Introduction to Ethical Hacking |
|
Basics of Networking Part – 1 |
|
00:00:00 |
Job Acceleration Program (JAP) |
|
Knowing JAP |
|
00:00:00 |
|
Elaborating JAP |
|
00:00:00 |
|
Overview of Cybercrime – part 3 (Email related crimes,Financial crimes) |
|
00:00:00 |
|
Ovewview of Cybercrime- part5(Other cybercrime, Reasons for commission of cybercrime), |
|
00:00:00 |
|
About Cybersecurity |
|
00:00:00 |
|
Introduction to Kali Linux |
|
00:00:00 |
Chalo INDIA Startup Drive |
|
All about Chalo India Startup drive |
|
00:00:00 |
|
Linux Basic Commands – Part 1 |
|
00:00:00 |
|
Linux Basic Commands – Part 2 |
|
00:00:00 |
|
Linux Advance Commands – Part 2 |
|
00:00:00 |
|
Introduction to Hacking Phases |
|
00:00:00 |
|
Introduction to Footprinting |
|
00:00:00 |
|
Introduction to Ethical Hacking |
|
00:00:00 |
Networking Basics |
|
Networking ļæ½ļæ½ļæ½ Electricity in Computing |
|
00:00:00 |
|
Networking Layers |
|
00:00:00 |
Linux Basics |
|
Learning Linux Part ļæ½ļæ½ļæ½ 1 |
|
00:00:00 |
|
Learning Linux Part ļæ½ļæ½ļæ½ 2 |
|
00:00:00 |
|
Building our Lab |
|
00:00:00 |
|
Ethical Hacking Methodology |
|
00:00:00 |
|
AVODHA Official Kannada YouTube Channel |
|
00:00:00 |
Data Intelligence |
|
Passive Information Gathering |
|
00:00:00 |
|
OSINT-Maltego |
|
00:00:00 |
|
OSINT-Recon |
|
00:00:00 |
|
OSINT-theHarvester |
|
00:00:00 |
|
OSINT-Shodan |
|
00:00:00 |
|
DNS-Enumeration |
|
00:00:00 |
|
DNS-Zone Transfer |
|
00:00:00 |
|
Google Dorks |
|
00:00:00 |
|
Dare & Milestones |
|
00:00:00 |
Scanning |
|
Introduction and NMAP |
|
00:00:00 |
|
NMAP Basic Scanning |
|
00:00:00 |
|
NMAP Multiple Targets |
|
00:00:00 |
|
TCP Connect Scan |
|
00:00:00 |
|
Stealth Scan |
|
00:00:00 |
|
ACK Probe |
|
00:00:00 |
|
Service and OS detection |
|
00:00:00 |
|
Aggressive Scanning |
|
00:00:00 |
|
UDP Scanning |
|
00:00:00 |
|
NMAP Output |
|
00:00:00 |
|
Docker |
|
00:00:00 |
|
Webmap |
|
00:00:00 |
|
Introduction to Scripting |
|
00:00:00 |
Vulnerability Assessment |
|
Introduction to Vulnerability |
|
00:00:00 |
|
VALC ļæ½ļæ½ļæ½ Vulnerability Assessment Life Cycle |
|
00:00:00 |
|
Using NMAP to find Vulnerability |
|
00:00:00 |
Nessus |
|
Nessus |
|
00:00:00 |
Exploitation |
|
Introduction to Exploitation |
|
00:00:00 |
|
Manual Exploitation |
|
00:00:00 |
|
Reverse Shell and Bind shell |
|
00:00:00 |
|
Staged and Non-Staged Payloads |
|
00:00:00 |
|
Automatic Exploitation |
|
00:00:00 |
|
Exploitation Box |
|
00:00:00 |
Steganography |
|
Introduction to Steganography |
|
00:00:00 |
|
Technical Steganography |
|
00:00:00 |
|
Linguistic Steganography |
|
00:00:00 |
|
Hiding message using Steganography |
|
00:00:00 |
|
Password Cracking |
|
00:00:00 |
|
Active online attack |
|
00:00:00 |
|
Offline attack |
|
00:00:00 |
|
Steganography and Password Cracking Challenge |
|
00:00:00 |
Steganography and Password Cracking Challenge
00:00:00
Shell Scripting |
|
Introduction to Shell Scripting |
|
00:00:00 |
|
Text Editor |
|
00:00:00 |
|
Naming & Permission of Shell Script |
|
00:00:00 |
|
Shell Scripting ā Hello World |
|
00:00:00 |
|
Shell Scripting ā Why? |
|
00:00:00 |
|
User Defined Variables |
|
00:00:00 |
|
System Variables |
|
00:00:00 |
|
Command Line Argument |
|
00:00:00 |
|
Read Command |
|
00:00:00 |
|
Command Substitution |
|
00:00:00 |
|
For Loop |
|
00:00:00 |
|
Functions |
|
00:00:00 |
|
While Loop |
|
00:00:00 |
|
Until Loop |
|
00:00:00 |
|
If Else Condition |
|
00:00:00 |
|
Case Statement |
|
00:00:00 |
|
Bash Debugging |
|
00:00:00 |
Social Engineering |
|
Introduction to Social Engineering |
|
00:00:00 |
|
Relevance of Social Engineering |
|
00:00:00 |
|
Human Based Social Engineering |
|
00:00:00 |
|
Computer Based Social Engineering |
|
00:00:00 |
|
Phishing |
|
00:00:00 |
|
Mobile Based Social Engineering |
|
00:00:00 |
|
DoppelgƤnger Domain |
|
00:00:00 |
Web Application Pentesting |
|
Introduction to Web App Pentesting |
|
00:00:00 |
|
Bug Hunting Platforms |
|
00:00:00 |
|
Introduction to recon |
|
00:00:00 |
|
Enumerating Subdomains ā Sublist3r |
|
00:00:00 |
|
Enumerating Subdomains ā Assetfinder |
|
00:00:00 |
|
Finding Live Domains |
|
00:00:00 |
|
Sorting Live Subdomains |
|
00:00:00 |
Create Shell Script for Recon
00:00:00
|
Enumerating Subdomains ā Gobuster |
|
00:00:00 |
OWASP |
|
Introduction to OWASP Top 10 |
|
00:00:00 |
|
Injection |
|
00:00:00 |
|
Manual SQL Injection |
|
00:00:00 |
|
Configuring Burpsuite |
|
00:00:00 |
|
Automated SQL Injection |
|
00:00:00 |
|
Command Injection |
|
00:00:00 |
|
Injection prevention |
|
00:00:00 |
|
Broken Authentication |
|
00:00:00 |
|
Credential Stuffing |
|
00:00:00 |
|
Broken Authentication ā Prevention |
|
00:00:00 |
|
Sensitive Data Exposure |
|
00:00:00 |
|
Sensitive Data Exposure- Prevention |
|
00:00:00 |
|
XML External Entities (XXE) |
|
00:00:00 |
|
Insecure Direct Object Reference (IDOR) |
|
00:00:00 |
|
Security Misconfiguration |
|
00:00:00 |
|
Broken Access Control |
|
00:00:00 |
|
Cross Site Scripting |
|
00:00:00 |
|
XSS Exploitation |
|
00:00:00 |
|
Insecure Deserialization |
|
00:00:00 |
|
Using Components with Known vulnerabilities |
|
00:00:00 |
|
Insufficient Logging and Monitoring |
|
00:00:00 |
|
Clickjacking |
|
00:00:00 |
|
Broken Link Hijacking |
|
00:00:00 |
|
Cross Site Request Forgery (CSRF) |
|
00:00:00 |
|
No Rate limiting |
|
00:00:00 |
|
HSTS |
|
00:00:00 |
|
Server Side Request Forgery(SSRF) |
|
00:00:00 |
|
Subdomain Takeover |
|
00:00:00 |
|
Report Writing |
|
00:00:00 |
|
HI ,THIS IS THE NEW CHALLENGE CRACK THE VM |
|
00:00:00 |
CRACK THE VM
Unlimited
Cryptography |
|
Introduction to Cryptography |
|
00:00:00 |
|
Objectives of Cryptography |
|
00:00:00 |
|
Types of cryptography |
|
00:00:00 |
|
Encoding & Decoding |
|
00:00:00 |
|
symetric key encryption |
|
00:00:00 |
|
WORKING OF DES |
|
00:00:00 |
|
ASYMMETRIC KEY CRYPTOGRAPHY |
|
00:00:00 |
|
E-MAIL ENCRYPTION |
|
00:00:00 |
|
Hashing |
|
00:00:00 |
|
Checking File Integritiy |
|
00:00:00 |
|
SSH |
|
00:00:00 |
|
Cryptanalysis |
|
00:00:00 |
|
ssl |
|
00:00:00 |
|
Crpytanalysis_practical |
|
00:00:00 |
|
Disk Encryption |
|
00:00:00 |
WEB PRESENCE |
|
Network Insecurity |
|
00:00:00 |
|
Sniffing & Spoofing |
|
00:00:00 |
|
Spoofing, crypto, and wifi |
|
00:00:00 |
|
DEMO ā tcpdump |
|
00:00:00 |
NETWORK PENTESTING |
|
Introduction to Network Pentesting |
|
00:00:00 |
|
Network Basics |
|
00:00:00 |
|
Connecting a Wireless Adapter To Kali |
|
00:00:00 |
|
What is MAC Address & How To Change It |
|
00:00:00 |
Android Pentesting |
|
Introduction to Android |
|
00:00:00 |
|
Android Architecture |
|
00:00:00 |
|
Android App Structure Intents |
|
00:00:00 |
|
Android App Structure-Broadcast Receive |
|
00:00:00 |
Lab Setup |
|
Setting up Genymotion |
|
00:00:00 |
|
Connecting Genymotion with Burpsuite |
|
00:00:00 |
|
Jadx setup |
|
00:00:00 |
|
Drozer Setup |
|
00:00:00 |
OWASP Top 10 |
|
M1: Improper Platform Usage |
|
00:00:00 |
|
M2: Insecure Data Storage |
|
00:00:00 |
|
M3: Insecure Communication |
|
00:00:00 |
|
M4: Insecure Authentication |
|
00:00:00 |
|
M5: Insufficient Cryptography |
|
00:00:00 |
|
M6: Insecure Authorization |
|
00:00:00 |
|
M7: Client Code Quality |
|
00:00:00 |
|
M7: Client Code Quality |
|
00:00:00 |
|
M8: Code Tampering |
|
00:00:00 |
|
M9: Reverse Engineering |
|
00:00:00 |
|
M10: Extraneous Functionality |
|
00:00:00 |
|
Reversing APK -1 |
|
00:00:00 |
|
Reversing APK-2 |
|
00:00:00 |
Static Analysis |
|
Hardcording Issues |
|
00:00:00 |
|
MobSF setup |
|
00:00:00 |
|
MobSF Static analysis |
|
00:00:00 |
Dynamic Analysis |
|
Dynamic Analysis using Logcat |
|
00:00:00 |
|
Dynamic Analysis using Drozer (SQL Injection) |
|
00:00:00 |
|
No rate Limiting attack |
|
00:00:00 |
|
Dynamic analysis using MobSF |
|
00:00:00 |
QUIZ SECTION |
|
Learning Linux Quiz |
|
00:01:00 |
|
Networking Quiz |
|
00:02:00 |
|
ACK Quiz ā Internet Research Quiz |
|
00:01:00 |
|
Scanning Quiz-1 |
|
00:02:00 |
|
Google Dorks Quiz |
|
00:02:00 |
|
Shell Scripting Quiz |
|
00:01:00 |
|
Subdomain & X-Request QUIZ |
|
00:02:00 |
|
Ethical Hacking OWASP Quiz |
|
00:02:00 |
|
Quiz – 1 |
|
00:04:00 |
BONUS LECTURE |
00:00:00