Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Penetration testing Course (Level-professional)
Exam Test
Exam Test Evaluation
Penetration testing Lab manual
Lap Manuel For Practic
1 Environment Setup Labs
1.1 configuration VMware workstation (12:26)
1.2 Configuration Kali Linux (13:11)
2 Network Reconnaissance & Vulnerability Assessment
2.1 Scan the LAN network by using Nmap in kali: (44:42)
2.2 Crack network protocols services passwords by Hydra tool (16:41)
2.3 Finding the vulnerabilities by python scanner vulnerability (54:46)
3. Exploitation, Detection & Monitoring
3.1 Exploit systems or by using malicious code created by Kali Privileges Escalation (36:10)
3.2 Detects the traffics and blocked by Firewall FortiGate by creation policies (62:31)
3.3 Monitoring the traffics by using some Python scripts on victim machine as forensics steps (55:58)
4 . Evasion, Privilege Escalation & Credential Attacks
4.1 Trying using encryption & evasion technique & Bypass AV (52:46)
4.2 Dumping the hashes & cracking by HashCat tool (5:41)
5 Advanced Attack Scenarios
5.1 Gain access by exploiting Windows services vulnerabilities (30:58)
5.2 Crack WEB passwords networks by using Air Crack tool (28:49)
5.3 Spoofing & Sniffing Information & Phishing Attacks: (23:16)
5.4 Scan on web server & exploit vulnerabilities: (44:29)
5.1 Gain access by exploiting Windows services vulnerabilities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock