In this video, we have talked about 4 types of Hacking techniques.
1. System Penetration Testing
2. Website Penetration Testing
3. Network Penetration Testing
Jump to your favorite part:
00:00:49 Content Disclaimer
00:01:25 Course Introduction
00:05:55 How to Install Kali Linux
00:18:50 How to install metasploitable?
00:24:30 How to install windows 8.1 for exploiting it?
00:32:35 How many types of Penetration Testing?
00:38:25 How to perform advanced OSINT and Information Gathering?
00:44:10 How to perform vulnerability assesment?
00:54:44 Introduction to metasploit and how metasploit works?
01:03:40 How to create the payload to get the reverse shell?
01:10:00 How to get reverse shell using msfconsole?
01:16:04 How to create undetectable payload which can bypass windows system?
01:23:05 How to install and use VEIL EVASION?
01:28:35 How hackers hack webcam and facebook account of victim? How to protect yourself?
01:34:45 Introduction to website penetration testing
01:40:40 How to install and setup burpsuite proxy?
01:46:40 What is INTRUDER and REPEATER in burpsuite and How to use them?
01:55:45 Theory behind “REMOTE CODE EXECUTION” vulnerability?
02:00:15 How hackers exploit “REMOTE CODE EXECUTION vulnerability?
02:10:50 Introduction to Network Penetration Testing
02:15:55 How to sniff WIFI routers?
02:21:40 How to perform the deauthentication attack against WIFI routers?
02:29:10 How to capture WPA2 WIFI handshake?
02:34:13 How to create your own wordlist to crack WIFI passwords?
02:38:52 How to crack WPA2 WIFI passwords using AIRCRACK-NG?
02:41:48 How to crack the WIFI passwords faster using the help of the GPU?
[ad_2]
source