-
Content Count
347 -
Donations
$0.00 -
Joined
-
Last visited
-
Days Won
19
Posts posted by iskey
-
-
for free
https://www.udemy.com/ethical-hacking-and-penetration-testing-kali-linux/?couponCode=dferxcfg+v45#/
Ethical Hacking and Penetration Testing course
Ethical Hacking (EH) and Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course that teaches you how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles etc- Web Application Penetration is specific to digging the same specific to web applications. </p> <p> Ethical Hacking for Computer Security<br> Ethical hackers are computer security experts who focus on penetration testing and weaknesses in an organization’s information systems.<br> <br> Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions. </p>
Students will be shown how to gather information intelligence, find web application and system security vulnerabilities, how to scan using Nmap and bypass IDS protected targets, how to hack clients using modern web browsers and how to collect important information once a system has been hacked into.
This course is ideal for web developers, IT security professionals, network engineers, Windows and Linux administrators, security engineers, database administrators and webmasters as well as anyone interested in learning basic ethical hacking techniques.
Upon completion, students will be able to apply ethical hacking practices to identify potential weaknesses, and understand the moves hackers would make to attempt to exploit a system. Students will also have the knowledge to recommend security measures that will make systems more impenetrable to hackers.- SECTION 1: Ethical Hacking and Penetration Testing (Kali Linux)
- 1Welcome8.27 MB
- 2System Requirements12.32 MB
- 3System Requirements12.32 MB
- SECTION 2: Introduction $ installing
- 4What This Course Will Cover02:16
- 5Prerequisites02:53
- 6Acquiring Dradis04:24
- 7Installing Dradis02:31
- 8Using Dradis04:01
- 9Adding Notes02:50
- 10Categorizing Information04:10
- 11Review of Scan Types04:35
- 12Advanced Scanning40.01 MB
- 13Scripting Engine35.15 MB
- 14Investigating Scan Types with Wireshark106.97 MB
- 15Importing Results to Dradis23.9 MB
- 16Aquiring Nessus37.72 MB
- 17Setting Up Nessus52.04 MB
- 18Configuring Nessus35.68 MB
- SECTION 3: Scan
- 19Scan Details Network25.92 MB
- 20Scan Details Credentials Plugins Options35.54 MB
- 21Scan Details Web Applications56.83 MB
- 22Starting Scan18.77 MB
- 23Reviewing Results70.78 MB
- 24False Positives51.41 MB
- 25Setting Up Jobs17.77 MB
- 26Acquiring Nexpose43 MB
- 27Setting Up Nexpose17.86 MB
- 28Configuring Nexpose39.59 MB
- 29Adding Hosts to Nexpose44.51 MB
- 30Reviewing Results & Manual Checks60.38 MB
- 31Netcat65.8 MB
- 32Protocol Checking80.07 MB
- 33SSL Client90.79 MB
- 34SSLScan94.5 MB
- 35Snmpwalk72.67 MB
- SECTION 4: Metasploit
- 36Acquiring Metasploit45.66 MB
- 37Setting Up Metasploit9.71 MB
- 38Metasploit Web Interface37.17 MB
- 39Configuring Workspaces20.94 MB
- 40Running Nmp from metasploit32.4 MB
- 41Import Nessus Results29.26 MB
- 42Scanning with Metasploit75.07 MB
- 43Looking at Vulnerabilities79.7 MB
- 44Searching Vulnerabilites51.26 MB
- 45Running Exploits48.47 MB
- 46Post Exploitation Data Gathering67.32 MB
- 47Pivoting & Tunneling42.24 MB
- 48Writing an MSF Plugin93.17 MB
- 49Writing Fuzzers102.77 MB
- 50Social Engineering Toolkit24.9 MB
- 51Spear Phishing88.06 MB
- 52Browser Plugins with Chrome94.97 MB
- 53Browser Plugins with Firefox47.91 MB
- 54Tamperdata52.22 MB
- 55Performing Injections26.86 MB
- 56Cookie Data with Tamperdata112.77 MB
- 57SQL Inject Me58.93 MB
- 58XSS Me54.91 MB
- 59Firebug84.03 MB
- 60Hackbar61.06 MB
- 61Wappalyzer39.74 MB
- 62Passive Recon85.83 MB
- 63Groundspeed33.8 MB
- 64Acquiring Webgoat72.88 MB
- 65Practicing Web Application Attacks24.55 MB
- 66Basics of Webgoat39.46 MB
- 67Working Through Lessons62.52 MB
- 68Acquiring Burpsuite29.07 MB
- 69Installing Burpsuite22.01 MB
- 70Running Burpsuite & Configuring Your Browser22.37 MB
- 71Spidering33.33 MB
- 72Passive Scanning35.2 MB
- 73Active Scanning48.03 MB
- 74Investigating Results88.56 MB
- 75Password Attacks55.03 MB
- 76Fuzzing Attacks85.17 MB
- 77Doing Sequencing50.18 MB
- 78Using the Intruder69.16 MB
- 79Acquiring W3Af21.86 MB
- 80Installing W3Af30.4 MB
- 81Running W3Af19.23 MB
- 82Configuring W3Af53.76 MB
- 83Acquiring & Configuring Zed Attack Proxy ZAP61.56 MB
- 84Quick Start with ZAP37.64 MB
- 85Scanning with ZAP46.62 MB
- 86Spidering with ZAP40.46 MB
- 87Fuzzing with ZAP46.02 MB
- 88Web Architecture45.57 MB
- 89Basics of SQL Injection31.78 MB
- 90Manual Testing56.19 MB
- 91SQLMap126.58 MB
- SECTION 5: Exploits
- 92Command Injection39.96 MB
- 93Cross Site Scripting34.91 MB
- 94Spear Phishing62.83 MB
- 95Cross Site Request Forgery19.54 MB
- 96Roque Servers69.9 MB
- 97Spoofed Certificates121.81 MB
- 98Course Wrap up6.91 MB
- 99Next Steps9.87 MB
- 3
-
hello
http://drivers.softpedia.com/get/BIOS/
enjoy
- 2
-
-
Merry Christmas and Happy New Year. I have a long and fruitful association with you. I also want to upload some nice software movies etc. but do not know how to do it. Is there any simple tutorial? I also want to donate! How to!! Thanks and Regards.
-
Thank u
awsome
superbe
- 1
-
I eat to live and I do not live to eat
--------------------------------------------------
1*-starve and be skinney
-------------------------------------------------
I suggest you 2 choices:
loose livingordie for a cause -
1*-personality
-----------------------------------------
I offer 2 choices:1*-live poor and happyor2*-live rich but unhappy -
you are Welcome and Happy new year 2015
-
-
Hi all,
my name is djpetrovic88 and I am a Web Developer and looking for good frameworks.
Happy New Year 2015
opens a new topic
-
some one you love is just fine
whats your favorite Hair color ?
and how tall do you like your partner ?
we must put 2 choices
-
-
My choice is the ferrari with that I can have any ...
--------------------------------------------------------
what would you prefer to live
1*-
someone who loves you
2*-
someone you love
Neh
-
superb awsome
-
-
nice work sir
Happy new year 2015
- 1
-
http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html
you must validated win 8.1
- 1
-
-
http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html
- 1
-
-
completed
-
First Happy New Year 2015
Welcome to CyberPhoenix community
-
http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html
- 1
-
completed
windows program alternative linux
in Link Heaven
Posted · Report reply
Hello CyberPhoenix community
Enter the name of a Windows program,
to see alternatives in Linux.
EnJoY