This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Real world hacking and penetration testing - (With Certification)
Introduction Pentesters
Introduction Pentester (4:02)
Creating hacking lab box
Setting-up KALI LINUX VM (4:27)
Setting-up OWASPbwa VM (3:17)
Setting-up Metasploitable VM (2:02)
Setting-up windows VM (1:40)
Penetration Testing methodologies (2:25)
Passive Discovery - Open source intelligence gathering - OSINT
OSINT Reconnaissance - Recon-ng (14:03)
Open source intelligence gathering - Basics (4:05)
Open source intelligence gathering - DiscoverScript (13:41)
Open-source intelligence gathering - Spiderfoot (6:14)
Recon-ng - Complete info data - Refined (19:19)
Active Discovery - Reconnaissance
Active Reconnaissance with sparta (9:19)
Scanning Entire range in 6 min (8:13)
Taking massive snapshots of web (3:48)
Httpscreenshot and EyeWitness Installations
Vulnerability Assessments
Vulnerability assessment - Nessus (14:28)
Vulnerability assessment - OpenVAS (16:25)
Vulnerability assessment - Nikto (4:41)
Quick findings of web apps vulnerabilities (2:04)
Web application scanning - ZAP (4:40)
ZAP Scan analysis (5:23)
Web application scanning - AppSpider_PRO (7:15)
Vulnerability to Exploitations - Exploiting the targets
Metasploit commanding (9:03)
Metasploit - Exploiting MS08-067 (8:44)
Metasploit - Exploiting web apps (7:31)
Binary_Exploitation_Buffer_overflow (8:42)
Binary Exploitation
Browser Exploitation with BeEF (9:31)
Web application penetration testing - Exploiting web apps
SQL Injection basics
Exploiting SQL injection - Attacks (8:33)
Cross site scripting attack - XSS (5:13)
Cross site request forgery attacks - CSRF (6:00)
Fuzzing Input Fields - input validation attacks (8:21)
Wireless network hacking - Security testing WLAN
WEP Cracking
WPA-WPA2 cracking
Cracking WPA2 Networks - Cracking in action (6:48)
Post exploitation attacks - Lateral moving in networks
First post Responder (5:31)
Adding user account to target machine (2:25)
Creating a persistent backdoor on target machine (3:30)
Msfvenom-msfpc with RC Script (5:49)
Dumping cached credentials - Last 10 Passwords (1:59)
Anti-virus / Firewall / IDS Evasion / VEIL Evasion
Firewall Evasion with Nmap - Windows 7 firewall (Real world) live! (10:59)
Content filter bypass with metasploit (3:30)
Veil Evasion framework (4:18)
Password cracking and exploits
Windows password cracking - kon boot (1:34)
Linux Password hash Cracking (3:54)
Generating passwords list from target website (2:44)
Generating alpha-numeric passwords lists (2:16)
Compromised passwords list - 15GB
Exploits and vulnerability research
Searchsploit in kali (4:04)
Exploits search in bugtraq (2:17)
Exploits in Exploit-DB (3:39)
Anonymity - safe and secure
Being_anonymous_The TOR Network (9:44)
TOR
My recommendations for pentesting
Best commercial tools (3:27)
Security Conferences & magazine (3:30)
Bug Bounty programes (1:03)
Bonus lectures
The Darknet - Dark side of the internet (7:31)
Pentester's Suitecase - By:- atul tiwari (International)
Cross site request forgery attacks - CSRF
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock