Introduction
  • Introduction
  • What's New in Kali
  • Setting up the Lab Environment
  • Updating Kali
  • Basics of Ethical Hacking
  • Understanding Methodology
Phase 1 - Reconnaissance
  • Overview - Reconnaissance
  • Recon Tool - Spiderfoot
Phase 2 - Scanning
  • Overview - Scanning
  • Scanning Tool - NMAP Basic
  • Scanning with NMAP
Phase 3 - Gaining Access
  • Overview - Gaining Access
  • Creating Exploit Tool - Metasploit Basic
  • Cracking Hashes - Hashcat
  • Cracking Hahses - Sha1
  • Cracking Hashes - Unknown
  • Cracking Password - Hashcat
  • Cracking Passwords - Easy
  • Cracking Passwords - Easy2
  • Cracking Passwords - Normal
  • Cracking Passwords - Hard
Phase 4 - Maintaining Access
  • Overview - Maintaining Access
  • Uploading second Malware Tool - Maintaining Access
Phase 5 - Clearing Tracks
  • Overview - Clearing Tracks
  • Meterpreter Clearing Logs Tool - Clearing Tracks
Wrap-up
  • BONUS