Hands-On Hacking 2023 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Hands-On Hacking 2023 (/Thread-Hands-On-Hacking-2023) |
Hands-On Hacking 2023 - nieriorefasow63 - 06-27-2023 Hands-On Hacking 2023 Published 6/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 9.39 GB | Duration: 14h 20m Hands-on hacking course What you'll learn Understanding of Hacking Fundamentals Familiarity with Hacking Tools and Techniques Practical Application of Ethical Hacking Methodologies Identification and Exploitation of Vulnerabilities Hands-on Practice with Real-World Scenarios Requirements IT professionals, including system administrators, network administrators, and security analysts, who are responsible for securing computer systems and networks. Individuals with a strong interest in cybersecurity and ethical hacking. Professionals involved in conducting penetration tests and security assessments. Individuals interested in pursuing a career as ethical hackers or security consultants Professionals involved in making security-related decisions, such as security managers and executives. Description To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines (VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome. This practical experience can be useful for those looking to obtain certifications such as EC-Council's Certified Ethical Hacker(C|EH), CompTIA's Pentest+, Offensive-Security Certified Professional (OSCP), etc.The hands-on hacking course is designed to provide participants with practical skills and knowledge in the field of ethical hacking. This intensive training program focuses on teaching the techniques and methodologies used by hackers to identify and exploit vulnerabilities in computer systems, networks, and applications. Through a combination of theoretical lessons and hands-on exercises, participants will learn various hacking tools, methodologies, and best practices for securing systems.The course covers a wide range of topics, including reconnaissance, scanning and enumeration, vulnerability assessment, exploitation techniques, network and web application penetration testing, wireless network security, and social engineering. Participants will gain practical experience by performing real-world hacking scenarios in a controlled and supervised environment. They will learn how to identify and exploit common Overview Section 1: Breach Lecture 1 Overview Lecture 2 Breach Scanning and Enumeration Lecture 3 Breach Web App Enumeration Lecture 4 Breach HTTPS and Wireshark Lecture 5 Breach HTTPS and Burp Suite Lecture 6 Breach Gaining Access Lecture 7 Breach Horizontal Privilege Escalation Lecture 8 Breach Vertical Privilege Escalation Section 2: GoldenEye Lecture 9 GoldenEye Scanning and Enumeration Lecture 10 GoldenEye Web App Enumeration Lecture 11 GoldenEye POP3 Enumeration Lecture 12 GoldenEye More Web App and POP3 Enumeration Lecture 13 GoldenEye Gaining Access Lecture 14 GoldenEye Privilege Escalation Section 3: Bob Lecture 15 Bob Scanning and Enumeration Lecture 16 Bob Web App Enumeration Lecture 17 Bob Gaining Access Lecture 18 Bob Privilege Escalation Lecture 19 Bob Privilege Escalation Redux Section 4: Exploit Development Lecture 20 Exploit Development Setup Lecture 21 Exploit Development Fuzzing Lecture 22 Exploit Development Buffer Offset Lecture 23 Exploit Development Bad Characters Lecture 24 Exploit Development Code Execution Control Lecture 25 Exploit Development Gaining Access Section 5: Misdirection Lecture 26 Misdirection Scanning and Enumeration Lecture 27 Misdirection Web App Enumeration Lecture 28 Misdirection Access and Priv Esc Lecture 29 Misdirection Privilege Escalation Redux Section 6: WinterMute Lecture 30 Straylight Scanning and Enumeration Lecture 31 Straylight Web App Enumeration Lecture 32 Straylight Gaining Access Lecture 33 Straylight Privilege Escalation Lecture 34 Neuromancer Scanning and Port Forwarding Lecture 35 Neuromancer Web App Enumeration Lecture 36 Neuromancer Gaining Access Lecture 37 Neuromancer Privilege Escalation Section 7: Windows Systems: Basic Lecture 38 Scanning and Enumeration Lecture 39 Win10 Access Lecture 40 Post-Compromise Enumeration Lecture 41 MS-SQL Access Section 8: FunBox2 Lecture 42 FunBox2 Scanning and Enumeration Lecture 43 FunBox2 Gaining Access Lecture 44 FunBox2 Jail Shell Escape Lecture 45 FunBox2 Privilege Escalation There is no formal prerequisite for this course.,Participants should have a solid understanding of computer systems, networks, and operating systems. They should be familiar with concepts such as IP addressing, protocols, file systems, and command-line interfaces HOMEPAGE DOWNLOAD |