Books & Videos

Table of Contents

Chapter: Introduction

What You Should Expect From The Video

04m 12s

What Is Hacking?

03m 28s

Why Do We Hack?

05m 25s

Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc)

06m 5s

Being Ethical

03m 24s

Legal Issues Around Hacking

06m 30s

Methodology

06m 56s

Types Of Attacks

08m 19s

Skills Necessary And Skills To Be Learned

06m 3s

What Is Penetration Testing/Scope?

08m 38s

Chapter: Getting The Background - Footprinting And Reconnaissance

What Is Footprinting?

04m 15s

History Lessons - Way Back Machine

05m 37s

Using Your Resources - Job Listings, People Searches, Social Networks

04m 42s

Using Whois Lookups

06m 35s

Using DNS To Extract Information

07m 7s

Finding Network Ranges

05m 15s

Google Hacking

03m 41s

Mining For Information Using Google Hacking

05m 5s

Google Hacking Database

04m 43s

Chapter: Networking Fundamentals

History Of TCP/IP

07m 6s

Using Wireshark To Examine Packets

05m 40s

OSI And IP Models

08m 46s

Addressing

03m 43s

UDP

05m 14s

TCP

08m 6s

Services

05m 46s

Using Wireshark For Deep Analysis

08m 44s

DHCP

09m 23s

Using ARP

09m 34s

Chapter: Cryptography

History Of Cryptography

07m 25s

Types Of Cryptography

07m 2s

Public Key

04m 35s

Certificates

08m 18s

Hashing

05m 35s

AES, DES, 3DES

05m 53s

SSL/TLS

07m 46s

SSH

06m 55s

Disk Encryption

04m 19s

Cryptographic Analysis

03m 43s

Chapter: Scanning And Enumeration

Types Of Scans

07m 45s

Using NMAP

03m 48s

Other Types Of Scans

07m 4s

Using hping And Its Uses

06m 28s

War Dialing

03m 54s

IDS Evasion

06m 53s

Banner Grabbing

08m 42s

Vulnerability Scanning

05m 50s

Using Nessus

08m 55s

Enumeration Techniques

06m 47s

SNMP

09m 6s

LDAP

08m 40s

Using Proxies

05m 43s

Tor And Anonymizers

05m 19s

Tunneling

06m 39s

Chapter: Penetration

Goals

07m 49s

Password Cracking And Complexity

07m 11s

Password Attacks - Chapter 6

05m 42s

Password Storage Techniques

04m 34s

Privilege Escalation

06m 13s

Spyware, Rootkits And Key Loggers

07m 52s

Metasploit Basics

04m 55s

Auditing/Logging

08m 4s

Metasploit Again

04m 24s

Chapter: Malware - Trojans, Backdoors, Viruses And Worms

Definitions And History

05m 4s

Detection Of Malware

06m 19s

Anti-Virus Evasion

04m 32s

Deployment Of Malware

04m 58s

Virus Types

06m 5s

Malware Analysis

06m 0s

Windows ADS And Hiding Malware

05m 41s

Doing Debugging - OllyDbg

09m 0s

Packing And Automated A/V Maker Tools

03m 37s

More Malware Analysis

06m 6s

Chapter: Denial Of Service Attacks

What Is DoS? DDoS?

04m 51s

DoS Attacks

06m 4s

Cyber Crime

06m 48s

Botnets

06m 58s

Attack Countermeasures - Flooding

08m 56s

Chapter: Web Application Hacking

What Is Web Application Testing?

04m 56s

Web Application Architecture

05m 13s

Web Testing Tools

05m 26s

Cross Site Scripting

04m 13s

SQL Injection

05m 1s

Cross Site Request Forgery

04m 52s

Session Hijacking And Attacks And Cookies

06m 56s

Password Attacks - Chapter 9

05m 26s

Encoding

03m 48s

Chapter: Wireless Networking

Wireless Networking

04m 56s

Encryption Techniques - WEP, WPA, WPA2

06m 43s

Finding Hotspots

07m 23s

Breaking WEP Encryption

06m 41s

Rogue Access Points And Attacks

04m 52s

Wireless Sniffing

04m 44s

Protecting Wireless Networks

06m 42s

Chapter: Detection Evasion

What Is Evasion And Why Do We Use It?

03m 59s

Steganography

05m 8s

Chapter: Programming Attacks

Stacks And Heaps

05m 17s

Buffer Overflows

07m 47s

Protecting Against Buffer Overflow Attacks

08m 9s

Format String

04m 57s

De-Compilation

04m 21s

Reverse Engineering

05m 9s

Chapter: About The Author

About Me

02m 13s