Udemy

Win8 add VmWare

A free video tutorial from Muharrem AYDIN
Computer Engineer, Ethical Hacking, Cyber Security Expert
Rating: 4.5 out of 5Instructor rating
44 courses
150,190 students
Win8 add VmWare

Lecture description

Preparation of the virtual lab for pentesting Metasploitable 2 with Kali

Learn more from the full course

Ethical Hacking with Metasploit: Exploit & Post Exploit

Learn Ethical Hacking from scratch with Metasploit, exploit vulnerabilities and become a white hat hacker | Ethical 2022

04:50:03 of on-demand video • Updated June 2025

Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system
Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security
The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
You will become an expert in using Metasploit for ethical hacking and network security.
Set up a lab environment to practice hacking
Install Kali Linux - a penetration testing operating system
Install Windows & vulnerable operating systems as virtual machines for testing
Learn Linux commands and how to interact with the terminal
Discover vulnerable applications
Vulnerability scanning, Exploit, Post Exploit, Payload
Gain control over computer systems using server side attacks
Exploit vulnerabilities to gain control over systems
Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc.
Using backdoors to persist on the victim machine
The very latest up-to-date information and methods
During the course you will learn both the theory and how to step by step setup each method
Social Engineering Toolkit (SET) for Phishing
ethical hacking
cyber security
android hacking
hacking
Ethical Intelligence
Ethical Hacker
metasploit
password cracking
penetration testing
ethical hacking and penetration testing in oak academy
English [Auto]
Throughout the tutorial, we will do various applications related to finding and exploiting security vulnerabilities of the Windows 8 operating system. For this, we need a virtual Windows 8 computer with security vulnerabilities. We will download the Windows 8 virtual computer as an image and add it to VM player. You can download the Windows 8 image file from the resources section of our course. After downloading the Windows 8 image file, you can add it to VM player by following the steps below. Click on the image file we downloaded earlier. Image file is downloaded with Seven's extension. Extract the compressed file by right clicking on it. You can use the extracted file either in the folder where it is located, or by copying it into another folder. My recommendation would be to collect all virtual computers under a single folder. I use a folder called VMs on my computer and I create all my virtual computers here. You can right click on the image file and copy or move it with one of the copy or move option. Open the VMware player program. Click Open Virtual Machine in the window that opens, locate the Windows 8 image file you downloaded. Select the image file. Select the file. Click open. If a warning window appears, click retry. The import process may take some time. When the import process is finished, the Windows 8 virtual computer will be added on the left side of the VM player main screen. Start the computer by clicking the play button. Enter the username, password, username, administrator and password 1234QQQQQ capital q. The virtual computer is ready to be used.