ethical hacking

Security

Ethical Hacking in 12 Hours – Full Course – Learn to Hack!

Full free course on ethical hacking. Time stamps: 0:00 – Introduction/whoami 6:20 – A Day in the Life of an Ethical Hacker 23:14 – Effective Notekeeping 29:58 – Important Tools 35:23 – Networking Refresher: Introduction 36:39 – IP Addresses 49:50 – MAC Addresses 53:07 – TCP, UDP, & the Three-Way Handshake 58:25 – Common Ports […]

Read More
Python Security

Ethical Hacking: Injecting Code into Notepad with Python

In this video watch how to inject your own python code as well as a python interpreter into Notepad.exe and even injecting code into Command Prompt.

Read More
Security

Ethical Hacker Full Course for Beginners

Simplilearn provides this free Ethical Hacking course What Is Ethical Hacking? Good question: Ethical Hacking is defined as the process by which system vulnerabilities are discovered to ensure system security. This is achieved with the help of hacking techniques and tools. An ethical hacker is a trained individual who carries out this duty. Ethical Hackers […]

Read More
Security Windows

CODE RED: The Billion Dollar Buffer Overflow & How it Worked

How does a buffer overflow work and what does it have to do with CODE RED, one of the biggest security holes ever found (so far)? Join retired Microsoft developer Dave Plummer as he explains how CODE RED was unleashed on the world and how it worked so that you can avoid the mistakes of […]

Read More
Interesting Windows

Retrocoding the World’s Smallest Windows App in x86 ASM

Dave  from Dave’s Garage  builds the World’s Smallest Windows application live in x86 assembly using only a text editor and the command line to assemble the program using the Microsoft MASM assembler. Whether you’re a professional programmer or just curious about how assembly language works, what makes it different from machine language, and why it […]

Read More
Linux Security

Linux for Ethical Hackers

freeCodeCamp.org provides this free course, where you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.

Read More