Module 1: Installing VMware and Virtual Machine
Installing VMware and Kali Linux
Host and Guest systems
About Virtual Machines
Recommended Specs
Resources
Module 2: Networking basics
Dawnlode Cisco Packet Tracer
Using Packet Tracer
Networking 1
Networking 2
Topologies
Ifconfig
Ipconfig /all
Public vs Private IP Address
Assigning IP Address (IPv4) Linux
Assigning IP Address (IPv4) Windows
How Websites Work (Show Content)
Origin-IP & WAF/CDNs
Module 3: Networking Traffic Analysation
Intercepting Traffic
Module 4: How to use and navigate around Kali Linux system
Getting to know Kali
Learning Kali Linux From A - Z (1 Hour Long Video)
Auto-Filling in Linux & Windows
Avoiding using SUDO or ROOT for everything.
Linux Permissions
Resolving IP Address to Hosts / Domains
Module 5: Wordlists
What are wordlists?
Extracting .gz files and rockyou.txt
Creating Profiling Wordlists (cupp.py)
Module 6: Hacking Linux - From Recon to Privilege Escalation
Installing a Victim Ubuntu Linux Machine - Vulnhub
Recon - Nmap
Recon - Finding an exploit/vulnerability
MSFConsole - Setting up
MSFConsole - Exploitation
Transferring Files with Python3. Victim To Kali
File transfer using Python 3. Kali to Victim
Cracking User Passwords
Creating Users
Module 7: Hacking Windows - From Recon to Privilege Escalation
Installing a Windows Machine
Setting Up New Users & Giving Admin Access
Exploiting SMB
Module 8: Reverse Shells by files
MSFVenom - Linux Reverse Shell
Avoiding SUDO or ROOT for everything
Module 9: Hydra - Brute Forcing
What is Hydra & Cracking First Service/Port Pass
Using Hydra on Different Ports
Cracking HTTP-Basic Auth
Module 10: John The Ripper
What is John The Ripper?
Cracking ZIP Passwords & Using John The Ripper
Creating & Cracking PDFs
Module 11: Anonymization
Proxychains
Tor Browser
Module 12: Hacking Wordpress
Using WPScan - A Wordpress hacking tool
Running a Dictionary Attack to find credentials
Getting a reverse Shell
Extracting Database Credentials
Module 13: Directory Busting
Gobuster - Finding hidden websites
Using FFUF - Find Hidden Files/Directories/Subdomains & Brute Forcing
Module 14: Common Exploits / Misconfigurations
Default Credentials
FTP Anonymous Login
Services On Different Ports
No Auth Check
Module 15: Hashcat - Password Cracking / Hashing Tool
What are Hashes?
Basic Usage of Hashcat - Wordlist + Hash
HashID
Module 16: Burpsuite Tutorials
What is Burpsuite?
Setting up Burpsuite - CA Certificate and Proxy
Intercepting Requests (Proxy)
Using Repeater
Using Intruder (Example of Brute Force)
Example of UserID Parameter Vulnerability
Why Burpsuite is very useful
Module 17: Website Exploitation
Introduction - Read!
Extensions To Install
Client Side Code
Introduction To Web Hacking & Dev Tools are powerful!
Important Websites For Hacking
OWASP - Important Website.
Example of Website Hacking
Path Traversal Example - Simple Case
Upload Vulnerabilities #1
Subdomain Enumeration
Open Redirect and Reverse Hashing
Server Side Request Forgery (SSRF)
Module 18: Wi-Fi Hacking
Wi-Fi Hacking - Best Practice
Enabling monitoring mode
Using WIFITE (Cracking Wi-Fi password)
Module 19: Databases
Reading Databases With SQLITE
Module 20: Programming
Installing Basics (Python + VSCode)
Lesson #1 - Simple HTTP Request
Lesson #2 - Screengrabbing
Module 21: Web scripting - Javascript, HTML & Other Related
Important Websites
Basic HTML
XSS - Cross Site Scripting (Reflected)
XSStrike.py
Escaping HTML Tags, Injecting Payloads & Understanding Basic XSS
Hardcoded Credentials in HTML (Real Target Example)
Module 22: Watch Me Hack - Learn How To Hack
How To Play CTF?
#TryHackMe CTF1 - HA Joker
Root-me.org - Realistic Level 1
#HackTheBox CTF 1 - Easy BoardLight Box
RingerZer0ctf.com - Admin Portal
Module 23: Open Internet Intelligence
Shodan
Google Dorking
Module 24: Future careers and making money with hacking skills
Bug Bounty
Module 25: What's next?
Making Mistakes = Learning
The Reality Of Becoming Great.
Recommended Websites to learn Hacking