Sale!

Offensive Hacking Unfolded – Become a Pro Pentester

Original price was: $45.00.Current price is: $10.00.

Price: 10.00 USD | Size: 5.10 GB |  Duration : 10.32 Hours  | 42 Video Lessons | Bonus : Pentesting PDF Guides 

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Price: 10.00 USD | Size: 5.10 GB |  Duration : 10.32 Hours  | 42 Video Lessons | Bonus : Pentesting PDF Guides 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Offensive Hacking Unfolded – Become a Pro Pentester [Video]

About this video

In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. All resources are placed here:

Introduction

Introduction to the Course

Fundamentals

Lab Setup Using the VMware Player
Theoretical Basics

Information Gathering

Passive Reconnaissance – Part 1
Passive Reconnaissance – Part 2
Passive Reconnaissance – Part 3
Active Reconnaissance – Part 1
Active Reconnaissance – Part 2
Active Reconnaissance – Part 3

Vulnerability Analysis

Vulnerability Analysis
Manually Identify, Analyze, and Rank Vulnerabilities
Automated Vulnerability Assessment Using Nessus
Automated Vulnerability Assessment – Nmap and VEGA

Exploitation

Lab 1 – Exploitation with Metasploit Framework
Lab 2 – Exploitation Using Manual Public Exploits

Web Penetration Test

CMS Hacking – Initial Information Gathering
CMS Hacking – Directory Busting and CMS Scanning
CMS Hacking – General Brute Forcing and Exploitation
Do You Know the Power of Version Numbers? – Part 1
Do You Know the Power of Version Numbers? – Part 2
Important Specific Vulnerabilities Such as SQL Injection In-Depth
Important Specific Vulnerabilities Such as XSS In-Depth
Important Specific Vulnerabilities Such as File Upload and Command Injection
Part 1 Web Server Hacking: Introduction and Enumeration Ideas
Part 2 Web Server Hacking: Risky PUT and DELETE Methods
Part 3 Web Server Hacking: SSH Brute Forcing w/ Hydra

Network Pentesting

The Core of Network Testing – Part 1
The Core of Network Testing – Part 2
The Core of Network Testing – Part 3
Post Exploitation Using Metasploit – Part 1
Post Exploitation Using Metasploit – Part 2
Post Exploitation Using Metasploit – Part 3
Privilege Escalation Techniques – Part 1
Privilege Escalation Techniques – Part 2
Privilege Escalation Techniques – Part 3
Privilege Escalation Techniques – Part 4

Security Control Evasion

#1 Bypass Antivirus – Making the Base Payload
#2 Bypass Antivirus – The Actual Evasion Technique!

Writing Great Reports
Clean Documentation in a Professional Test

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart