Handson Penetration Testing Labs 10

Comprehensive walkthroughs of penetration testing labs
Handson Penetration Testing Labs 10
File Size :
2.86 GB
Total length :
4h 27m

Category

Instructor

Jesse K, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP

Language

Last update

4/2020

Ratings

4.6/5

Handson Penetration Testing Labs 10

What you’ll learn

Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, etc.
Perform remote exploitation of systems
Escalate local privileges to root level
Utilize a variety of industry standard penetration testing tools within the Kali Linux distro
Build buffer overflows manually

Handson Penetration Testing Labs 10

Requirements

Basic Linux knowledge
Basic networking knowledge
Kali Linux
Desktop or Laptop with a minimum of 2GB RAM (8GB+ preferable)
VirtualBox
Windows 7 or 10 host OS preferred (tested)

Description

NOTE: This is independent from my other course, Hands-on Pentration Labs 1.0 – they both have original content and you’re not required to buy one or the other by itself.Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course is not for you.This course consists of 100% hands-on technical labs, utilizing industry standard open source technology to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course (VMware Player, Kali Linux, Kioptrix, etc.). Moreover, I’ve set up a Google drive for you to conveniently download all vulnerable VMs. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.The main points that will be covered in this course is enumeration, remote exploitation, buffer overflows, and privilege escalation. These labs will show you how to interpret results from tools such as Nmap, Dirb, and enum4linux, and use them effectively to compromise vulnerable systems. Please note that these labs contain spoilers, and it is a good idea to attempt to compromise the vulnerable systems on your own prior to getting the answers from the walk through that’s provided.

Overview

Section 1: Hands-on Labs

Lecture 1 Introduction

Lecture 2 Overview of Lab Commands and Tools

Lecture 3 Bonus Lab – Kali Linux 2020

Lecture 4 Download and Configure Kali Linux

Lecture 5 Download Vulnerable Lab VMs

Lecture 6 Kioptrix Level 1 – Enumeration and Exploitation

Lecture 7 Kioptrix Level 2 – Enumeration and Exploitation

Lecture 8 Kioptrix Level 3 – Enumeration and Exploitation

Lecture 9 Kioptrix Level 4 – Enumeration and Exploitation

Lecture 10 Kioptrix Level 5 – Enumeration and Exploitation

Lecture 11 Tr0ll 1 – Enumeration and Exploitation

Lecture 12 Tr0ll 2 – Enumeration and Exploitation

Lecture 13 Bonus Lab 1: Security Onion Lab Setup with VirtualBox

Lecture 14 Bonus Lab 2: Windows 7 Eternalblue Vulnerable VM VirtualBox Setup

Lecture 15 Bonus Lab 3: Windows 7 Eternalblue Exploitation and Snort/PCAP Analysis

Lecture 16 Bonus Lab 4: Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup

Lecture 17 Bonus Lab 5: Ubuntu Server 12.04 Heartbleed Exploitation and Snort/PCAP Analysis

Lecture 18 Bonus Lab 6: SLMail Buffer Overflow Development

Cybersecurity Students,Cybersecurity Professionals,New Penetration Testers,CEH Candidates,OSCP Candidates,Pentest+ Candidates

Course Information:

Udemy | English | 4h 27m | 2.86 GB
Created by: Jesse K, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top