This most potent way to discover weaknesses in a network is to use the same mindset, tool and technique as hackers.In this Advance Ethical Hacking/Penetration Testing course,You will learn all your way up to Gathering Information,Scanning your target,Finding Vulnerabilities,Exploit them with post exploitation under your belt.
Here You will learn properly and professionally breaking the things and figuring out how and why they can be hacked.
It’s the 2nd module of cyber security expert Module from Cosmic Skills.
You will learn:
1.How to perform Penetration Testing on Various Environment.
2.Enumeration is the keys You will enumerate a lot.
3.Test various type of real world scenario and will successfully exploit them.
4.This course will make you ready for a lot of Security Certification throughout the Globe.
1.Complete “Ethical Hacking for Beginners” by Cosmic Skills.
|Section 1: Introduction to Pentesting|
|What is Penetration Testing||FREE||00:03:00|
|Section 2: Creating Lab|
|Lab Setup for Pentesting||00:01:00|
|Installing Kali on VMware [Updated]||00:05:00|
|Installing kali on VirtualBox [updated]||00:06:00|
|Installing Kioptrix 1.0||00:05:00|
|Installing Kioptrix 1.2||00:03:00|
|Section 3: Introduction to Kali Linux|
|Command line basics||FREE||00:13:00|
|Bash Script basics||00:14:00|
|Section 4: Some useful tools|
|Cherrytree (Notes Keeping)||00:07:00|
|Section 5: Information Gathering|
|Understanding Google Hacking||00:06:00|
|Section 6: Scanning|
|Section 7: Enumeration|
|Section 8: Web App Exploits|
|SQL exploitation using SQLMAP||FREE||00:05:00|
|Manual SQL Injection||00:18:00|
|Local File Inclusion (Part-1)||00:06:00|
|Local File Inclusion (Part-2)||00:09:00|
|Remote File Inclusion||00:09:00|
|Section 9: File Transfer|
|CURL file transfer||00:02:00|
|NC file transfer||00:03:00|
|PHP file transfer||00:01:00|
|TFTP file transfer||00:05:00|
|WGET file transfer||00:01:00|
|Section 10: Metasploit Basics|
|Introduction to Metasploit||00:05:00|
|Creating Bind Shell||00:08:00|
|Creating Reverse Shell||00:00:00|
|Hacking Linux using Metasploit||00:06:00|
|Hacking Windows using Metasploit||00:08:00|
|Introduction to Armitage||00:05:00|
|Section 11: Exploitation|
|Exploiting Kioptrix 1.0||00:05:00|
|Exploiting Kioptrix 1.1||00:07:00|
|Exploiting Mr. Robot||00:12:00|
|Section 12: Password Attack|
|Section 13: Privilege Escalation|
|Kioptrix level 1.1 Privilege Escalation||00:05:00|
|Mr.Robot Privilege Escalation||00:13:00|
|Section 14: Buffer Overflow|
|Buffer Overflow Basics||00:04:00|
|Exploiting Buffer Overflow on SLMAIL||00:28:00|
|Lord of the Root||00:29:00|