Ethical Hacking in 12 Hours - Full Course - Learn to Hack!

preview_player
Показать описание

A shout out to all those involved with helping out on this course:

Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.

0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion

❓Info❓
___________________________________________

📱Social Media📱
___________________________________________

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:

My Build:

My Recording Equipment:

Рекомендации по теме
Комментарии
Автор

Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info:


A shout out to all those involved with helping out on this course:

Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.

0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion

TCMSecurityAcademy
Автор

I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet on subnetting so far. Amazing material

zeynepsenatnaz
Автор

this video lasted longer than my friends relashionship.

bobbyscrelcher
Автор

What a great guy and even a better mentor!! Added this to my playlist on youtube and look forward to checking back in on your content! Hope all is well, keep up the great content!

johnnymakris
Автор

I must say as a Network Engineer myself, that subnet sheet is very useful!

newcastleify
Автор

Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.

epicinstrumentalmusic
Автор

You had me at "give back to the community"! Subscribed and will set time aside to watch the full 12 hrs. Thank you!

FM-jojh
Автор

Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.

michaelb
Автор

Really have been enjoying this video and your other videos. Excited to keep learning more and more!

hughstonrogers
Автор

Thank you very much, man!
I really enjoyed this 12-hour journey (it took much more than that). Learnt lots of stuff about hacking and IT. Thank you!

mikhailshkaralevich
Автор

Thanks Heath, this has been great and you are very good at simplifying it for those of us who are new to the field. I will likely buy several of your next lessons and look forward to learning more from you. Maybe we will work together in the future.

jdt
Автор

Saying “thank you” is not enough to show my gratitude to you MetaspyClub . An honor to work under your guidance. Thank you for everything and mostly important the phone tracking was so satisfying

berattatar
Автор

Ohh my.... from the course content and time stamp, this is extensive.

Thanks a lot Heath.
This is more than a new year gift 🎁.

testimony
Автор

Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.

barleymarrah
Автор

Hardly do training courses like this all the way through, but I'm almost 10 hours in and it's totally worth it!

weidup
Автор

I really like listening to you man… You’re a really nice guy and cover all the bases. I just jumped into this by accident but I’m so interested that I watched the whole vid and now I’ve started looking into studying this subject … thank you man.

DuncanMcPheeHandymanSolutions
Автор

You’re an amazing teacher. I’m so happy I found this video!

amonrah
Автор

Hey *Metaspyclub* what an amazing work this has been and with all the crazy detection that you guys make possible. You guys take hacking to a whole new level and get the job done ASAP!!! I'm wondering what are all your personal qualifications?I don't think that it was ever mentioned before.

manyakmne
Автор

Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!

pimoens
Автор

Thank you for your hard work and dedication poured into making this video. I am deeply grateful to you. Great and informative for a complete newbie like myself. The timestamps helped as well, I work with python a lot so I was glad when I could skip a few hours of the video hahaha. Will also definitely be purchasing your other contents after I finished with this video.

negimagics
welcome to shbcf.ru