Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Start Ethical Hacking with Parrot Security OS (Alt. to Kali)
Section 1: Introduction and Planning
Introduction and Lab Planning (7:53)
Environment Preparation (27:49)
Section 2: Reconnaissance, Enumeration and Exploitation
Service Scanning with NMAP (10:31)
Reconnaissance (12:13)
Vulnerability Scanning and Exploitation - Part 1 (19:42)
Vulnerability Scanning and Exploitation - Part 2 (23:18)
Section 3: Post-Exploitation and Red Teaming
Post-Exploitation and Red Teaming using Empire3 and Cobalt Strike (17:43)
Where to go from here?
Teach online with
Reconnaissance
Complete and Continue