Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Real World Hacking & Penetration Testing
Introduction to course
Introduction Pentesters (4:02)
Building your penetration testing box (LAB)
Setting-up OWASPbwa virtual machine (3:17)
Setting-up KALI Linux virtual machine (4:27)
Setting-up metasploitable VM (2:02)
Setting-up windows VM (1:40)
Penetration testing methodologies
Penetration Testing methodologies OSSTMM and OWASP (2:25)
Passive Discovery - Open source intelligence gathering - OSINT
Open source intelligence gathering-basics (4:05)
Open source intelligence gathering - Recon-ng (14:03)
Open source intelligence gathering - DiscoverScript (13:43)
Open-source intelligence gathering - Spiderfoot (6:16)
Active Discovery - Reconnaissance
Active Reconnaissance with Sparta (9:19)
Scanning Entire network in 6 minutes (8:13)
Taking massive snapshots of web (3:48)
Httpscreenshots and Eyewitness-details
Vulnerability Assessments
Vulnerability Assessment - Nessus (14:28)
Vulnerability Assessment - openVAS (16:25)
Vulnerability Assessment - Nikto (4:41)
Quick findings of web apps vulnerabilities (2:04)
Web application scanning - ZAP (4:40)
ZAP scan analysis (5:25)
Web application scanning - AppSpider_pro (7:15)
Vulnerability to Exploitations - Exploiting the targets
Metasploit Commanding (9:03)
Metasploit - Exploiting MS08-067 (8:44)
Metasploit - Exploiting web apps (7:31)
Binary Exploitation - Buffer overflow attack (8:42)
Binary Exploitation
Browser Exploitation with BeEF (9:31)
Web application penetration testing - Exploiting web apps
SQL injections basics
Exploiting SQL Injections (8:33)
Cross Site Scripting attacks - XSS (5:13)
Cross Site Request Forgery attack - CSRF (6:00)
Fuzzing Input fields - input validations attacks (8:21)
Wireless network hacking - Security testing WLAN
WEP cracking basics
WPA/WPA2 Cracking basics
Cracking / Security Testing WPA/WPA2 - All in action (6:48)
Post exploitation attacks - Lateral moving in networks
First post Responder - collecting creds without Auth (5:32)
Adding user account to target machine (2:25)
Creating persistent backdoor on target machine (3:30)
Msfvenom-msfpc with RC scripts (5:49)
Dumping cached credentials ( last 10 passwords ) (1:59)
Anti-virus / Firewall / IDS Evasion / VEIL Evasion
Firewall Evasion with NMAP (10:59)
Content filter bypass with metasploit (3:30)
Veil Evasion framework (Evading Anti-viruses) (4:18)
Password cracking and exploits
Windows Password cracking - KON BOOT (1:34)
Linux Password Hash cracking - jtr (3:54)
Generating alpha-numeric passwords lists (2:16)
Generating Passwords lists from target sites (2:44)
Compromised Passwords lists
Exploits and vulnerability research
SearchSploit in kali (4:04)
Exploits search in bugtraq (2:17)
Exploits in EXPLOIT-DB (3:39)
Anonymity - safe and secure
Being anonymous & safe internet (9:44)
My recommendations for pentesting
Best Commercial Tools (3:27)
Top Security Conferences & magazine (3:30)
Bug Bounty programmes (1:03)
Bonus lectures
Penetration Tester's Suitcase - International
THE DARKNET - Deep web links (Dark side of the internet) (7:31)
Being anonymous & safe internet
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock