Penetration Testing
This most potent way to discover weaknesses in a network is to use the same mindset, tool and technique as hackers.In this Advance Ethical Hacking/Penetration Testing course,You will learn all your way up to Gathering Information,Scanning your target,Finding Vulnerabilities,Exploit them with post exploitation under your belt.
Here You will learn properly and professionally breaking the things and figuring out how and why they can be hacked.
It’s the 2nd module of cyber security expert Module from Cosmic Skills.
You will learn:
1.How to perform Penetration Testing on Various Environment.
2.Enumeration is the keys You will enumerate a lot.
3.Test various type of real world scenario and will successfully exploit them.
4.This course will make you ready for a lot of Security Certification throughout the Globe.
Recommended Experience:
1.Complete “Ethical Hacking for Beginners” by Cosmic Skills.
Course Curriculum
Section 1: Introduction to Pentesting | |||
What is Penetration Testing | FREE | 00:03:00 | |
Section 2: Creating Lab | |||
Lab Setup for Pentesting | 00:01:00 | ||
Installing Kali | 00:07:00 | ||
Installing Kali on VMware [Updated] | 00:05:00 | ||
Installing kali on VirtualBox [updated] | 00:06:00 | ||
Installing Metasploitable-v2 | 00:05:00 | ||
Installing Kioptrix 1.0 | 00:05:00 | ||
Installing Kioptrix 1.2 | 00:03:00 | ||
Installing Mr.Robot | 00:04:00 | ||
Section 3: Introduction to Kali Linux | |||
Command line basics | FREE | 00:13:00 | |
Bash Script basics | 00:14:00 | ||
Services | 00:05:00 | ||
Section 4: Some useful tools | |||
Cherrytree (Notes Keeping) | 00:07:00 | ||
Ncat | 00:03:00 | ||
Netcat | 00:13:00 | ||
Wireshark | 00:05:00 | ||
Section 5: Information Gathering | |||
Information Gathering-1 | 00:05:00 | ||
Information Gathering-2 | 00:08:00 | ||
Information Gathering-3 | 00:04:00 | ||
Information Gathering-4 | 00:04:00 | ||
theHarvester | 00:05:00 | ||
Discover tool | 00:07:00 | ||
Understanding Google Hacking | 00:06:00 | ||
Google Dorks | 00:13:00 | ||
Section 6: Scanning | |||
Metasploit Scanning | 00:08:00 | ||
Nmap Scanning | 00:13:00 | ||
Nessus Scan | 00:07:00 | ||
Section 7: Enumeration | |||
DNS enumeration | 00:08:00 | ||
HTTP enumeration | 00:09:00 | ||
SMB enumeration | 00:14:00 | ||
SSH enumeration | 00:06:00 | ||
Section 8: Web App Exploits | |||
SQL exploitation using SQLMAP | FREE | 00:05:00 | |
Manual SQL Injection | 00:18:00 | ||
Cross-site scripting(XSS) | 00:15:00 | ||
Local File Inclusion (Part-1) | 00:06:00 | ||
Local File Inclusion (Part-2) | 00:09:00 | ||
Remote File Inclusion | 00:09:00 | ||
Section 9: File Transfer | |||
CURL file transfer | 00:02:00 | ||
FTP transfer | 00:08:00 | ||
NC file transfer | 00:03:00 | ||
PHP file transfer | 00:01:00 | ||
TFTP file transfer | 00:05:00 | ||
WGET file transfer | 00:01:00 | ||
Section 10: Metasploit Basics | |||
Introduction to Metasploit | 00:05:00 | ||
MsfVenom | 00:05:00 | ||
Creating Bind Shell | 00:08:00 | ||
Creating Reverse Shell | 00:00:00 | ||
Hacking Linux using Metasploit | 00:06:00 | ||
Hacking Windows using Metasploit | 00:08:00 | ||
Introduction to Armitage | 00:05:00 | ||
Section 11: Exploitation | |||
Exploiting Kioptrix 1.0 | 00:05:00 | ||
Exploiting Kioptrix 1.1 | 00:07:00 | ||
Exploiting Mr. Robot | 00:12:00 | ||
Section 12: Password Attack | |||
Password Attack | 00:08:00 | ||
Section 13: Privilege Escalation | |||
Kioptrix level 1.1 Privilege Escalation | 00:05:00 | ||
Mr.Robot Privilege Escalation | 00:13:00 | ||
Section 14: Buffer Overflow | |||
Buffer Overflow Basics | 00:04:00 | ||
BoF Requirements | 00:05:00 | ||
Exploiting Buffer Overflow on SLMAIL | 00:28:00 | ||
Capstone | |||
Lord of the Root | 00:29:00 | ||
Raven1 | 00:16:00 |
good one to boost up some knowledge
in the buffer overflow topic your told that some sell scripts given below video but there was no files
Course Review
Unbeatable course
I learnt a lot, thanks for manish sir
5