Ethical Hacking Course | Part 1/2 |
This Course Contains:
00:10 Introduction to ethical hacking
08:02 Prerequisites for this course
15:41 Basic terminology: white hat, gray hat, black hat
46:00 VirtualBox installation
1:10:00 Creating a virtual environment
1:23:35 Installing VirtualBox on Windows
1:28:51 Kali Linux installation/setup
2:11:49 Linux terminal basics
2:50:51 Tor browser setup
3:16:56 Proxychains
3:56:31 Virtual private network
4:15:00 Changing your mac address with macchanger
4:38:17 Footprinting with network mapper (nmap) and external resources
5:25:29 Attacking wireless networks cracking WPA/WPA2
5:40:43 Aircrack-ng & reaver installation
5:53:27 Installing aircrack-ng on Windows & Crunch on Linux
6:05:02 Aricrack-ng & crunch hacking example
6:47:13 Cracking WPS pins with reaver pt.1
7:02:37 Cracking WPS pins with reaver pt.2
7:13:19 Cracking WPS pins with reaver pt.3
7:29:44 Performing denial of service attacks on wireless networks pt.1