Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Offensive Security Pathway - Level 3 Of 6

Rekomendowane odpowiedzi

5df6ed2a814343dae95d40db36dc27cd.avif
Free Download Udemy - Offensive Security Pathway - Level 3 Of 6
Published: 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.91 GB | Duration: 6h 0m
Offensive Security Lieutenant (OSL) - Now you are really starting to look like a hacker

What you'll learn
Master essential hacking tools like Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.
Understand why and how to perform vulnerability scanning using tools like OpenVAS, Nessus, and Nmap.
Gain insights into basic exploit development using public vulnerabilities and tools like Metasploit and MSFVenom.
Learn to exploit common vulnerabilities in both Windows and Linux systems and gain a foothold into a system.
Develop skills in password cracking techniques using tools like John the Ripper and Hashcat.
And more.
Requirements
If you have intermediate computer skills or have completed Levels 1 and 2 of this course, you should be well-prepared to proceed!
Description
Level 3 of the Offensive Security program, Offensive Security Lieutenant (OSL), focuses on equipping you with the practical tools and techniques used in real-world hacking scenarios. In this course, you'll master essential hacking tools like Nmap for network scanning, Metasploit for automated exploitation, and Burp Suite for web vulnerability assessments. You'll learn how to perform vulnerability scanning on systems using tools such as OpenVAS and Nessus to identify security weaknesses.You'll dive into the basics of exploit development, leveraging publicly known vulnerabilities and tools like Metasploit and MSFVenom to create working exploits. This chapter also focuses on hacking both Windows and Linux systems, teaching you how to exploit common misconfigurations and vulnerabilities in each environment. In addition, you'll explore the fundamentals of password cracking, employing brute force and dictionary attacks with tools like John the Ripper and Hashcat.Web application vulnerability scanning is also a key focus. Learn how vulnerability scanners work, how to identify vulnerabilities and when to use the different mechanics and tools.Whether you're an aspiring ethical hacker or a security professional seeking to hone your exploitation skills, this course is designed to provide you with the hands-on experience and knowledge you need to take your offensive security skills to the next level.SyllabusBasic Hacking Tools: Overview of entry-level hacking tools such as Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.Introduction to Vulnerability Scanning: Using tools like OpenVAS, Nessus, or Nmap to identify vulnerabilities in systems.Basic Exploit Development: Overview of creating basic exploits using public vulnerabilities and tools like Metasploit and MSFVenom.Hacking Windows: Exploiting common Windows vulnerabilities and misconfigurations for unauthorized access.Hacking Linux: Exploiting Linux-based systems through common vulnerabilities and configuration flaws.Password Cracking: Overview of password cracking techniques such as brute force, dictionary attacks, and tools like John the Ripper and Hashcat.Vulnerability Scanning: Introduction to vulnerability scanning. Learn about the different techniques and tools.
Overview
Section 1: Introductie
Lecture 1 3.1 Intro
Lecture 2 3.2 Chapter & Hacking Tools Introduction
Lecture 3 3.3 Active DNS Enumeration
Lecture 4 3.4 Nmap
Lecture 5 3.5 NetCat
Lecture 6 3.6 RPC
Lecture 7 3.7 NetBIOS
Lecture 8 3.8 SMB
Lecture 9 3.9 FTP
Lecture 10 3.10 SNMP
Lecture 11 3.11 SMTP
Lecture 12 3.12 LolBins
Lecture 13 3.13 Shells
Lecture 14 3.14 Metasploit and Meterpreter
Lecture 15 3.15 Interactive and Non-Interactive Shells
Lecture 16 3.16 Hacking Windows VS Hacking Linux
Lecture 17 3.17 Password Cracking
Lecture 18 3.18 NTLM & Kerberos
Lecture 19 3.19 Vulnerability Scanning
Lecture 20 3.20 Wrapping Up
Aspiring ethical hackers and penetration testers who want to enhance their technical skills.,IT and cybersecurity professionals seeking practical knowledge of vulnerability scanning and exploit development.,Security enthusiasts with a foundational understanding of offensive security eager to start hands-on exploitation.,Web developers interested in understanding how attackers use vulnerability scanners to identify weaknesses.,Anyone looking to improve their basic hacking knowledge.

Homepage:

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.







Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 6 Views
    • 1 Posts
    • 5 Views
    • 1 Posts
    • 6 Views
    • 1 Posts
    • 6 Views
    • 1 Posts
    • 6 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.