Hands-on Penetration Testing Labs plus Kali Linux, Snort and Wireshark Bundle.
Real practical hands on hacking skills from a top professional pentester using labs.
What you’ll learn
- Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, Metasploit, Wireshark, etc.
- Perform remote exploitation of systems
- Escalate local privileges to root level
- Utilize a variety of industry standard penetration testing tools within the Kali Linux distro
- Build buffer overflows manually
- Build your own penetration testing lab environment
- Discover vulnerabilities in web applications automatically and manually
- Local and remote buffer overflow
- SQL Injection
- Cross Site Scripting
- Familiarity with Windows and Linux
- Basic networking knowledge
- Desktop or Laptop with 8GB RAM (more preferable)
- Windows 7 or 10 host OS preferred (tested)
- Kali Linux
- SQLi Labs
- OWASP Juice Shop
- Basics IDS knowledge
Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course bundle is not for you.
First of all, this bundle is extremely hands-on. This means we’re not going to be doing much talking about the theory of penetration testing, we’re going to be diving into hands on technical application right away, utilizing industry standard open source technology to hack a variety of intentionally vulnerable operating systems.
All of the resources to build the labs are free. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.
We’ll be building a lab environment consisting of Kali Linux, and several intentionally vulnerable web applications including Beebox, SQL injection labs, OWASP Juice Shop, and WebGoat.
We’re also going to cover network security analysis with Wireshark and Tcpdump, intrusion detection system analysis with Snort and Squert, and ethical hacking and penetration testing with various tools on Kali Linux. We will also cover Snort Intrusion Detection, Rule Writing, and PCAP Analysis.
The main points that will be covered in this bundle is enumeration, vulnerability scanning, remote exploitation, buffer overflows, privilege escalation, etc.
These labs will show you how to interpret results from tools such as Nmap, Dirb, and enum4linux, and use them effectively to compromise vulnerable systems.
More specifically, we’ll be going over key essential pentesting skills such as port scanning and service enumeration, local file inclusion, web directory brute forcing, buffer overflows exploit development, SQL injection, Cross-Site Scripting, various types of reverse shells, a variety of local privilege escalation, and much more.
Please note that these labs contain spoilers. I highly encourage independent research and attempting to find answers on your own. This is the single most important skill as a penetration tester, the ability to find solutions to problems you haven’t yet encountered.
Who this course is for:
- Cybersecurity Students
- Cybersecurity Professionals
- Aspiring Penetration Testers
- CEH Candidates
- OSCP Candidates
- Pentest+ Candidates