Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
PacktPub | Offensive Hacking Unfolded - Become A Pro Pentester [Video] [FCO]
packtpub offensive hacking unfolded become pro pentester video fco
Type:
Other
Files:
108
Size:
5.1 GB
Uploaded On:
Aug. 31, 2023, 8:48 p.m.
Added By:
Prom3th3uS
Seeders:
0
Leechers:
1
Info Hash:
E1241498D36E5D1FDD643DC1F2C90F3885111272
Get This Torrent
Lynda and other Courses >>> https://freecoursesonline.me/ Forum for discussion >>> https://onehack.us/ https://www.freecoursesonline.me/wp-content/uploads/2023/09/offensive-hacking.jpg PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester [Video] [FCO] About In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. All resources are placed here: https://github.com/PacktPublishing/Offensive-Hacking-Unfolded---Become-a-Pro-Pentester - Course updated August/2023, but Packtpub did not update the last update date! What You Will Learn - Create a virtual environment that has the hacker and target lab - Understand both active and passive modes - Learn to identify, analyze and rank vulnerabilities in a purely manual way - Evade scan time and runtime antiviruses for lifetime - Learn about Nmap and Vega - Learn to write industry grade penetration testing reports Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage. Instructor(s) Avinash Yadav: Avinash Yadav is a young information security expert with a special focus on cybersecurity management as well as double-blind penetration testing. He brings his experience to the table through his passion for teaching. He has authored a couple of online courses with well-curated concepts and practicals on penetration testing and information security that the students can pursue to build up skills that are needed to be able to work in the cybersecurity domain rather than just focusing on random sources of information. He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time! General Info: Author(s): Avinash Yadav Language: English Released: September 2022 Updated: 7/2023 ISBN: 9781804615294 Videos Duration: 10 hours 19 minutes Course Source: https://www./product/offensive-hacking-unfolded-become-a-pro-pentester-video/9781804615294
Get This Torrent
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url
377 bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url
239 bytes
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4
43.8 MB
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt
9.7 KB
1. Opening Lectures/2. Disclaimer.html
1.6 KB
1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html
2.5 KB
1. Opening Lectures/4. What can you do to get the most out of this course.mp4
36.2 MB
1. Opening Lectures/4. What can you do to get the most out of this course.srt
6.7 KB
1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4
35.8 MB
1. Opening Lectures/5. How to get answers to your questions and help with problems.srt
7.1 KB
10. Happy Ending Lectures/1. How to go more advanced with this course.html
3.0 KB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4
16.4 MB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt
2.9 KB
10. Happy Ending Lectures/3. What's your next step after doing this course.html
1.2 KB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4
5.4 MB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt
3.1 KB
11. BONUS Section/1. Bonus Lecture.html
2.1 KB
2. Fundamentals/1. Lab Setup using the VMware Player.mp4
110.9 MB
2. Fundamentals/1. Lab Setup using the VMware Player.srt
17.6 KB
2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html
114 bytes
2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html
133 bytes
2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html
6.5 KB
2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html
2.0 KB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4
184.3 MB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt
37.3 KB
3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4
113.5 MB
3. Information Gathering/1. Passive Reconnaissance - Part 1.srt
15.0 KB
3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4
136.7 MB
3. Information Gathering/2. Passive Reconnaissance - Part 2.srt
16.0 KB
3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4
129.4 MB
3. Information Gathering/3. Passive Reconnaissance - Part 3.srt
14.7 KB
3. Information Gathering/4. Store Passive Data in the Right Way.html
4.0 KB
3. Information Gathering/5. Active Reconnaissance - Part 1.mp4
87.3 MB
3. Information Gathering/5. Active Reconnaissance - Part 1.srt
13.2 KB
3. Information Gathering/6. Active Reconnaissance - Part 2.mp4
118.5 MB
3. Information Gathering/6. Active Reconnaissance - Part 2.srt
17.4 KB
3. Information Gathering/7. Active Reconnaissance - Part 3.mp4
75.8 MB
3. Information Gathering/7. Active Reconnaissance - Part 3.srt
13.7 KB
3. Information Gathering/8. Store Active Data in the Right Way.html
662 bytes
3. Information Gathering/8.1 Target DB.xlsx
10.4 KB
4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html
995 bytes
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4
235.2 MB
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt
33.6 KB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4
157.4 MB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt
28.9 KB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4
60.4 MB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt
12.8 KB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4
258.8 MB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt
42.4 KB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4
224.7 MB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt
39.0 KB
5. Exploitation/3. Essential Things You Should Know.html
1.1 KB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4
111.6 MB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt
19.3 KB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4
120.0 MB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt
18.4 KB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4
57.7 MB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt
11.5 KB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4
111.5 MB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt
18.2 KB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4
237.5 MB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt
33.9 KB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4
179.9 MB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt
24.7 KB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4
124.8 MB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt
19.2 KB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4
194.9 MB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt
34.9 KB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4
144.7 MB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt
21.7 KB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4
123.7 MB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt
18.6 KB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4
123.6 MB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt
16.5 KB
7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html
1.5 KB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4
55.4 MB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt
10.0 KB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4
167.2 MB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt
19.9 KB
7. Network PenTesting/13. Spawning Stable Shells.html
2.3 KB
7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4
128.8 MB
7. Network PenTesting/2. The Core of Network Testing - Part 1.srt
21.5 KB
7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4
213.4 MB
7. Network PenTesting/3. The Core of Network Testing - Part 2.srt
23.2 KB
7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4
101.4 MB
7. Network PenTesting/4. The Core of Network Testing - Part 3.srt
14.2 KB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4
114.0 MB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt
17.6 KB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4
81.2 MB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt
15.2 KB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4
79.3 MB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt
13.9 KB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4
158.3 MB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt
22.7 KB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4
142.7 MB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt
22.3 KB
8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html
1.0 KB
8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html
3.1 KB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4
65.2 MB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt
14.4 KB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4
221.4 MB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt
27.5 KB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4
141.1 MB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt
32.9 KB
9. Writing Great Reports/2. Report Writing with Perfect Examples.html
990 bytes
9. Writing Great Reports/2.1 PenTest Report (OHU).docx
973.8 KB
9. Writing Great Reports/2.2 PenTest Report (OHU).pdf
812.9 KB
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url
290 bytes