filmov
tv
Cyber security - Ethical Hacking in 2022 - The basics
Показать описание
⛔⛔⛔⛔⛔Our videos and posts are designed to educate, introduce and demonstrate ethical hacking tools for penetration testing, programming skills and structural design for VEX Robotics and projects that we develop with Raspberry Pi. Skills demonstrated are purely for educational purposes only. We do not condone people who use these skills for illegal purposes and kindly ask people to credit our work if our content is reshared ⛔⛔⛔⛔⛔
This video has been designed for students who are studying cyber security and will demonstrate the following skills
1 - How to use Nmap on Kali Linux and conduct reconnaissance on a machine
2 - How brute force works and how to use Hydra with a wordlist
3 - How to conduct research on wireless networks and crack a wifi password using WiFite
4 - An introduction to Metasploit and how to use auxiliaries and exploits including eternal blue
5 - How to crack an NTLM hash with John the ripper
6 - Post exploit modules within Metasploit and how to remotely change the wallpaper of a target machine
7 - How to conduct a DOS attack for educational purposes
This lesson is designed for students who are studying IGCSE Computer Science with the aim to explore how tools are used in cyber security. I cannot stress enough that everything being demonstrated is purely for education purposes, if you are not one of my students, you can still follow this lesson by setting up the following hardware.
Hardware used
Kali Linux 2022.1 - You can install this on a VM or you can set it up on a Raspberry Pi
Wireless USB - we are using Alfa AC600 wireless adapters as well as Atheros adapters, you can use the built in wireless card in the Raspberry Pi as well
Windows 7 - You can configure Windows 7 on an old machine or set it up in a VM
00:00 ▶️ Introduction to cyber security and aims of the video
04:29 ▶️ Nmap and how to conduct reconnaissance
12:14 ▶️ An introduction to Bruteforce with Hydra
18:08 ▶️ Wireless attacks with WiFite
32:19 ▶️ Metasploit and how to use auxiliaries and exploits
43:11 ▶️ How to crack NTLM hashes with John the ripper
45:56 ▶️ Post exploit modules in Metasploit including how to change the wallpaper on a victim machine
52:54 ▶️ How DOS attacks work and how to use the DOS modules within Metasploit
hack
hacker
hacking
ethical hacking
ceh
oscp
try hack me
hack the box
hacking
ethical hacker
oscp certification
ctf for beginners
Комментарии