fbpx
Dark Light
-50%
,

Advanced White Hat Hacking and Penetration Testing


299.00 599.00

Compare

Table of contents

  1. Introduction
    1. What You Should Expect00:02:18
    2. What You Should Know00:04:49
    3. What You Will Learn00:04:04
    4. System Requirements00:02:35
  2. Getting Organized
    1. Ethical Hacking00:04:05
    2. Dradis Framework00:02:47
    3. Using Notes With Dradis00:03:48Web Testing With NMAP00:04:28
    1. Scanning And Scripting With NMAP And UDP00:03:58
    2. Scanning With Hping00:03:02
    3. Payload-Based Scanning With Unicorn Scan00:02:45
    4. TCP Scanning With Unicorn Scan00:04:10
  3. Data Acquisition
    1. Using Wappalyzer00:03:15
    2. Using Passive Recon00:04:55
    3. Using Firebug00:05:38
    4. Using Groundspeed00:05:22
    5. Converting With Hackbar00:02:40
    6. Managing Cookies00:04:35
  4. Metasploit
    1. Starting Up Metasploit00:02:41
    2. Scanning With Metasploit00:02:59
    3. Service Scanning With Metasploit00:04:59
    4. SMB Scanning With Metasploit00:06:23
    5. Importing Nessus Results00:05:16
    6. Creating Payloads00:05:36
    7. Creating Standalone Exploits00:03:18
    8. Encoding And Packing00:04:17
    9. Writing Fuzzers Using Metasploit00:06:44
    10. Exploits00:03:56
    11. Using Meterpreter00:03:08
    12. Post-Exploitation00:02:52
    13. Pivoting00:04:20
    14. Manipulating Windows API00:04:06
    15. Client Side Attacks00:06:32
    16. Social Engineering Toolkit00:02:25
    17. Spear Phishing00:03:33
    18. Web Attacks00:03:16
    19. Automating Metasploit00:03:22
    20. SQL Server Logins00:04:53
    21. Token Stealing00:02:51
    22. Extending Metasploit00:05:12
  5. Web Testing
    1. Running Burp Suite00:02:15
    2. Passive Scanning00:04:35
    3. Active Scanning00:04:54
    4. Using The Intruder00:02:41
    5. Brute Forcing Passwords00:03:33
    6. SQL Injection Testing With Burp Suite00:05:59
    7. Cross Site Scripting With Burp Suite00:04:57
    8. Using The Burp Suite Repeater00:03:08
    9. Using The Burp Suite Sequencer00:04:31
    10. XSS-Me00:04:14
    11. SQL-Inject Me00:03:51
    12. TamperData00:03:39
    13. Injection Attacks With TamperData00:04:05
    14. Hidden Form Fields00:03:09
    15. ZED Attack Proxy00:04:10
    16. Fuzzing With ZED Attack Proxy00:03:36
    17. Hackbar00:02:32
  6. Reverse Engineering
    1. Assembly Basics00:04:49
    2. Buffer Overflows00:04:37
    3. Format String Attacks00:03:24
    4. Debugging – Linux00:04:43
  7. Fuzzing
    1. Peach Fuzzer00:02:28
    2. HTTP Fuzzing With Peach00:04:56
    3. E-Mail Fuzzing With Peach00:05:08
    4. File And Network Fuzzing With Peach00:03:33
    5. Sulley00:04:44
    6. Spike Proxy00:02:53
  8. Wrapping Up
    1. Extending Your Learning00:04:05
  9. About The Author
    1. About Ric Messier00:03:01

Based on 0 reviews

0.0 overall
0
0
0
0
0

Only logged in customers who have purchased this product may leave a review.

There are no reviews yet.

Open chat
Hello 👋
Can we help you?