The following warnings occurred:
Warning [2] Undefined array key "extra" - Line: 100 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 100 errorHandler->error_callback
/inc/plugins/google_seo.php 317 require_once
/inc/class_plugins.php 38 require_once
/inc/init.php 263 pluginSystem->load
/global.php 20 require_once
/showthread.php 28 require_once
Warning [2] Undefined array key "parent" - Line: 447 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 447 errorHandler->error_callback
/inc/plugins/google_seo/url.php 1144 google_seo_url_create
/inc/plugins/google_seo/url.php 174 google_seo_url_hook
/inc/plugins/google_seo.php 317 require_once
/inc/class_plugins.php 38 require_once
/inc/init.php 263 pluginSystem->load
/global.php 20 require_once
/showthread.php 28 require_once
Warning [2] Undefined array key "pid" - Line: 1147 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 1147 errorHandler->error_callback
/inc/plugins/google_seo/url.php 174 google_seo_url_hook
/inc/plugins/google_seo.php 317 require_once
/inc/class_plugins.php 38 require_once
/inc/init.php 263 pluginSystem->load
/global.php 20 require_once
/showthread.php 28 require_once
Warning [2] Undefined array key "pid" - Line: 129 - File: inc/plugins/google_seo/redirect.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/redirect.php 129 errorHandler->error_callback
/inc/class_plugins.php 142 google_seo_redirect_hook
/global.php 100 pluginSystem->run_hooks
/showthread.php 28 require_once
Warning [2] Undefined array key "page" - Line: 144 - File: inc/plugins/google_seo/redirect.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/redirect.php 144 errorHandler->error_callback
/inc/class_plugins.php 142 google_seo_redirect_hook
/global.php 100 pluginSystem->run_hooks
/showthread.php 28 require_once
Warning [2] Undefined array key "action" - Line: 145 - File: inc/plugins/google_seo/redirect.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/redirect.php 145 errorHandler->error_callback
/inc/class_plugins.php 142 google_seo_redirect_hook
/global.php 100 pluginSystem->run_hooks
/showthread.php 28 require_once
Warning [2] Undefined array key "page" - Line: 151 - File: inc/plugins/google_seo/redirect.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/redirect.php 151 errorHandler->error_callback
/inc/class_plugins.php 142 google_seo_redirect_hook
/global.php 100 pluginSystem->run_hooks
/showthread.php 28 require_once
Warning [2] Undefined variable $unreadreports - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/showthread.php 28 require_once
Warning [2] Undefined variable $mysupport_tech_notice - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/showthread.php 28 require_once
Warning [2] Undefined variable $mysupport_assign_notice - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/showthread.php 28 require_once
Warning [2] Trying to access array offset on value of type null - Line: 198 - File: inc/plugins/google_seo.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo.php 198 errorHandler->error_callback
/inc/plugins/google_seo/url.php 1453 google_seo_tid
/inc/functions.php 6608 google_seo_url_post
/inc/functions_post.php 722 get_post_link
/showthread.php 1122 build_postbit
Warning [2] Undefined array key "additionalgroups" - Line: 7924 - File: inc/functions.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/functions.php 7924 errorHandler->error_callback
/inc/plugins/ougc_agi.php 307 is_member
/inc/class_plugins.php 142 ougc_agi_run
/inc/functions_post.php 917 pluginSystem->run_hooks
/showthread.php 1122 build_postbit
Warning [2] Undefined array key "" - Line: 314 - File: inc/plugins/ougc_agi.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/ougc_agi.php 314 errorHandler->error_callback
/inc/class_plugins.php 142 ougc_agi_run
/inc/functions_post.php 917 pluginSystem->run_hooks
/showthread.php 1122 build_postbit
Warning [2] Undefined array key "mysupport_status" - Line: 23 - File: inc/functions_post.php(970) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/functions_post.php(970) : eval()'d code 23 errorHandler->error_callback
/inc/functions_post.php 970 eval
/showthread.php 1122 build_postbit
Warning [2] Undefined array key "mysupport_bestanswer" - Line: 25 - File: inc/functions_post.php(970) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/functions_post.php(970) : eval()'d code 25 errorHandler->error_callback
/inc/functions_post.php 970 eval
/showthread.php 1122 build_postbit
Warning [2] Undefined array key "mysupport_deny_support_post" - Line: 25 - File: inc/functions_post.php(970) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/functions_post.php(970) : eval()'d code 25 errorHandler->error_callback
/inc/functions_post.php 970 eval
/showthread.php 1122 build_postbit
Warning [2] Undefined variable $mysupport_options - Line: 52 - File: showthread.php(1651) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/showthread.php(1651) : eval()'d code 52 errorHandler->error_callback
/showthread.php 1651 eval
Warning [2] Undefined variable $mysupport_status - Line: 65 - File: showthread.php(1651) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/showthread.php(1651) : eval()'d code 65 errorHandler->error_callback
/showthread.php 1651 eval
Warning [2] Undefined variable $mysupport_options - Line: 88 - File: showthread.php(1651) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/showthread.php(1651) : eval()'d code 88 errorHandler->error_callback
/showthread.php 1651 eval
Warning [2] Undefined variable $mysupport_js - Line: 109 - File: showthread.php(1651) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/showthread.php(1651) : eval()'d code 109 errorHandler->error_callback
/showthread.php 1651 eval
Warning [2] Undefined variable $newurl - Line: 1609 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 1609 errorHandler->error_callback
/inc/functions.php 1148 google_seo_url_multipage
/inc/functions.php 4819 multipage
/inc/functions.php 298 build_breadcrumb
/inc/functions.php 22 parse_page
/showthread.php 1652 output_page



  Register Account

Earn real money $$ through NewPoints: Click Here x


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Learn Penetration Testing with BackBox Linux
#1
[Image: b3dcd48fe4c0b9b0538c2001060c4b3b.jpg]
Learn Penetration Testing with BackBox Linux
Published 8/2024
Duration: 7h36m | .MP4 1280x720, 30 fps® | AAC, 44100 Hz, 2ch | 3.67 GB
Genre: eLearning | Language: English

A complete guide to hands-on penetration testing using Backbox for beginners

What you'll learn
- Become familiar with installing and using Backbox.
- Become familiar with installing and using Backbox.
- Become familiar with installing and using Backbox.
- Become familiar with installing and using Backbox.
- Create and analyze reports in Backbox.

Requirements
Basic Knowledge of Linux OS

Description
Hands-on training on penetration testing with Backbox has never been abundant. Without practical knowledge, one can never perform any sort of penetration testing or security analysis whether you are working in a full-time settings or as a consultant. Enrol in this course to gain the needed knowledge to perform vulnerability assessment and penetration testing for your client or the company you are working for. This course will equip you with real-world skills needed to excel in the world of cyber security.
Target Audience
This course if for you if you are a Penetration tester, ethical hacker, security researcher, forensic analyst/investigator or even if you are just interested in learning a lightweight Linux distribution used for penetration testing and security assessment.
Key Features in This Course
· Combine concepts and theory with hands-on training: Understand every single command typed in a terminal and the concept behind each tool
· Downloadable course materials: This includes course slides and any other related documents.
· Practical penetration testing scenarios: Learn not just to how to use tools in Backbox but how to run them against vulnerable targets.
Course Approach
This course teaches concepts and foundations of penetration testing using an interactive instructor board followed by a practical application of the said concepts using Backbox security tools and vulnerable targets to make the concepts easy to learn and to teach the viewer how to apply them. It's recommended if the student downloaded a copy of Backbox to follow up with the instructor during the illustrations.
This course is hands-on on using Backbox to conduct penetration testing and security assessment. Backbox is an open-source Ubuntu-based Linux distribution that's designed for penetration testers and security analysts. Much like in Kali Linux, Backbox is equipped with security tools that are easy to use to conduct many types of security testing including web application analysis, vulnerability assessment, wireless security testing, etc.
What You Will Learn
- Become familiar with installing and using Backbox.
- Become familiar with using Backbox security tools
- Demonstrating the ability to conduct penetration testing and security testing with Backbox
- Understand the basic concepts behind every phase in the penetration testing lifecycle.
- Create and analyze reports in Backbox.
About The Author
The author of this course is an instructor and trainer in the cybersecurity field with years of experience in teaching and training cybersecurity and penetration testing to individuals and companies. The author also has a YouTube channel where he teaches blue team, red team and capture the flag theoretically and practically. The author also has a course published in Udemy to teach web application penetration testing.
Summary of Contents
- Section 1: Introduction to Backbox
- Section 2: Comparison between Kali Linux and Backbox
- Section 3: Downloading and Installing Backbox.
- Section 4: Information gathering tools
- Section 5: Vulnerability Assessment
- Section 6: Exploitation
- Section 7: Overview of social engineering tools
- Section 8: Sniffing and MTIM attacks tools
- Section 9: Wireless Attacks Tools
- Section 10: Case study: Performing full targeted penetration testing
- Section 11: Reporting
Course Road-map
Section 1: Introduction to Backbox (
~20 Minutes
)
· Video one: What's Backbox and Why it's used in penetration testing.
Section 2: Comparison between Kali Linux and Backbox (
~20 Minutes
)
· Video one: Kali Linux vs Backbox: Which to pick.
Section 3: Downloading and Installing Backbox (
~20 Minutes
)
· Video one: Learn how to download and install Backbox on VMware.
Section 4: Information Gathering Tools (
~40 Minutes
)
· Video one: Using
Nmap
for scanning and information gathering.
· Video Two: Gathering emails, subdomains and hosts using
TheHarvester
.
· Video Three: Performing Reconnaissance with
Recon-ng.
· Video Four: Enumerate CMSs with
WhatWeb.
Section 5: Vulnerability Assessment (
~40 Minutes
)
· Video one: Scanning Web Applications With
Nikto.
· Video Two: Using
OpenVAS
to Conduct Full Vulnerability Assessment.
· Video Three: Using
ZAP
to Conduct Full Vulnerability Assessment.
Section 6: Exploitation (
~40 Minutes
)
· Video one: Understanding Exploitation
· Video Two: How To Search For And Use Public Exploits.
· Video Three: Exploiting WordPress-Based Web Applications.
· Video Four: Exploiting Joomla-Based Web Applications.
· Video Five: Exploitation With
Metasploit
.
· Video Six: Using
SQLmap
to exploit the popular SQL Injection Vulnerability.
Section 7: Overview of Social Engineering Tools (
~20 Minutes
)
· Video One: Understanding Social Engineering.
· Video One: Social Engineering with
SET.
Section 8: Sniffing and MTIM attacks tools (
~20 Minutes
)
· Video One: Understanding Sniffing and MITM Attacks.
· Video Two: Performing MITM and Sniffing Attacks With
Dsniff
and
Ettercap
.
Section 9: Wireless Attacks Tools (
~20 Minutes
)
· Video One: Understanding Wireless Attacks.
· Video Two: Conducting a Wireless Network Attack with
Aircrack-ng
and
Wifite
.
Section 10: Case study: Performing full targeted penetration testing (
~40 Minutes
)
· Video One: Running a Full Penetration Test Against a Live Machine & Creating a Report with
MagicTree
SETUP AND INSTALLATION
Minimum Hardware
Requirements
For successful completion of this course, students will require the computer systems with at least the following:
OS: Windows 7 and above to run the virtualization software.
Processor: A 32-bit or 64-bit processor.
Memory: 512 MB of system memory RAM for Backbox and at least 4GB for the host OS (Windows).
Storage: 4.4 GB of disk space
Recommended Hardware
Requirements
For an optimal experience with hands-on labs and other practical activities, we recommend the following configuration:
OS: Windows 10
Processor: A 32-bit or 64-bit processor.
Memory: 512 MB of system memory RAM for Backbox and 8GB for the host OS (Windows).
Storage: 4.4 GB of disk space
Who this course is for:
This course if for you if you are a Penetration tester, ethical hacker, security researcher, forensic analyst/investigator or even if you are just interested in learning a lightweight Linux distribution used for penetration testing and security assessment.

More Info

[Image: 3bAEcYUe_o.jpg]

[To see links please register or login]


[To see links please register or login]


[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

DL Warez BB