2015
Cyber Security & Privacy Foundation / Udemy
3:58
English
The course teaches Metasploit advanced hacking into intranet, Malware analysis, nmap-nessus scripts, log analysis, automated web portal analysis, cross scripting exploiter. The course is made for advanced users, penetration testers beginners who would want to learn methods to penetrate intranet, tools needed for malware analysis, Intelligence which needs to be build into log analysis.
Section 1: Advanced Metasploit
1 Msfpayload - Theory
2 MsfPayload - DEMO
3 Verify Intranet Settings on VirtualBox
4 Metasploit - Hacking into the Intranet from using a Internet Facing machine
5 Metasploit - Hacking into the Intranet from using a Internet facing machine - DEMO
Section 2: [n]Canvas Penetration Testing Tool - Advanced Attacks & 'exploitation
6 Hacking the Intranet
7 Exploiting Drupal SQL Injection Vulnerability
8 Exploiting Windows XP machine using SMB Vulnerability
9'exploitation - Generating WAR Trojan(reverse connecting) for Tomcat Server
10 Local Privilege Escalation on Windows 7
11 Exploiting JBOSS Server
12 of'exploitation Icecast server on Windows Server
13 Remote'exploitation - Hacking Wordpress Webportal and Rooting CentOS server
14 Exploiting using D2 Elliot and Canvas PT Tools
Section 3: Xenotix Cross Scripting Scanner & Exploiter
15 Xenotix Presentation
16 Xenotix - Cross Scripting Scanner
Section 4: Ironwasp - Automated Web Application Scanner
17 Presentation Ironwasp
18 Ironwasp Demo
Section 5: OS Hardening
19 OS Hardening
20 OS hardening Demo
Step 6: Log Analysis
21 Log Analysis
22 Log Analysis DEMO
Section 7: Nmap Scripting
23 Nmap & Nessus Scripting
24 Nmap & Nessus Scripting - DEMO
25 Nmap & Nessus Scripting - DEMO
Section 8: Anonymous Hacking - VPN, TOR, VPS
26 VPN - TOR
27 Using VPN, TOR, VPS (All together) - To Hide Track
28 VPN->TOR->Linux VPS->TOR(Using Nmap, Sqlmap)
29 Linux Desktop->Tor->Windows VPS Hacking Machine
Section 9: Malware Analysis
30 Malware Analysis
31 Finding Information on Windows PE files
32 File Analyser
33 Process Hackers
34 Dependency Walker
35 File System & Registry Snapshot
36 Wireshark - Malware Analysis
Section 10: Hardware hacking - Introduction
37 Hardware Hacking
Section 11: Certified White Hat Hacker Level 2 - Questions
38 Certified White Hat Hacker Level 2
Download File Size:565.81 MB