Ethical Hacking Course | Part 1/2 |

in hacking •  7 years ago 

This Course Contains:

00:10 Introduction to ethical hacking
08:02 Prerequisites for this course
15:41 Basic terminology: white hat, gray hat, black hat
46:00 VirtualBox installation
1:10:00 Creating a virtual environment
1:23:35 Installing VirtualBox on Windows
1:28:51 Kali Linux installation/setup
2:11:49 Linux terminal basics
2:50:51 Tor browser setup
3:16:56 Proxychains
3:56:31 Virtual private network
4:15:00 Changing your mac address with macchanger
4:38:17 Footprinting with network mapper (nmap) and external resources
5:25:29 Attacking wireless networks cracking WPA/WPA2
5:40:43 Aircrack-ng & reaver installation
5:53:27 Installing aircrack-ng on Windows & Crunch on Linux
6:05:02 Aricrack-ng & crunch hacking example
6:47:13 Cracking WPS pins with reaver pt.1
7:02:37 Cracking WPS pins with reaver pt.2
7:13:19 Cracking WPS pins with reaver pt.3
7:29:44 Performing denial of service attacks on wireless networks pt.1

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!