Ethical Hacking in 12 Hours - Full Course - Learn to Hack! - thinkfaststudio.com

Ethical Hacking in 12 Hours – Full Course – Learn to Hack!

The Cyber Mentor
Views: 1581565
Like: 64328
Full Course:
All Course Resources/Links:

A shout out to all those involved with helping out on this course:

Alek – Creating “Academy”, “Dev”, and “Black Pearl” Capstone machines and a Discord Admin.
Dewalt – The one man Army of a five star support team.
Dwight – Discord Admin and awesome hacker.
Grimmie – Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle – Creating the “Blue” Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian – The OG Discord Admin with French Bulldogs I’d like to steal.
Rumham – Discord Admin, lover of rum and hams, and overall great guy.

0:00 – Introduction/whoami
6:20 – A Day in the Life of an Ethical Hacker
23:14 – Effective Notekeeping
29:58 – Important Tools
35:23 – Networking Refresher: Introduction
36:39 – IP Addresses
49:50 – MAC Addresses
53:07 – TCP, UDP, & the Three-Way Handshake
58:25 – Common Ports & Protocols
1:04:39 – The OSI Model
1:10:14 – Subnetting
1:37:17 – Installing VMWare / VirtualBox
1:43:37 – Installing Kali Linux
1:50:11 – Configuring VirtualBox
1:53:32 – Kali Linux Overview
1:57:05 – Sudo Overview
2:02:22 – Navigating the File System
2:14:26 – Users & Privileges
2:23:54 – Common Network Commands
2:29:50 – Network Commands Update
2:31:49 – Installing & Updating Tools
2:41:01 – Installing gedit
2:42:46 – Viewing, Creating, & Editing Files
2:48:49 – Scripting with Bash
3:11:28 – Intro to Python
3:13:52 – Strings
3:21:25 – Math
3:27:24 – Variables & Methods
3:38:41 – Functions
3:49:40 – Boolean Expressions
3:54:14 – Relational & Boolean Operators
4:01:13 – Conditional Statements
4:10:13 – Lists
4:20:41 – Tuples
4:23:16 – Looping
4:28:18 – Importing Modules
4:34:24 – Advanced Strings
4:47:47 – Dictionaries
4:55:23 – Sockets
5:00:55 – Building a Port Scanner
5:21:09 – The 5 Stages of Ethical Hacking
5:26:31 – Passive Recon Overview
5:34:07 – Identifying Our Target
5:37:46 – Discovering Email Addresses
5:53:38 – Breached Credentials Part 1
6:01:00 – Breached Credentials Part 2
6:13:00 – Hunting Subdomains Part 1
6:18:35 – Hunting Subdomains Part 2
6:23:30 – Identifying Website Technologies
6:30:39 – Gathering Information w/ Burp Suite
6:39:33 – Google Fu
6:45:09 – Utilizing Social Media
6:50:49 – Installing Kioptrix
6:57:12 – Scanning w/ Nmap
7:17:04 – Enumerating HTTP/HTTPS Part 1
7:32:09 – Enumerating HTTP/HTTPS Part 2
7:47:22 – Enumerating SMB
8:01:46 – Enumerating SSH
8:05:59 – Researching Potential Vulnerabilities
8:20:54 – Our Notes So Far
8:24:03 – Scanning w/ Nessus Part 1
8:34:42 – Scanning w/ Nessus Part 2
8:40:57 – Reverse Shells vs Bind Shells
8:48:02 – Staged vs Non-Staged Payloads
8:51:27 – Gaining Root w/ Metasploit
8:59:13 – Manual Exploitation
9:11:57 – Brute Force Attacks
9:19:50 – Credential Stuffing & Password Spraying
9:33:58 – Our Notes, Revisited
9:37:05 – Capstone Introduction
9:42:54 – Setting up Blue
9:46:55 – Blue Walkthrough
10:04:00 – Academy Setup
10:06:28 – Academy Walkthrough
10:50:52 – Dev Walkthrough
11:16:18 – Butler Walkthrough
11:52:41 – Blackpearl Walkthrough
12:16:17 – Conclusion

❓Info❓
___________________________________________
Pentests & Security Consulting:
Get Trained:
Get Certified:
Merch:
Sponsorship Inquiries: [email protected]

📱Social Media📱
___________________________________________
Twitter:
Twitch:
Instagram:
LinkedIn:
Discord:

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:

Support the stream (one-time):

My Build:
lg 32gk850g-b 32″ Gaming Monitor:
darkFlash Phantom Black ATX Mid-Tower Case:
EVGA 2080TI:
MSI Z390 MotherBoard:
Intel 9700K:
G.SKILL 32GB DDR4 RAM:

My Recording Equipment:
Panasonic G85 4K Camera:
Logitech C922x Pro Webcam:
Aston Origin Microphone:
Rode VideoMicro:
Mackie PROFX8V2 Mixer:
Elgato Cam Link 4K:
Elgate Stream Deck:

*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

500 Comments

  1. Can we work on a desktop with ethical hacking, or will we always need a laptop to handle jobs that require that we bring a computer to the location that is going to be hacked?

    Just gonna buy a new computer and really like to know if a desktop like Mac Studio Max base will be fine for the first three years of both study and small jobs I can come to get.

    Please anyone with good and practical understanding reply me and give some examples of what kind of projects and jobs in cyber security are best for a desktop and which jobs and projects are better for a laptop!

    Am about to buy a new computer and do a lot of music production etc on the side of my programming and cyber security studies I am just starting and am curious what jobs I could do in the future on a desktop vs a laptop and if one within cyber security can work fine from home on a desktop, and if so what are the typical ethical hacking jobs one could work with from home on a desktop?

    Thanks for all helpful comments!

  2. I’ve just come across your channel and am just starting out in cyber security. May I ask your recommendation on what laptop and specs would be the best for me to get ? Can I use a new MacBook Pro 14” M1 Pro for all aspects of cybersecurity?

  3. At the bash path of the video i got the following error "./ipsweep.sh: line 3: syntax error in conditional expression
    ./ipsweep.sh: line 4: syntax error near `then'
    ./ipsweep.sh: line 4: `then '"
    the solution to that is changing the if condition to this "if [[ ("$1" == "") && !("$1" == "192.168.2")]]" and it work

  4. this doesn't work in a remote desktop connection right?

  5. you are running kioptrix on vm and you quickly switch over to your kali on vm as well? How do you exit out of kioptrix? Because mouse control is isolated to the kioptrix. I have to CTL/ALT/DEL to close the kiptrix vm

  6. Dude you're awesome!! Thank you so much for your incredible work!!!

  7. i cant find the drive link to download blue can someone help me please ):

  8. I really love the potential in him He broke
    me access successfully without wasting time ..what a good job once again thank you so much sir

  9. anyone else having issues installing pip python? mine says not available, but is refereed to by another package.

  10. Hi! I'm 14 I want to learn ethical hacking at a young age. Do you think I can do it sir? Because some people don't encourage it😅.

  11. I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet on subnetting so far. Amazing material

  12. What network provider or which network connection we should use during ethical hacking or anykind of hacking?

  13. Great course up to now
    Thanks

    *****!!!!!!!******
    how is it that the code at 5hrs 18min
    is working so fast shouldn't it wait 1 second for each closed port??????

  14. Flameshot is better choice then greenshot. Just try use it one time it's great in every manner. You can resize screenshot runtime no need to open image editor. It's all there on screen shot screen. Just use it I cannot say all of them here. But in conclusion it's a very good choice over greenshot.

  15. I really love your teaching you are a good teacher, please can I have your contact information Sir

  16. what are some of the app you can use as hacker

  17. This is. A great content but i always wish this valuable videos have time stamps !

  18. Sir i might sound dumb but i really want you to clear my doubt
    Sir am 16 and i read in 10th so… Is it late to start learning hacking or is it early
    Like if i would start it from this age then which topic i should focus.
    Sir i hope you would clear my doubt cause from childhood am interested in hacking but i wasn't able to learn about it but as now i have a phone i would like to focus on hacking.
    Hope you would help me..

  19. Strong content, well done. Which course would you recommend to a poor man to hone is AD skills for a career in ethical hacking?

  20. Heath, qq – I have written the bash script you demonstrated and my output looks right when i end my command with a semi-colon but when it ends with ampersand it only prints one IP and there it ends even though there are more active hosts. Been trying to fix this, did not find one, I am so in love with the course.

  21. people refer to that 'backwards apostrophe' as a `tick`

  22. I work professionally doing PSAT. amazing video for people wanting to learn

  23. Great video but… My python scanner is really slow !
    Your scanner is really fast and mine takes 1 second per port + take 5 seconds to start scan

  24. anybody reply
    i dont see download option in offensive security page so i downloaded from kali website via torrent but it isn't allowing me any installations even after using sudo command. pls help

  25. INBOX 👉+ ① ②①④⑧⑨⑧③⑨⑧⑦ says:

    Thanks you for this great piece of content Heath & It easy to follow and get some ground knowledge on the subject.

  26. INBOX 👉+ ① ②①④⑧⑨⑧③⑨⑧⑦ says:

    Thanks you for this great piece of content Heath & It easy to follow and get some ground knowledge on the subject.

  27. you did a better job in explaining networking in an hour than my teacher did in 3 years on god and i wish she will see this comment one day

  28. Hi, just wanted to ask, are there any perquisites for this course. Should you have knowledge of coding prior to this course or is everything covered here ???

  29. Can i use Virtual machine on 8gb ram laptop???

  30. Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info:

    Full Course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course

    All Course Resources/Links: https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources

    A shout out to all those involved with helping out on this course:

    Alek – Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.

    Dewalt – The one man Army of a five star support team.

    Dwight – Discord Admin and awesome hacker.

    Grimmie – Creation of SumRecon, lover of cookies, and a Discord Admin.

    Joe Helle – Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.

    Lian – The OG Discord Admin with French Bulldogs I'd like to steal.

    Rumham – Discord Admin, lover of rum and hams, and overall great guy.

    0:00 – Introduction/whoami

    6:20 – A Day in the Life of an Ethical Hacker

    23:14 – Effective Notekeeping

    29:58 – Important Tools

    35:23 – Networking Refresher: Introduction

    36:39 – IP Addresses

    49:50 – MAC Addresses

    53:07 – TCP, UDP, & the Three-Way Handshake

    58:25 – Common Ports & Protocols

    1:04:39 – The OSI Model

    1:10:14 – Subnetting

    1:37:17 – Installing VMWare / VirtualBox

    1:43:37 – Installing Kali Linux

    1:50:11 – Configuring VirtualBox

    1:53:32 – Kali Linux Overview

    1:57:05 – Sudo Overview

    2:02:22 – Navigating the File System

    2:14:26 – Users & Privileges

    2:23:54 – Common Network Commands

    2:29:50 – Network Commands Update

    2:31:49 – Installing & Updating Tools

    2:41:01 – Installing gedit

    2:42:46 – Viewing, Creating, & Editing Files

    2:48:49 – Scripting with Bash

    3:11:28 – Intro to Python

    3:13:52 – Strings

    3:21:25 – Math

    3:27:24 – Variables & Methods

    3:38:41 – Functions

    3:49:40 – Boolean Expressions

    3:54:14 – Relational & Boolean Operators

    4:01:13 – Conditional Statements

    4:10:13 – Lists

    4:20:41 – Tuples

    4:23:16 – Looping

    4:28:18 – Importing Modules

    4:34:24 – Advanced Strings

    4:47:47 – Dictionaries

    4:55:23 – Sockets

    5:00:55 – Building a Port Scanner

    5:21:09 – The 5 Stages of Ethical Hacking

    5:26:31 – Passive Recon Overview

    5:34:07 – Identifying Our Target

    5:37:46 – Discovering Email Addresses

    5:53:38 – Breached Credentials Part 1

    6:01:00 – Breached Credentials Part 2

    6:13:00 – Hunting Subdomains Part 1

    6:18:35 – Hunting Subdomains Part 2

    6:23:30 – Identifying Website Technologies

    6:30:39 – Gathering Information w/ Burp Suite

    6:39:33 – Google Fu

    6:45:09 – Utilizing Social Media

    6:50:49 – Installing Kioptrix

    6:57:12 – Scanning w/ Nmap

    7:17:04 – Enumerating HTTP/HTTPS Part 1

    7:32:09 – Enumerating HTTP/HTTPS Part 2

    7:47:22 – Enumerating SMB

    8:01:46 – Enumerating SSH

    8:05:59 – Researching Potential Vulnerabilities

    8:20:54 – Our Notes So Far

    8:24:03 – Scanning w/ Nessus Part 1

    8:34:42 – Scanning w/ Nessus Part 2

    8:40:57 – Reverse Shells vs Bind Shells

    8:48:02 – Staged vs Non-Staged Payloads

    8:51:27 – Gaining Root w/ Metasploit

    8:59:13 – Manual Exploitation

    9:11:57 – Brute Force Attacks

    9:19:50 – Credential Stuffing & Password Spraying

    9:33:58 – Our Notes, Revisited

    9:37:05 – Capstone Introduction

    9:42:54 – Setting up Blue

    9:46:55 – Blue Walkthrough

    10:04:00 – Academy Setup

    10:06:28 – Academy Walkthrough

    10:50:52 – Dev Walkthrough

    11:16:18 – Butler Walkthrough

    11:52:41 – Blackpearl Walkthrough

    12:16:17 – Conclusion

Leave a Reply

Your email address will not be published.