Details for this torrent 

PacktPub | Offensive Hacking Unfolded - Become A Pro Pentester [Video] [FCO]
Type:
Other > Other
Files:
108
Size:
5.11 GiB (5486312975 Bytes)
Uploaded:
2023-08-31 22:48:08 GMT
By:
Prom3th3uS
Seeders:
5
Leechers:
0
Comments
0  

Info Hash:
E1241498D36E5D1FDD643DC1F2C90F3885111272




(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda and other Courses >>> https://freecoursesonline.me/
Forum for discussion >>> https://onehack.us/

https://www.freecoursesonline.me/wp-content/uploads/2023/09/offensive-hacking.jpg

PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester [Video] [FCO]

About

In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way.

After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually.

Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format.

By the end of the course, you will be able to perform professional penetration testing in real life.

All resources are placed here: https://github.com/PacktPublishing/Offensive-Hacking-Unfolded---Become-a-Pro-Pentester

- Course updated August/2023, but Packtpub did not update the last update date!

What You Will Learn

- Create a virtual environment that has the hacker and target lab
- Understand both active and passive modes
- Learn to identify, analyze and rank vulnerabilities in a purely manual way
- Evade scan time and runtime antiviruses for lifetime
- Learn about Nmap and Vega
- Learn to write industry grade penetration testing reports

Audience

This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage.

Instructor(s)

Avinash Yadav: Avinash Yadav is a young information security expert with a special focus on cybersecurity management as well as double-blind penetration testing. He brings his experience to the table through his passion for teaching. He has authored a couple of online courses with well-curated concepts and practicals on penetration testing and information security that the students can pursue to build up skills that are needed to be able to work in the cybersecurity domain rather than just focusing on random sources of information.

He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!

General Info:

Author(s): Avinash Yadav
Language: English
Released: September 2022
Updated: 7/2023
ISBN: 9781804615294
Videos Duration: 10 hours 19 minutes
Course Source: https://www./product/offensive-hacking-unfolded-become-a-pro-pentester-video/9781804615294

0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url377 B
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url239 B
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp443.77 MiB
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt9.66 KiB
1. Opening Lectures/2. Disclaimer.html1.62 KiB
1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html2.49 KiB
1. Opening Lectures/4. What can you do to get the most out of this course.mp436.17 MiB
1. Opening Lectures/4. What can you do to get the most out of this course.srt6.67 KiB
1. Opening Lectures/5. How to get answers to your questions and help with problems.mp435.83 MiB
1. Opening Lectures/5. How to get answers to your questions and help with problems.srt7.07 KiB
10. Happy Ending Lectures/1. How to go more advanced with this course.html3 KiB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp416.37 MiB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt2.92 KiB
10. Happy Ending Lectures/3. What's your next step after doing this course.html1.23 KiB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp45.38 MiB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt3.07 KiB
11. BONUS Section/1. Bonus Lecture.html2.1 KiB
2. Fundamentals/1. Lab Setup using the VMware Player.mp4110.91 MiB
2. Fundamentals/1. Lab Setup using the VMware Player.srt17.65 KiB
2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html114 B
2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html133 B
2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html6.49 KiB
2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html1.98 KiB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4184.25 MiB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt37.26 KiB
3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4113.55 MiB
3. Information Gathering/1. Passive Reconnaissance - Part 1.srt14.98 KiB
3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4136.69 MiB
3. Information Gathering/2. Passive Reconnaissance - Part 2.srt15.97 KiB
3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4129.36 MiB
3. Information Gathering/3. Passive Reconnaissance - Part 3.srt14.66 KiB
3. Information Gathering/4. Store Passive Data in the Right Way.html3.96 KiB
3. Information Gathering/5. Active Reconnaissance - Part 1.mp487.28 MiB
3. Information Gathering/5. Active Reconnaissance - Part 1.srt13.25 KiB
3. Information Gathering/6. Active Reconnaissance - Part 2.mp4118.52 MiB
3. Information Gathering/6. Active Reconnaissance - Part 2.srt17.4 KiB
3. Information Gathering/7. Active Reconnaissance - Part 3.mp475.83 MiB
3. Information Gathering/7. Active Reconnaissance - Part 3.srt13.69 KiB
3. Information Gathering/8. Store Active Data in the Right Way.html662 B
3. Information Gathering/8.1 Target DB.xlsx10.37 KiB
4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html995 B
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4235.22 MiB
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt33.63 KiB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4157.38 MiB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt28.92 KiB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp460.38 MiB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt12.84 KiB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4258.82 MiB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt42.43 KiB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4224.68 MiB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt38.96 KiB
5. Exploitation/3. Essential Things You Should Know.html1.13 KiB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4111.57 MiB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt19.31 KiB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4120.01 MiB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt18.44 KiB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp457.67 MiB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt11.49 KiB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4111.49 MiB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt18.19 KiB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4237.5 MiB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt33.91 KiB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4179.91 MiB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt24.69 KiB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4124.75 MiB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt19.19 KiB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4194.9 MiB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt34.9 KiB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4144.73 MiB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt21.73 KiB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4123.67 MiB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt18.61 KiB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4123.6 MiB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt16.49 KiB
7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html1.52 KiB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp455.4 MiB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt9.96 KiB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4167.2 MiB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt19.93 KiB
7. Network PenTesting/13. Spawning Stable Shells.html2.28 KiB
7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4128.8 MiB
7. Network PenTesting/2. The Core of Network Testing - Part 1.srt21.53 KiB
7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4213.38 MiB
7. Network PenTesting/3. The Core of Network Testing - Part 2.srt23.19 KiB
7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4101.37 MiB
7. Network PenTesting/4. The Core of Network Testing - Part 3.srt14.15 KiB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4114 MiB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt17.61 KiB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp481.21 MiB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt15.17 KiB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp479.27 MiB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt13.92 KiB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4158.31 MiB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt22.73 KiB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4142.74 MiB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt22.31 KiB
8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html1.04 KiB
8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html3.1 KiB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp465.21 MiB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt14.39 KiB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4221.42 MiB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt27.5 KiB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4141.06 MiB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt32.93 KiB
9. Writing Great Reports/2. Report Writing with Perfect Examples.html99 B
9. Writing Great Reports/2.1 PenTest Report (OHU).docx973.79 KiB
9. Writing Great Reports/2.2 PenTest Report (OHU).pdf812.88 KiB
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url29 B