Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video4:19
Curated Video

Crack Passwords with Rainbow Tables

Higher Ed
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video0:59
Curated Video

Root User Color Coding

Higher Ed
This video will show you how to change the color of the terminal when using a root user
Instructional Video3:43
Curated Video

Identify a DNS Zone Transfer Vulnerability

Higher Ed
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video2:01
Curated Video

Master KALI Desktop Environment

Higher Ed
Before crafting attacks, get familiar with the desktop environment of Kali linux
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video1:31
Curated Video

Security Misconfiguration

Higher Ed
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video0:48
Curated Video

Components with Known Vulnerabilities

Higher Ed
This video will explain the drawbacks of using off the shelf components on your web application
Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool