Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.56 GB
Genre: eLearning Video | Duration: 15 lectures (3 hour, 31 mins) | Language: English
Practical Hands on Offensive Penetration Testing - Beginner to Advance Guide
What you'll learn Homepage: https://www.udemy.com/course/practical-hands-on-offensive-penetration-testing-1/
Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, etc.
Utilize a variety of industry standard penetration testing tools within the Kali Linux distro
Exploitation of SQL injection & Dumping Database along with User credentials
SMB Exploitation and Escalating Linux Privileges
Exploitation of vulnerable WordPress Plugins
Exploitation of Windows 10 Machine using Empire Powershell by using macro enabled Word & MS Excel File & various others
Burp Suite
Vulnerability Assessment & Penetration Testing
Running Mimikatz, Privelege Escalation & Using Hashcat to crack the various password hashes
Requirements
A basic understanding of Windows and Kali Linux
Desktop or Laptop with a minimum of 2GB RAM (8GB+ preferable)
Description
This tutorials contains 9 Labs which includes exploitation of vulnerabilities like SQL injection,WordPress Exploitation,SMB exploitation ,Linux Privilege Escalation,Exploitation of Windows 10 using empire Powershell. It includes utilization of a variety of industry standard penetration testing tools within the Kali Linux distro and Windows 10.It will enhance student's offensive mindset while performing vulnerability assessment and penetration Testing as well as their skills of Offensive Penetration Testing
Who this course is for:
Aspirants who are seeking carrear in information Seucurity,Information Security professional,Cyber Security Professional,Cyber Security Enthusiasts,IT Security.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.