06-27-2023, 12:38 PM
Hands-On Hacking 2023
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.39 GB | Duration: 14h 20m
Hands-on hacking course
What you'll learn
Understanding of Hacking Fundamentals
Familiarity with Hacking Tools and Techniques
Practical Application of Ethical Hacking Methodologies
Identification and Exploitation of Vulnerabilities
Hands-on Practice with Real-World Scenarios
Requirements
IT professionals, including system administrators, network administrators, and security analysts, who are responsible for securing computer systems and networks.
Individuals with a strong interest in cybersecurity and ethical hacking.
Professionals involved in conducting penetration tests and security assessments.
Individuals interested in pursuing a career as ethical hackers or security consultants
Professionals involved in making security-related decisions, such as security managers and executives.
Description
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines (VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome. This practical experience can be useful for those looking to obtain certifications such as EC-Council's Certified Ethical Hacker(C|EH), CompTIA's Pentest+, Offensive-Security Certified Professional (OSCP), etc.The hands-on hacking course is designed to provide participants with practical skills and knowledge in the field of ethical hacking. This intensive training program focuses on teaching the techniques and methodologies used by hackers to identify and exploit vulnerabilities in computer systems, networks, and applications. Through a combination of theoretical lessons and hands-on exercises, participants will learn various hacking tools, methodologies, and best practices for securing systems.The course covers a wide range of topics, including reconnaissance, scanning and enumeration, vulnerability assessment, exploitation techniques, network and web application penetration testing, wireless network security, and social engineering. Participants will gain practical experience by performing real-world hacking scenarios in a controlled and supervised environment. They will learn how to identify and exploit common
Overview
Section 1: Breach
Lecture 1 Overview
Lecture 2 Breach Scanning and Enumeration
Lecture 3 Breach Web App Enumeration
Lecture 4 Breach HTTPS and Wireshark
Lecture 5 Breach HTTPS and Burp Suite
Lecture 6 Breach Gaining Access
Lecture 7 Breach Horizontal Privilege Escalation
Lecture 8 Breach Vertical Privilege Escalation
Section 2: GoldenEye
Lecture 9 GoldenEye Scanning and Enumeration
Lecture 10 GoldenEye Web App Enumeration
Lecture 11 GoldenEye POP3 Enumeration
Lecture 12 GoldenEye More Web App and POP3 Enumeration
Lecture 13 GoldenEye Gaining Access
Lecture 14 GoldenEye Privilege Escalation
Section 3: Bob
Lecture 15 Bob Scanning and Enumeration
Lecture 16 Bob Web App Enumeration
Lecture 17 Bob Gaining Access
Lecture 18 Bob Privilege Escalation
Lecture 19 Bob Privilege Escalation Redux
Section 4: Exploit Development
Lecture 20 Exploit Development Setup
Lecture 21 Exploit Development Fuzzing
Lecture 22 Exploit Development Buffer Offset
Lecture 23 Exploit Development Bad Characters
Lecture 24 Exploit Development Code Execution Control
Lecture 25 Exploit Development Gaining Access
Section 5: Misdirection
Lecture 26 Misdirection Scanning and Enumeration
Lecture 27 Misdirection Web App Enumeration
Lecture 28 Misdirection Access and Priv Esc
Lecture 29 Misdirection Privilege Escalation Redux
Section 6: WinterMute
Lecture 30 Straylight Scanning and Enumeration
Lecture 31 Straylight Web App Enumeration
Lecture 32 Straylight Gaining Access
Lecture 33 Straylight Privilege Escalation
Lecture 34 Neuromancer Scanning and Port Forwarding
Lecture 35 Neuromancer Web App Enumeration
Lecture 36 Neuromancer Gaining Access
Lecture 37 Neuromancer Privilege Escalation
Section 7: Windows Systems: Basic
Lecture 38 Scanning and Enumeration
Lecture 39 Win10 Access
Lecture 40 Post-Compromise Enumeration
Lecture 41 MS-SQL Access
Section 8: FunBox2
Lecture 42 FunBox2 Scanning and Enumeration
Lecture 43 FunBox2 Gaining Access
Lecture 44 FunBox2 Jail Shell Escape
Lecture 45 FunBox2 Privilege Escalation
There is no formal prerequisite for this course.,Participants should have a solid understanding of computer systems, networks, and operating systems. They should be familiar with concepts such as IP addressing, protocols, file systems, and command-line interfaces
HOMEPAGE
DOWNLOAD