Build a strong foundation by taking the intermediate hands-on course on ethical hacking
About This Video
Learn about advanced password hacking with Metasploit
Explore how to access Kali across the WAN with NGROK
Learn about how to attack web apps with Burp Suite using SQL Injection
In Detail
Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity …
Intermediate Ethical Hacking Hands-on Training
Video description
Build a strong foundation by taking the intermediate hands-on course on ethical hacking
About This Video
Learn about advanced password hacking with Metasploit
Explore how to access Kali across the WAN with NGROK
Learn about how to attack web apps with Burp Suite using SQL Injection
In Detail
Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. In addition, advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters.
Sections include web application attacks, wireless network attacks, PowerShell Empire, Netcat, and Wireshark fundamentals.
Learn how to create a reverse shell using command injection and also how to upgrade a dumb terminal to fully functional BASH Shell. Moving forward, we will also learn advanced password hacking with Metasploit and how to dump Wi-Fi credentials using netsh.
By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices.
Who this book is for
This course is for anyone who is interested in learning intermediate skills of pentesting. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course.
Creating Windows 7 Pro Target Machine Using VirtualBox
Installing the VirtualBox Extension Pack
Chapter 3 : NMap
Installing the WebMap-Nmap Dashboard
Automated Recon/Enumeration Using nMapAutomator
Chapter 4 : Reverse Shells, Privilege Escalation, and Persistent Backdoors
Create a Reverse Shell Using Command Injection
Create a Reverse Shell Using a File Upload
Launch an Automated Meterpreter Session
Upgrade a Dumb Terminal to Fully Functional BASH Shell
Windows 7 Privilege Escalation Using UAC Bypass
Creating a Persistent Backdoor Using a Persistent Service
Chapter 5 : PowerShell Empire
Create Virtual Install of Server 2016 Full GUI Using VirtualBox
Preparing Your Server 2016 Target
Promote Server 2016 to a Domain Controller
Installing PowerShell Empire On Kali Linux
Enumerating Active Directory
Post-Exploitation of Windows Using PowerShell Empire
Chapter 6 : Post Exploitation of Microsoft Windows
Advanced Password Hacking with Metasploit
Post-Exploitation of Microsoft Windows
Brute Force the SMB Password on a Windows Server
Enumerating Active Directory Using RPCClient
Dumping Wi-Fi Credentials Using netsh
Chapter 7 : Practical Pentesting Labs
Heartbleed OpenSSL Exploit Vulnerability
Performing an RDP Brute Force Attack
Exploiting Active Directory using LLMNR/NBT-NS Poisoning
Accessing Kali Across the WAN with NGROK
Pentesting with Netcat
Enumerate DNS Records Using DNSRecon
Chapter 8 : Auditing Wireless Networks
Installing a Wireless Adapter in Kali
J Hacking a Wireless Network Using Kali Linux
Wireless Deauthentication Attack
PMKID Client-less Wireless Attack Using Bettercap
Chapter 9 : Wireshark
Overview of Wireshark 3.2
Wireshark Capture Options
Wireshark Toolbar Icons
Capturing Wireless Traffic Using Wireshark
Capturing a 3-way TCP Handshake Using Wireshark
Chapter 10 : Web App Penetration Testing
Creating a virtual install of OWASP
Setting Up Burp Suite
Attack Web Apps with Burp Suite Using SQL Injection
OS Command Injection Using Commix 3.2x
Web Application Firewall Detection Using WAFW00F
Exploit Vulnerable Web Applications Using Command Injection
Using Banner Grabbing to Aid in Reconnaissance
Chapter 11 : Remaining Anonymous While Pentesting
Anonymize Kali Using Whonix
Chapter 12 : SQL Injection to Shell Walkthrough
Lab Preparation for CTF SQL Injection to Shell
CTF Walkthrough for SQL Injection to Shell
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept