You’ll learn basic commands, how to prepare an ethical hacking environment on your computer, how to gather information using footprinting tools, how to scan networks and Wi-Fi so that you can access a network, how to test a web network to see if it can be penetrated, and how to crack WPA2 secured Wi-Fi networks. Outline and Timestamps?
Section 1: Introduction and Installation!
7:06 Before We Begin!
11:50 Virtual Box Install Tutorial
27:27 Kali Linux Install Tutorial
41:24 Going Full Screen in Kali Linux!
Section 2: Basic Commands!
59:41 Basic Commands Part 1
1:09:23 Basic Commands Part 2
1:30:29 Basic Commands Part 3
Section 3: Prepare Your Lab!
1:43:17 Changing IP address and setting up Wireless Adapter.
1:48:11 Creating Bootable Kali USB.
1:53:11 Important Networking Terms.
2:03:30 Important Hacking Terms.
2:21:34 Few Things to Do After Installing Kali Linux.
2:30:06 Changing Our Mac Address - MacChanger.
Section 4: Footprinting!
2:36:33 Google Hacking.
2:49:44 Nikto Basics.
3:00:40 Whois Tool.
3:07:20 Email Harvesting.
3:13:29 Shodan.
3:23:53 Zone Transfer With Dig.
Section 5: Scanning!
3:31:02 Installing Metasploitable.
3:38:02 Nmap.
4:17:44 Zenmap
4:25:39 TCP scans.
4:41:31 Nmap Bypassing Defences
4:58:54 Nmap Scripts.
Section 6: Web Penetration Testing!
5:22:24 Installing Owasp.
5:30:51 HTTP request.
5:40:52 HTTP Response.
5:51:21 Burpsuite Configuration.
6:04:12 Editing Packets in Burpsuite.
6:16:32 Whatweb & Dirb.
6:26:44 Password Recovery Attack.
6:42:18 Burpsuite Login Bruteforce.
6:53:23 Hydra Login Bruteforce.
7:02:11 Session Fixation.
7:16:06 Injection Attacks.
7:21:41 Simple Command Injection.
7:32:50 Exploiting Command Injection Vulnerability.
7:40:34 Finding Blind Command Injection.
7:54:20 Webpentest - Basics Of SQL.
8:04:46 Manual SQL Injection.
8:39:01 SQLmap basics.
8:55:38 XML Injection.
9:11:37 Installing XCAT and Preventing Injection Attacks.
9:17:30 Reflected XSS.
9:28:22 Stored XSS.
9:40:22 Changing HTML Code with XSS.
9:47:56 XSSer & XSSsniper.
Section 7: WPA2 Cracking!
10:01:35 Wireless Attacks Theory.
10:12:27 Putting Network Card in Monitor Mode…
10:17:08 Capturing Handshake With Airodump.
10:31:49 RockYou.txt.
10:45:48 Cracking with Aircrack.
11:01:23 Cracking with Hashcat.
11:16:22 Making Password Lists With Crunch.
11:34:44 Making Password Lists With Cupp.
#ethicalhacking #wifiethicalhacking #kali-linux