Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Basic Penetration Testing Online Course in Thai

Descriptions

Course Curriculum

Section 0: Technique ต่างๆของ Course
Review Advance Metasploit Next Level 00:00:00
Section 1: Overview and basic information security knowledge
Course Overview FREE 00:00:00
Introduction and basic knowledge of information security FREE 00:00:00
Risk Assessment – Part 1 00:00:00
Risk Assessment – Part 2 00:00:00
Section 2: Kali Linux
Kali Linux 00:00:00
How to run Kali Linux 00:00:00
Kali Rolling Edition 00:00:00
How to install Kali Linux in Virtualbox 00:00:00
How to install Guest Additional Tool in Virtualbox 00:00:00
How to install Kali Linux in VMWare Fusion 00:00:00
How to Install VMWare Tools in Kali Linux 00:00:00
Install open-vm-tools-desktop in VMWare Fusion 00:00:00
Section 3: Intelligence Gathering
Overview of Intelligence Gathering 00:00:00
What is DNS, NSLOOKUP, WHOIS 00:00:00
How to use NSLOOKUP 00:00:00
What is dig command 00:00:00
Dig and Zonetransfer 00:00:00
Zonetransfer with tools 00:00:00
Intelligence Gathering with Windows and Website 00:00:00
OSINT – Part 1 00:00:00
OSINT – Part 2 00:00:00
What is Recon-ng And how to use it 00:00:00
Recon-ng in actions – Part 1 00:00:00
Recon-ng in actions – Part 2 00:00:00
Recon-ng in actions – Part 3 00:00:00
Google Hacking – Part 1 00:00:00
Google Hacking – Part 2 00:00:00
Google Hacking with Tools 00:00:00
What is Spiderfoot And how to use it 00:00:00
Search Engine for Pentester 00:00:00
Metadata and how to view it 00:00:00
Section 4: Network Security
What is surface of target 00:00:00
What is NetBIOS 00:00:00
Network Security and Basic Network – Part 1 00:00:00
Network Security and Basic Network – Part 2 00:00:00
Learning NMAP in practical way – Part 1 00:00:00
Learning NMAP in practical way – Part 2 00:00:00
NSE Categories 00:00:00
Example of NSE 00:00:00
Learning NSE in practical way 00:00:00
Auditing website with NSE – Part 1 00:00:00
Auditing website with NSE – Part 2 00:00:00
Write your own NSE 00:00:00
Edit NSE for your propose 00:00:00
How to install Nessus and How to use Nessus scanner 00:00:00
How to setup and use Openvas 00:00:00
Web Vulnerability Scanner and Arachni 00:00:00
Netcat Usage 00:00:00
Network Sniffer and Man in the middle 00:00:00
DNS Spoofing 00:00:00
DNS Spoofing with Ettercap 00:00:00
Bettercap 00:00:00
Using bettercap to inject javascript 00:00:00
Section 5: Metasploit
Overview of Metasploit – Part 1 00:00:00
Overview of Metasploit – Part 2 00:00:00
Metasploit Pro Log 00:00:00
Ranking of Module 00:00:00
Msfconsole 00:00:00
Metasploit in one line 00:00:00
Msfvenom 00:00:00
Msfvenom in actions – Part 1 00:00:00
Msfvenom in actions – Part 2 00:00:00
Metasploit works with database 00:00:00
Web Delivery Module 00:00:00
Exploit MS08-067 netapi with Metasploit 00:00:00
Exploit Easy File Management Web Server with Metasploit 00:00:00
Brute Forcing SSH with Metasploit 00:00:00
Automate in Metasploit 00:00:00
Metasploit Cheat Sheet 00:00:00
Section 6: Crack the password
Overview crack the password 00:00:00
Cewl Usage 00:00:00
Brute forcing SSH with Hydra 00:00:00
Brute forcing HTTP with Hydra 00:00:00
LM Hash และ Linux Password 00:00:00
Cracking LMHash and NTLM 00:00:00
Windows Credential Editor 00:00:00
Cracking Linux Password 00:00:00
Crack PDF Password 00:00:00
Crack Zip File 00:00:00
Section 7: Web Application Security
Slide of Web Architecture 00:00:00
Web Architecture – Part 1 00:00:00
Web Architecture – Part 2 00:00:00
Information gathering website 00:00:00
Basic SQL 00:00:00
SQL Injection 00:00:00
Timebase SQL Injection 00:00:00
Cheat Sheet SQL Injection 00:00:00
Cross Site Scripting (XSS) 00:00:00
File Inclusion – Part 1 00:00:00
File Inclusion – Part 2 00:00:00
File Upload 00:00:00
Command Injection 00:00:00
Cross Site Request Forgery (CSRF) 00:00:00
Section 8: Client Side Exploitation
Overview of Client Side Exploitation 00:00:00
Overview of DLL Hijacking 00:00:00
DLL Hijacking in actions 00:00:00
Exploit with Winrar SFX 00:00:00
Bypass antivirus with Shellter 00:00:00
Create malicious document with Metasploit 00:00:00
Exploit Adobe Reader with adobe pdf embbed.exe 00:00:00
Exploit Adobe Flash Player with Metasploit 00:00:00
Section 9: Post Exploitation
Overview of Post Exploitation and Post exploitation in Windows 00:00:00
Post Exploitation in Linux 00:00:00
Privilege Escalation with Hot Potato technique 00:00:00
BypassUAC with Metasploit 00:00:00
Post Exploitation with windows command 00:00:00
Pivoting network 00:00:00
Pivoting network with autoroute command in Metasploit 00:00:00
Pivoting network with SSH 00:00:00
Pivoting network with proxychains 00:00:00
Post exploitation with Metasploit – Part 1 00:00:00
Post exploitation with Metasploit – Part 2 00:00:00
Privilege Escalation with MS16-032 (Powershell) 00:00:00
Post exploitation – using Mimikatz in Metasploit 00:00:00
Section 10: Reporting
Reporting 00:00:00
Section 11: Play Ground
Lab 1 – Part 1 00:00:00
Lab 1 – Part 2 00:00:00
Lab 2 – Part 1 00:00:00
Lab 2 – Part 2 00:00:00
Vulnerability Lab-01 00:00:00
Lab – hack drupal (Droopy) 00:00:00
Online Learning Thailand.
X