications. 01_02_ Dissecting_the_HTTP_protocol. 01_03_ Moving_on_to_WebSockets. 01_04_ Looking_at_Googles_QUIC_protocol. 01_05_ Understanding_cookies. 01_06_ Introducing_HTML. 01_07_ Visiting_OWASP. 02_01_ Installing_the_HacMe_Casino. 02_02_ Installing_the_WebGoat_server. 02_03_ Installing_and_using_the_Vega_scanner. 02_04_ Intercepting_web_traffic_with_teh_Vega_proxy. 02_05_ Introducing_Burp_Suite. 02_06_ Proxying_with_ZAP. 02_07_ Using_the_OWASP_ Framework. 02_08_ Introducing_Web_Scarab. 03_01_ Fingerprinting_web_servers. 03_02_ Looking_for_credentials_in_HTML_code. 03_03_ Using_Cookie_Digger. 03_04_ Hijacking_sessions_through_cookies. 04_01_ Manipulating_the_URL. 04_02_ Testing_for_SQL_injections. 04_03_ Cross_site_scripting. 04_04_ Injecting_commands_through_the_URL. 05_01_ Cracking_the_bank. […]

K_ Securing the IoT_ Secure Architectures

00_01_WX30_Introduction. 00_02_XR30_What_you_should_know. 01_01_XR30_Designing_an_enterprise_architecture. 01_02_XR30_Architecting_security. 01_03_XR30_Architecting_security_using_attributes. 01_04_XR30_Architecting_security_using_domains. 01_05_XR30_Managing_architected_risk. 02_01_XR30_Emerging_IoT_reference_architecure. 02_02_XR30_Architecting_IoT_security_domains. 02_03_XR30_Deriving_the_endtoend_IoT_risk_posture. 02_04_XR30_Selecting_controls. 02_05_XR30_Using_IoT_services. 03_01_XR30_Reviewing_an_eHealth_IoT_security_architecture. 03_02_XR30_Industrial_IoT_security_architecture. 03_03_XR30_Applying_security_through_an_SDN_architecture. 04_01_XR30_WiFi_and_BLE_security_architecture. 04_02_XR30_SigFox_security_architecture. 04_03_XR30_LoRaWAN_security_architecture. 04_04_XR30_6LoWPAN_security_architecture. 04_05_XR30_NBIoT_security_architecture. 05_01_XR30_IoT_application_services. 05_02_XR30_Cisco_SPIoT_application_service. 05_03_XR30_Microsoft_Azure_IoT_services. 05_04_XR30_Google_Cloud_IoT_application_services. 05_05_XR30_IBM_s_Watson_for_Iot. 05_06_XR30_Amazon_s_AWS_IoT_service. 06_01_XR30_Bringing_it_all_together. 07_01_XR30_What_s_next.

Cybersecurity Foundations

00_01_WX30_welcome. 00_02_XR30_WYSK. 01_01_XR30_NIST. 01_02_XR30_cyberRisk. 01_03_XR30_CobITS. 01_04_XR30_CobITS. 01_05_XR30_CTL. 01_06_XR30_PCI. 01_07_XR30_UK_framework. 02_01_XR30_killChain. 02_02_XR30_SecThreats. 02_03_XR30_industry. 02_04_XR30_Cloaking. 02_05_XR30_callbacks. 02_06_XR30_RootKits. 02_07_XR30_APTs. 02_08_XR30_ransom. 03_01_XR30_requirements. 03_02_XR30_SecRisk. 03_03_XR30_controls. 03_04_XR30_users. 03_05_XR30_prevent. 03_06_XR30_monitoring. 04_01_XR30_IMmgmt. 04_02_XR30_IMprep. 04_03_XR30_IMrespond. 05_01_XR30_nextSteps.

_Ethical Hacking_ Denial of Service

00_01_WX30_intro. 00_02_XR30_wysk. 00_03_XR15_tools. 01_01_XR30_dos. 01_02_XR15_testenv. 02_01_XR30_hping3. 02_02_XR30_smurf. 02_03_XR30_loic. 02_04_XR15_ettercap. 02_05_XR30_ntpamplify. 03_01_XR15_deauth. 04_01_XR15_goldeneye. 04_02_XR15_owasp. 04_03_XR30_blackenergy. 04_04_XR15_killftp. 05_01_XR30_sip. 06_01_XR30_ransomware. 06_02_XR30_cryptolocker. 06_03_XR30_petya. 07_01_XR30_defeatdos. 07_02_XR15_antidos. 07_03_XR30_peershark. 08_01_XR30_summary.

Learning Kali Linux [iClass]

00_01_WX30_welcome. 00_02_XR15_whatknow. 01_01_XR15_introvirt. 01_02_XR15_Setting_up_a_virtual_lab_2017Q2. 01_03_XR15_instvlab. 01_04_XR15_Installing_target_appliances_2017Q2. 01_05_XR15_metawin. 01_06_XR15_advopt. 02_01_XR15_whatis. 02_02_XR15_quickaccess. 02_03_XR15_screensettings. 02_04_XR15_apps. 02_05_XR15_update. 03_01_XR15_revtools. 03_02_XR15_dmitry. 03_03_XR15_dnsenum. 03_04_XR15_maltego. 04_01_XR15_vulntools. 04_02_XR15_spike. 04_03_XR15_instopenvas. 04_04_XR15_scanopenvas. 04_05_XR15_scanwin7. 04_06_XR15_exploremenu. 04_07_XR15_installvega. 04_08_XR15_webvega. 04_09_XR15_webproxy. 04_10_XR15_vegamenus. 05_01_XR15_password. 05_02_XR15_cmdline. 05_03_XR15_Windows_Credential_Editor_2017Q2. 05_04_XR15_johnripper. 05_05_XR15_Using_John_for_Windows_Passwords_2017Q2. 05_06_XR15_johnnyoptions. 05_07_XR15_Passing_the_hash_2017Q2. 05_08_XR15_Using_rainbow_tables_2017Q2. 06_01_XR15_overviewexp. 06_02_XR15_exploitlinux. 06_03_XR15_Creating_trojans_with_msfvenom_2017Q2. 06_04_XR15_Exploiting_with_Armitage_2017Q2. 06_04_XR15_moreexploit. 06_05_XR15_Pivoting_through_a_network_2017Q2. 06_06_XR15_Getting_Stealth_and_Persistent_Access_2017Q2. 07_01_XR15_nextsteps.

Ethical Hacking_ Wireless Networks [eCourseware]

00_01_XR30_Introduction. 00_02_XR15_What_you_need_to_know. 00_03_XR15_Course_disclaimer. 01_01_XR15_Understanding_the_basics_of_WiFi. 01_02_XR15_Selecting_WiFi_antennas. 01_03_XR15_Securing_wireless_networks. 01_04_XR15_Understanding_Wireless_Protected_Setup. 01_05_XR15_Extracting_WEP_passwords_using_WiFite. 01_06_XR15_Extracting_network_passwords_through_WPS. 01_07_XR15_Cracking_WPA_passwords_using_WiFite_and_Aircrack_ng. 01_08_XR15_Using_Pixiedust_to_recover_keys. 02_01_XR15_Harvesting_connections_with_Evil_Twins. 02_02_XR15_Installing_the_WiFi_Pineapple_in_Windows. 02_03_XR15_Harvesting_with_the_WiFi_Pineapple. 03_01_XR15_Understanding_Bluetooth. 03_02_XR15_Scanning_for_Bluetooth_devices. 03_03_XR15_Legacy_attacks_using_Bluesnarfer. 04_01_XR15_Using_the_Fern_Wifi_cracker. 04_02_XR15_Discovering_networks_with_inSSIDer. 04_03_XR15_Analyzing_networks_with_Acrylic_WiFi. 04_04_XR15_Heat_Mapping_your_home_or_office_with_Ekahau. 04_05_XR15_Using_Wireshark_to_capture_WiFi_packets. 04_06_XR15_Scanning_with_Vistumbler. 04_07_XR15_Using_Commview_to_scan_WiFi_networks. 05_01_XR15_Testing_the_Internet_of_Things. 06_01_XR15_What_s_next.