Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Real world hacking and penetration testing - Professional level
Introduction to course
Introduction to Penetration Testers (4:02)
Building virtual pentesting box
Setting-up OWASPbwa VM (3:17)
Setting-up KALI LINUX VM (4:27)
Setting-up Metasploitable VM (2:02)
Setting-up windows VM (1:40)
Penetration testing methodologies
Penetration Testing methodologies (2:25)
Passive Discovery - Open source intelligence gathering - OSINT
Open source intelligence gathering - Basics (4:05)
OSINT Reconnaissance - Recon-ng (14:03)
Open source intelligence gathering - DiscoverScript (13:41)
Open-source intelligence gathering - Spiderfoot (6:14)
Active Discovery - Reconnaissance
Active Reconnaissance with sparta (9:19)
Scanning Entire network range in 6 min (8:13)
Taking massive snapshots of web (3:48)
Httpscreenshot and EyeWitness Installations
Vulnerability Assessments
Vulnerability assessment - Nessus (14:28)
Vulnerability assessment - OpenVAS (16:25)
Vulnerability assessment - Nikto (4:41)
Quick findings of web apps vulnerabilities (2:04)
Web application scanning - ZAP (4:40)
ZAP Scan analysis (5:23)
Web application scanning - AppSpider_PRO (7:15)
Vulnerability to Exploitations - Exploiting the targets
Metasploit commanding (9:03)
Metasploit - Exploiting MS08-067 (8:44)
Metasploit - Exploiting web apps (7:31)
Binary_Exploitation_Buffer_overflow (8:42)
Binary Exploitation
Browser Exploitation with BeEF (9:31)
Web application penetration testing - Exploiting web apps
SQL Injection basics
Exploiting SQL injection (8:33)
Cross site scripting attack - XSS (5:13)
Cross site request forgery attacks - CSRF (6:00)
Fuzzing Input Fields - Input validation attacks (8:21)
Wireless network hacking - Security testing WLAN
WEP Cracking
WPA-WPA2 cracking
Cracking WPA2 Networks - Attack in action (6:48)
Post exploitation attacks - Lateral moving in networks
First post Responder - Collecting credentials without authorization (5:31)
Adding user account to target machine (2:25)
Creating a persistent backdoor on target machine (3:30)
Msfvenom-msfpc with RC Script (5:49)
Dumping cached credentials - Last 10 passwords (1:59)
Anti-virus / Firewall / IDS Evasion / VEIL Evasion
Firewall Evasion with Nmap - Live attack on windows 7 system (10:59)
Content filter bypass with metasploit (3:30)
Veil Evasion framework - Evading Anti-viruses (4:18)
Password cracking and exploits
Windows password cracking - kon boot (1:34)
Linux Password hash Cracking (3:54)
Generating alpha-numeric passwords lists (2:16)
Generating passwords list from target website (2:44)
Compromised passwords list
Exploits and vulnerability Research
Searchsploit in kali (4:04)
Exploits search in bugtraq (2:17)
Exploits in Exploit-DB (3:39)
Anonymity - safe and secure
Being_anonymous_The TOR Network (9:44)
My recommendations for pentesting
Top Security Conferences & magazine (3:30)
Best commercial tools (3:27)
Bug Bounty programmes (1:03)
Bonus lectures
TOR
The Darknet - Dark side of the internet (7:31)
Pentester's suitecase - by atul tiwari (International article)
Cracking WPA2 Networks - Attack in action
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock