HackerMentoring
Become a computer hacker and learn everything you'll need to get a career in cybersecurity!
Welcome
The Facebook Group
How to go through the course
The Live Calls
Keeping Notes
Part 1: Installing Kali on a Virtual Machine
Part 2: Installing Kali on a Virtual Machine
VirtualBox doesn't display 64-bit Linux
The OSI Model
IP & MAC Addresses
Ports and Protocols
NAT & Port Forwarding
DNS Protocol
DHCP Protocol
What is a Subnet?
Calculating a Subnet
Exercise: Subnetting
VLANs
The DMZ
The Kali Linux Desktop Environment
Command Line: Files & Filesystem
Command Line: Editing Files
Users, Groups and Permissions
Command Line: Network Commands
Updating and Installing Software
Services in Linux
Windows as a Virtual Machine
The Windows Filesystem
Windows Logs
Users, Groups and Permissions
The SAM Database
The Security Identifier
Windows UAC
Datastreams
The Registry
The hosts file
Introduction to Bash Scripting
Variables
Conditionals (If/Else)
Functions
Arguments
Arrays
Dictionaries
Loops
Exercise: Write Scripts
Introduction to Python Scripting
Variables
Conditionals (If/Else)
Functions
Lists
Loops
Dictionaries
Modules
Sockets
Exercise: Write Scripts
Introduction to PowerShell Scripting
Shell vs ISE
Variables
Arrays
Objects
Conditionals (If/Else)
Switch Cases
Functions
Loops
Modules
Profiles
Execution Policies
Exercise: Write Scripts
Introduction to Web Hacking
HTTP Requests
HTTP Responses
What is a proxy?
Installing Burp Suite
Using Burp Suite
Installing the Burp Certificate
GET vs POST
MIME Types
How does a website work?
Using Dirbuster
Web Records Explained
Finding historical record data
Cookies
Preparing for web hacking
What is Cross-Site Scripting (XSS)
Stored XSS vs Reflected XSS
What is Blind XSS
What is SQL Injection
How do SSL Certificates work
Checking an SSL Certificate for subdomains
Basic Scans
Using Nmap