09:02 Prerequisites for this course 16:31 Basic terminology: white hat, gray hat, black hat 28:31 Basic terminology: SQL injections, VPN, proxy, VPS, and keyloggers 46:49 VirtualBox installation 55:48 VirtualBox installation through the repositories 1:10:50 Creating a virtual environment 1:24:25 Installing VirtualBox on Windows 1:29:41 Kali Linux installation/setup 1:57:59 VirtualBox Guest Additions installation 2:12:39 Linux terminal basics 2:22:11 Linux command line interface basics 2:51:41 Tor browser setup 3:17:46 Proxychains 3:57:21 Virtual private network 4:15:50 Changing your mac address with macchanger 4:39:07 Footprinting with network mapper (nmap) and external resources 5:26:19 Attacking wireless networks cracking WPA/WPA2 5:41:33 Aircrack-ng & reaver installation 5:54:17 Installing aircrack-ng on Windows & Crunch on Linux 6:05:52 Aricrack-ng & crunch hacking example 6:48:03 Cracking WPS pins with reaver pt.1 7:03:27 Cracking WPS pins with reaver pt.2 7:14:09 Cracking WPS pins with reaver pt.3 7:30:34 Performing denial of service attacks on wireless networks pt.1 7:43:48 Performing denial of service attacks on wireless networks pt.2 8:01:44 SSL strip pt.1 8:10:33 SSL strip pt.2 8:21:11 SSL strip pt.3 8:39:24 Funny things pt.1 8:46:28 Funny things pt.2 8:58:40 Funny things pt.3 9:17:02 Evil twin pt.1 9:27:37 Evil twin pt.2 9:35:05 Evil twin pt.3 9:46:24 Using known vulnerabilities pt.1 9:56:04 Using know vulnerabilities pt.2 10:05:25 Using known vulnerabilities pt.3 10:24:20 Post authentication exploitation (DNS) pt.1 10:33:58 Post authentication exploitation (DNS) pt.2 10:46:20 Post authentication exploitation (DNS) pt.3 11:00:01 SQL injection pt.1 11:12:34 SQL injection pt.2 11:27:20 SQL injection pt.3 11:40:42 SQL injection pt.4 11:52:06 SQL injection pt.5 12:09:02 Brute force methods for cracking passwords cracking hashes 12:21:06 Cracking linux passwords with john the ripper pt.1 12:33:51 Cracking linux passwords with john the ripper pt.2 12:42:41 Cracking windows passwords with john the ripper 13:02:06 Hydra usage pt.1 13:19:20 Hydra usage pt.2 13:37:41 DoS attack pt.1 introduction to denial of service attacks 13:56:18 DoS attack pt.2 combine slowloris.pl with nmap 14:04:38 DoS attack pt.3 featuring hackers.org 14:14:24 Intro to metasploit and reverse shells 14:32:52 Metasploit starting from a two terminal setup 14:51:16 Making reverse shells persistent on another system and escalating privileges 15:07:51 Creating a persistent shell with metasploit 15:18:48 Using netcat to make any kind of connection you may need 15:38:49 How to upload a reverse shell onto a web server