Live online hacking training videos

Training Videos

The Live Hacking educational videos are a dedicated resource for those wanting to learn about the tools and utilities used by criminal hackers as the first step in preparing to defeat them.
These tutorial videos cover a wide range of ethical hacking topics and tools from network fingerprinting to password and packet sniffing. See below for a list of the most recently uploaded videos.
You can also find these videos on YouTube where there is now a dedicated Live Hacking YouTube channel.
Dr. Ali Jahangiri is publishing these videos for free to encourage IT professionals and others to enhance their knowledge and to prepare for the malicious activities of the unscrupulous hacker.
Uploaded Videos:
  1. Amap : Amap is a tool for banner grabbing and penetration test.
  2. Nmap : Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing.
  3. P0f : P0f is an advanced passive OS/network fingerprinting utility.
  4. Dsniff : Dsniff is a collection of tools for network auditing and penetration testing.
  5. SSLdump : SSLdump is an SSLv3/TLS network protocol analyzer.
  6. TCPreplay : Tcpreplay is a suite of BSD licensed tools written by Aaron Turner for UNIX (and Win32 under Cygwin) operating systems which gives you the ability to use previously captured traffic in libpcap format to test a variety of network devices.
  7. Metoscan: Metoscan is a tiny tool for scanning the HTTP methods supported by a web server.
  8. Hping: Hping is a command-line oriented TCP/IP packet assembler/analyzer.
  9. DNSmap: DNSmap is a passive DNS network mapper and subdomains bruteforcer.
  10. SING: It is a tool that sends ICMP packets fully customized from command line.
  11. Wireshark: Wireshark is the world’s foremost network protocol analyzer and sniffer.
  12. DHCPdump: It parse DHCP packets from tcpdump.
  13. TCPdump: TCPdump is a common packet analyzer that runs under the command line.
  14. Fping: Fping is a ping like program which uses the Internet Control Message Protocol.
  15. John the Ripper: John the Ripper is an open source password cracker.