Step by Step Network Penetration Tester – Gabriel Avramescu
Original price was: $149.00.$29.00Current price is: $29.00.
Step by Step Network Penetration Tester – Gabriel Avramescu Download. Before jumping into penetration testing, you will first learn how to set up a lab and…
Salepage link: At HERE. Archive: https://archive.is/wip/KeXux
In order to protect yourself from hackers, you must think as one.
In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.
You will learn hacking tools, methodologies and techniques. This is a both practical and theoretical step-by-step course.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.
Below are the main topics, both theoretical and practical, of this course:
- Introduction to Ethical Hacking, Footprinting and Reconnaissance
- This section will teach you how to gather information about your target server, you will learn how to discover the DNS server used, open ports and services, un-published directories, sensitive files. This information is very important as it increases the chances of being able to successfully gain access to the target website.
- Scanning Networks, Enumeration and Vulnerabilities and System Hacking
- In this section you will learn how to discover and exploit a large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learn what is that vulnerability,then you will learn how to exploit this vulnerability.
- Sniffing
- Learn how to capture encrypted and unencrypted data, passwords and such (HTTP, telnet, HTTPS, etc)
- Metasploit
- Use This framework to exploit numerous vulnerabilities and crate backdoors
- Trojans, Backdoors, Viruses and Worms
- Cryptography
- Penetration testing on Wireless Networks
- Penetration Testing
NOTE: This course is created only for educational purposes and all the attacks are launched in an isolated lab environment.
Course Curriculum
Introduction to Ethical Hacking. Footprinting and Reconnaissance
- Introduction (1:14)
- Introduction to Ethical Hacking. Footprinting and Reconnaissance (24:55)
- Demo – Information Gathering using Google Dorks and DNS Queris (4:17)
- Demo – Scanning and Enumeration (8:08)
- Do it yourself – Information Gathering Exercise
Scanning Networks, Enumeration and Discovering Vulnearbilities
- Scanning and enumeration (8:58)
- Vulnerabilties Identification (8:28)
- Demo – Installing Nessus Scanner (3:31)
- Demo – Use Nessus to Discover Vulnerabilities (4:42)
- Demo – Using Nikto to discover Web Vulnerabilities (4:51)
- Demo – Using Paros for Vulnerability Discovery (4:49)
- Demo – Use Dirbuster to brute force sub-directories and filenames (2:50)
- Do it yourself – Scanning and enumeration, Vulnerability Discovery Exercise
System Hacking and Vulnerability Exploitation
- System hacking – vulnerability exploitation (5:59)
- Passwords (11:56)
- Authentication (6:55)
Sniffing
- Sniffing (15:00)
- Man in the Middle over Wireless or Wired Networks (11:05)
- Capturing HTTPS traffic over MITM). Get Gmail and Facebook passwords (8:56)
Metasploit
- Metasploit (17:08)
- Demo – Exploiting FTP Server Vulnerability using Metasploit (11:48)
- Demo – Post Exploitation Example (1:07)
- Demo – Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC (10:07)
- Demo – Eploiting Samba Service on Linux using Metasploit (3:09)
- Do it yourself – Vulnerability Exploitation using Metasploit Exercise
Trojans, Backdoors, Viruses and Worms
- Trojans and Backdoors (5:00)
- Computer viruses and worms (9:14)
Cryptography
- Cryptography concepts (4:56)
- Cryptographic Algorithms (11:09)
- Cryptography and cryptanalysis tools. Cryptography attacks (3:02)
- Demo – Hack SSH passwords using Medusa (5:14)
- Hack the SSH Password using Hydra (5:05)
- Hack Linux Passwords using John the Ripper (3:29)
- Do it yourself – Passwords Protection Exercise
Penetration Testing on Wireless Networks
- Penetration Testing on Wireless Networks (6:56)
- Do it yourself – WiFi Networks Security – practical approach
- Case Study – Windows Hosted Network Bug or Feature (10:42)
Penetration Testing Overview. Final words
- Penetration Testing Overview. Final Words (5:34)
Here's an overview of the prominent keywords and a list of famous authors:
Business and Sales: Explore business strategies, sales skills, entrepreneurship, and brand-building from authors like Joe Wicks, Jillian Michaels, and Tony Horton.
Sports and Fitness: Enhance athleticism, improve health and fitness with guidance from experts like Shaun T, Kayla Itsines, and Yoga with Adriene.
Personal Development: Develop communication skills, time management, creative thinking, and enhance self-awareness from authors like Gretchen Rubin, Simon Sinek, and Marie Kondo.
Technology and Coding: Learn about artificial intelligence, data analytics, programming, and blockchain technology from thought leaders like Neil deGrasse Tyson, Amy Cuddy, and Malcolm Gladwell.
Lifestyle and Wellness: Discover courses on holistic health, yoga, and healthy living from authors like Elizabeth Gilbert, Bill Nye, and Tracy Anderson.
Art and Creativity: Explore the world of art, creativity, and painting with guidance from renowned artists like Bob Ross and others.
All the courses on WSOlib are led by top authors and experts in their respective fields. Rest assured that the knowledge and skills you acquire are reliable and highly applicable.
Specification: Step by Step Network Penetration Tester – Gabriel Avramescu
|
User Reviews
Only logged in customers who have purchased this product may leave a review.
Original price was: $149.00.$29.00Current price is: $29.00.
There are no reviews yet.