Please enable JavaScript.
Coggle requires JavaScript to display documents.
Complete Ethical Hacking Bootcamp 2022: Zero to Mastery - Coggle Diagram
Complete Ethical Hacking Bootcamp 2022: Zero to Mastery
Introduction
Complete Ethical Hacking Bootcamp: Zero to Mastery (2:43)
Course Outline (6:37)
Join Our Online Classroom!
Exercise: Meet The Community
What is Ethical Hacking? (8:09)
Course Resources + Guide
How-to's: Speed up videos, Downloading videos, Subtitles
Setting Up Our Hacking Lab
What is a Virtual Machine? (6:03)
Why Linux? (3:13)
Downloading Virtual Box & Kali Linux (4:31)
Important - New Kali Linux Categories (1:25)
Note: Kali Linux Updates All The Time!
Creating Our First Virtual Machine (8:45)
Installing Kali Linux Operating System (11:57)
Update 1 - New & Old Versions of Kali Linux (2:42)
Start Networking Basics
Start Full Screen Mode & Network Settings (12:05)
Start Note: Getting Familiar With Kali Linux!
Start 5 Stages Of A Penetration Test (7:35)
Linux Operating System
Start Navigating Through Linux System (11:26)
Start Creating Files & Managing Directories (12:40)
Start Network Commands & Sudo Privileges In Kali (11:21)
Start Note: Linux File System & Additional Commands
Reconnaissance & Information Gathering
Start What is Information Gathering? (4:40)
Start Obtaining IP Address, Physical Address Using Whois Tool (9:57)
Start Whatweb Stealthy Scan (8:21)
Start Aggressive Website Technology Discovering on IP Range (9:50)
Start Note: Same Tools Different Results!
Start Gathering Emails Using theHarvester & Hunter.io (9:59)
Start How To Download Tools Online (10:34)
Start Finding Usernames With Sherlock (7:49)
Start Bonus - Email Scraper Tool In Python 3 (6:35)
Scanning
Start Theory Behind Scanning (7:19)
Start TCP & UDP (4:21)
Start Installing Vulnerable Virtual Machine (6:01)
Start Netdiscover (6:01)
Start Performing First Nmap Scan (8:52)
Start Different Nmap Scan Types (10:41)
Start ZTM Nmap Cheatsheet
Start Discovering Target Operating System (6:00)
Start Detecting Version Of Service Running On An Open Port (7:13)
Start Filtering Port Range & Output Of Scan Results (11:54)
Start What is a Firewall/IDS? (2:29)
Start Using Decoys and Packet Fragmentation (12:25)
Start Security Evasion Nmap Options (5:28)
Start Note: Time To Switch Things Up!
Python Coding Project #1 - Portscanner
Start The 2 Paths
Start Note: Do We Need To Learn Programming To Be An Ethical Hacker?
Start Coding a Portscanner in Python 3 (25:03)
Vulnerability Analysis
Start Finding First Vulnerability With Nmap Scripts (16:58)
Start Manual Vulnerability Analysis & Searchsploit (7:42)
Start Nessus Installation (5:35)
Start Discovering Vulnerabilities With Nessus (14:56)
Start Scanning Windows 7 Machine With Nessus (4:13)
Start Lets cool down for a bit! (1:14)
Exploitation & Gaining Access
Start What is Exploitation? (7:08)
Start What is a Vulnerability? (5:24)
Start Reverse Shells, Bind Shells .. (2:42)
Start Metasploit Framework Structure (13:53)
Start Msfconsole Basic Commands (16:53)
Start Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
Start Misconfigurations Happen - Bindshell Exploitation (4:41)
Start Information Disclosure - Telnet Exploit (4:06)
Start Software Vulnerability - Samba Exploitation (9:22)
Start Attacking SSH - Bruteforce Attack (11:56)
Start Exploitation Challenge - 5 Different Exploits (17:52)
Start Explaining Windows 7 Setup (8:46)
Start Eternal Blue Attack - Windows 7 Exploitation (12:33)
Start DoublePulsar Attack - Windows Exploit (15:04)
Start BlueKeep Vulnerability - Windows Exploit (9:35)
Start Note: We Can Also Target Routers!
Start Update 2 - Routersploit (6:25)
Start Update 3 - Router Default Credentials (7:02)
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
Start Note: Not Everything Will Work Smooth!
Start Setting Up Vulnerable Windows 10 (7:52)
Start Crashing Windows 10 Machine Remotely (6:52)
Start Exploiting Windows 10 Machine Remotely (13:59)
Gaining Access (Viruses, Trojans, Payloads ...)
Start Generating Basic Payload With Msfvenom (11:30)
Start Advance Msfvenom Usage Part 1 (9:48)
Start Advance Msfvenom Usage Part 2 (7:30)
Start Generating Powershell Payload Using Veil (14:36)
Start TheFatRat Payload Creation (7:43)
Start Note: My Payloads Are Getting Detected By An Antivirus!
Start Hexeditor & Antiviruses (7:09)
Start Making Our Payload Open An Image (8:10)
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
Start Post Exploitation Theory (4:26)
Start Meterpreter Basic Commands Part 1 (11:03)
Start Meterpreter Basic Commands Part 2 (10:21)
Start Elevating Privileges With Different Modules (8:55)
Start Creating Persistence On The Target System (7:57)
Start Post Exploitation Modules (8:05)
Start Exploitation Recap (4:00)
Python Coding Project #2 - Backdoor
Start What Are We Creating? (2:47)
Start Connecting Server And Backdoor (10:22)
Start Processing Instructional Commands (6:27)
Start Sending and Receiving Data (6:23)
Start Executing Commands And Compiling The Program (12:08)
Start Changing Directory Inside Of Our Backdoor (6:02)
Start Uploading & Downloading Files (10:59)
Start Testing All The Commands (8:55)
Start Note: You Can Continue Building Onto This Project!
Website Application Penetration Testing
Start Website Penetration Testing Theory (11:37)
Start HTTP Request & Response (4:03)
Start Information Gathering & Dirb Tool (8:10)
Start Burpsuite Configuration (7:57)
Start ShellShock Exploitation (15:51)
Start Command Injection Exploitation (11:55)
Start Getting Meterpreter Shell With Command Execution (9:18)
Start Reflected XSS & Cookie Stealing (16:16)
Start Stored XSS (9:06)
Start HTML Injection (7:12)
Start SQL Injection (21:32)
Start CSRF Vulnerability (12:49)
Start Hydra Bruteforce Attack Example 1 (10:56)
Start Hydra Bruteforce Attack Example 2 (7:06)
Start Burpsuite Intruder (7:34)
Python Coding Project #3 - Login Bruteforce, Directory Discovery
Start Creating 2 Programs (1:46)
Start Bruteforcer In Python (27:09)
Start Hidden Directory Discovery (12:10)
Man In The Middle - MITM
Start Theory - Man In The Middle Attack (8:03)
Start Bettercap ARP Spoofing (11:29)
Start Ettercap Password Sniffing (8:58)
Start Manually Poisoning Targets ARP Cache With Scapy (12:21)
Bonus - Wireless Access Point Cracking
Start Wireless Cracking Theory (5:48)
Start Putting Wireless Card In Monitor Mode (3:42)
Start Deauthenticating Devices & Grabbing Password (11:24)
Start Aircrack Password Cracking (7:35)
Start Hashcat Password Cracking (9:42)
Bonus: Gaining Access To An Android Device
Start Android Hacking Theory (3:31)
Start Android VM Install (5:50)
Start Gaining Access With Android Meterpreter (10:15)
Start Evil Droid (7:52)
Start Is it Flappy Bird or Malware (12:49)
Start Hack Any Device On Any Network With Ngrok (11:47)
Where To Go From Here?
Start Become An Alumni
Start Endorsements On LinkedIn
Start What's Next? (2:34)
Start Learning Guideline
Start Practice
Start Bug Bounty
Start Coding For Hackers
Start Exploit Development
Start Python Monthly
Learn Python Basics
Start What is a Programming Language? (6:24)
Start Python Interpreter (7:04)
Start How To Run Python Code (4:53)
Start Our First Python Program (7:43)
Start Latest Version Of Python (1:58)
Start Python 2 vs Python 3 (6:40)
Start Exercise: How Does Python Work? (2:09)
Learn Python Intermediate
Start Learning Python (2:05)
Start Python Data Types (4:46)
Start How To Succeed
Start Numbers (11:09)
Start Math Functions (4:29)
Start DEVELOPER FUNDAMENTALS: I (4:07)
Start Operator Precedence (3:10)
Start Exercise: Operator Precedence
Start Optional: bin() and complex (4:02)
Start Variables (13:12)
Start Expressions vs Statements (1:36)
Start Augmented Assignment Operator (2:49)
Start Strings (5:29)
Start String Concatenation (1:16)
Start Type Conversion (3:03)
Start Escape Sequences (4:23)
Start Formatted Strings (8:23)
Start String Indexes (8:57)
Start Immutability (3:13)
Start Built-In Functions + Methods (10:03)
Start Booleans (3:21)
Start Exercise: Type Conversion (8:22)
Start DEVELOPER FUNDAMENTALS: II (4:42)
Start Exercise: Password Checker (7:21)
Start Lists (5:01)
Start List Slicing (7:48)
Start Matrix (4:11)
Start List Methods (10:28)
Start List Methods 2 (4:24)
Start List Methods 3 (4:52)
Start Common List Patterns (5:57)
Start List Unpacking (2:40)
Start None (1:51)
Start Dictionaries (6:20)
Start DEVELOPER FUNDAMENTALS: III (2:40)
Start Dictionary Keys (3:37)
Start Dictionary Methods (4:37)
Start Dictionary Methods 2 (7:04)
Start Tuples (4:46)
Start Tuples 2 (3:14)
Start Sets (7:24)
Start Sets 2 (8:45)
Start Breaking The Flow (2:34)
Start Conditional Logic (13:17)
Start Indentation In Python (4:38)
Start Truthy vs Falsey (5:17)
Start Ternary Operator (4:14)
Start Short Circuiting (4:02)
Start Logical Operators (6:56)
Start Exercise: Logical Operators (7:47)
Start is vs == (7:36)
Start For Loops (7:01)
Start Iterables (6:43)
Start Exercise: Tricky Counter (3:23)
Start range() (5:38)
Start enumerate() (4:37)
Start While Loops (6:28)
Start While Loops 2 (5:49)
Start break, continue, pass (4:15)
Start Our First GUI (8:48)
Start DEVELOPER FUNDAMENTALS: IV (6:34)
Start Exercise: Find Duplicates (3:54)
Start Functions (7:41)
Start Parameters and Arguments (4:24)
Start Default Parameters and Keyword Arguments (5:40)
Start return (13:11)
Start Methods vs Functions (4:33)
Start Docstrings (3:47)
Start Clean Code (4:38)
Start
args and *
kwargs (7:56)
Start Exercise: Functions (4:18)
Start Scope (3:37)
Start Scope Rules (6:55)
Start global Keyword (6:13)
Start nonlocal Keyword (3:21)
Start Why Do We Need Scope? (3:38)
Start Modules in Python (11:47)
Start Quick Note: Upcoming Videos
Start Optional: PyCharm (8:19)
Start Packages in Python (10:45)
Start Different Ways To Import (7:03)
Learn Python 3: Error Handling
Start Errors in Python (6:11)
Start Error Handling (8:31)
Start Error Handling 2 (6:01)
Start Exercises: Error Handling (4:57)
Start Error Handling 3 (3:06)
Learn Python 4: File I/O
Start Working With Files In Python (8:32)
Start Read, Write, Append (7:23)
Start File Paths (6:53)
Start File IO Errors (2:23)
Start Exercise: Translator (9:55)
Start Next Steps
https://www.notion.so/Complete-Ethical-Hacking-Bootcamp-2022-Zero-to-Mastery-af4856797f944c9aa28cf5f2a1b2d645