Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hands-On Hacking 2023
#1
[Image: download-1.jpg]

Hands-On Hacking 2023

Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.39 GB | Duration: 14h 20m



Hands-on hacking course

What you'll learn
Understanding of Hacking Fundamentals
Familiarity with Hacking Tools and Techniques
Practical Application of Ethical Hacking Methodologies
Identification and Exploitation of Vulnerabilities
Hands-on Practice with Real-World Scenarios

Requirements
IT professionals, including system administrators, network administrators, and security analysts, who are responsible for securing computer systems and networks.
Individuals with a strong interest in cybersecurity and ethical hacking.
Professionals involved in conducting penetration tests and security assessments.
Individuals interested in pursuing a career as ethical hackers or security consultants
Professionals involved in making security-related decisions, such as security managers and executives.

Description
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines (VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome. This practical experience can be useful for those looking to obtain certifications such as EC-Council's Certified Ethical Hacker(C|EH), CompTIA's Pentest+, Offensive-Security Certified Professional (OSCP), etc.The hands-on hacking course is designed to provide participants with practical skills and knowledge in the field of ethical hacking. This intensive training program focuses on teaching the techniques and methodologies used by hackers to identify and exploit vulnerabilities in computer systems, networks, and applications. Through a combination of theoretical lessons and hands-on exercises, participants will learn various hacking tools, methodologies, and best practices for securing systems.The course covers a wide range of topics, including reconnaissance, scanning and enumeration, vulnerability assessment, exploitation techniques, network and web application penetration testing, wireless network security, and social engineering. Participants will gain practical experience by performing real-world hacking scenarios in a controlled and supervised environment. They will learn how to identify and exploit common

Overview
Section 1: Breach

Lecture 1 Overview

Lecture 2 Breach Scanning and Enumeration

Lecture 3 Breach Web App Enumeration

Lecture 4 Breach HTTPS and Wireshark

Lecture 5 Breach HTTPS and Burp Suite

Lecture 6 Breach Gaining Access

Lecture 7 Breach Horizontal Privilege Escalation

Lecture 8 Breach Vertical Privilege Escalation

Section 2: GoldenEye

Lecture 9 GoldenEye Scanning and Enumeration

Lecture 10 GoldenEye Web App Enumeration

Lecture 11 GoldenEye POP3 Enumeration

Lecture 12 GoldenEye More Web App and POP3 Enumeration

Lecture 13 GoldenEye Gaining Access

Lecture 14 GoldenEye Privilege Escalation

Section 3: Bob

Lecture 15 Bob Scanning and Enumeration

Lecture 16 Bob Web App Enumeration

Lecture 17 Bob Gaining Access

Lecture 18 Bob Privilege Escalation

Lecture 19 Bob Privilege Escalation Redux

Section 4: Exploit Development

Lecture 20 Exploit Development Setup

Lecture 21 Exploit Development Fuzzing

Lecture 22 Exploit Development Buffer Offset

Lecture 23 Exploit Development Bad Characters

Lecture 24 Exploit Development Code Execution Control

Lecture 25 Exploit Development Gaining Access

Section 5: Misdirection

Lecture 26 Misdirection Scanning and Enumeration

Lecture 27 Misdirection Web App Enumeration

Lecture 28 Misdirection Access and Priv Esc

Lecture 29 Misdirection Privilege Escalation Redux

Section 6: WinterMute

Lecture 30 Straylight Scanning and Enumeration

Lecture 31 Straylight Web App Enumeration

Lecture 32 Straylight Gaining Access

Lecture 33 Straylight Privilege Escalation

Lecture 34 Neuromancer Scanning and Port Forwarding

Lecture 35 Neuromancer Web App Enumeration

Lecture 36 Neuromancer Gaining Access

Lecture 37 Neuromancer Privilege Escalation

Section 7: Windows Systems: Basic

Lecture 38 Scanning and Enumeration

Lecture 39 Win10 Access

Lecture 40 Post-Compromise Enumeration

Lecture 41 MS-SQL Access

Section 8: FunBox2

Lecture 42 FunBox2 Scanning and Enumeration

Lecture 43 FunBox2 Gaining Access

Lecture 44 FunBox2 Jail Shell Escape

Lecture 45 FunBox2 Privilege Escalation

There is no formal prerequisite for this course.,Participants should have a solid understanding of computer systems, networks, and operating systems. They should be familiar with concepts such as IP addressing, protocols, file systems, and command-line interfaces

HOMEPAGE

[To see links please register or login]


DOWNLOAD

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now