Setup Menus in Admin Panel

  • No products in the cart.

Course Name: Complete Penetration Testing and Ethical hacking Bootcamp


Course Curriculum

Section 1: Must have basics for a Penetration Tester
Introduction to the course 00:00:00
What is pentesting and why it is important 00:00:00
Average earnings of pentesters 00:00:00
White hat, black box and vulnerabilities 00:00:00
Proxy, virtual box and OS 00:00:00
Grabbing the tools 00:00:00
Section 2: Installation and configuration of lab for pentesting
Installation of Virtual Box 00:00:00
Installation of attacker – Kali 00:00:00
Windows Update – Installation for windows users 00:00:00
Tour to Virtual Box and installing advance settings 00:00:00
Tools required for labs 00:00:00
Installing Metasploitable on Virtual Box 00:00:00
Windows XP installation in Virtual Box 00:00:00
Tour to our attacker machine 00:00:00
Tour to Pentesting tools and updating the machine 00:00:00
Section 3: Optional linux section. Just basics yet important part of all linux
Bash shell and navigation in linux 00:00:00
Files and files permission in linux 00:00:00
Case study directories and files with VIM and NANO 00:00:00
Manipulation of file data 00:00:00
Grep piping and sudo in linux 00:00:00
Section 4: Gathering information to perform pentesting
Up and running with TOR and dark net 00:00:00
Anonymity using proxychains 00:00:00
Changing your MAC for tests 00:00:00
DNS Enum Information Gathering 00:00:00
Zone Transfer Vulnerability 00:00:00
Dumping information with dig 00:00:00
DNS Tracer and quick look to Wireshark 00:00:00
Is Dimitry still a good option 00:00:00
Finding emails subdomain and generating reports 00:00:00
Assignment and recon-ng 00:00:00
Section 5: Learning about Nmap Nikto OpenVas and report genrating
Tweaking our labs for future labs 00:00:00
Nmap study and assignments to evaluate 00:00:00
Solution to assignment and port scans 00:00:00
Taking advantage of known Vulnerability and metasploit 00:00:00
Scanning with Nikto 00:00:00
OpenVas Installation and configuration 00:00:00
Generating and analyzing pentesting reports 00:00:00
Section 6: Performing a Penetration Testing on a client
Getting NDA signed permissions and scope of testing 00:00:00
Information gathering about client machine 00:00:00
Attacking the machine with msfconsole 00:00:00
Exploiting another vulnerability 00:00:00
Sniffing the traffic with wireshark and get the password 00:00:00
Nmap scripting engine and distcc 00:00:00
Section 7: Web Application Penetration Testing
Getting started with Web Application Pentesting 00:00:00
Installing test bed for web application pentesting 00:00:00
Installing Vega firefox addons and Brute force attacks 00:00:00
Exploring the command injection Vulnerability 00:00:00
Reflected and Stored XSS ie Cross Site scripting 00:00:00
DOM based XSS and learning resource 00:00:00
Google Reward Program that gives 7500 dollars for XSS 00:00:00
Cross site request forgery Vulnerability 00:00:00
Reference to further 6 hour free sql injection course shells and defacing 00:00:00
Section 8: Automation of Web Application pentesting
Web application Pentesting automation with Vega 00:00:00
Automation of SQL Injection Attack with SQLMAP 00:00:00
Automation with OWASP-ZAP 00:00:00
Scanning WordPress sites for Vulnerabilities 00:00:00
Paid options for Automation of Web App Pentesting 00:00:00
Section 9: Wep App Pentesting Challenge
A pentesting challenge that will help in getting Bug Bounties 00:00:00
Hint for solving the challenge 00:00:00
Section 10: Getting started with metasploit Framework
Introduction to metasploit and its architecture 00:00:00
Msfconsole and Exploits type 00:00:00
Setting up msf database and meterpreter 00:00:00
Armitage and meterpreter 00:00:00
Social Engineering toolkit and Client side exploits 00:00:00
Section 11: Wireless Pentesting
Before we even get started into wireless pentesting 00:00:00
Understanding our wireless card 00:00:00
Cracking WEP and WPA 2 with fern 00:00:00
Airmon-ng with wireshark and airodump-ng in action 00:00:00
EvilTwin with Airbase-ng and deauth attack with aireplay-ng 00:00:00
Section 12: Password attacks
Basics of Password attacks and Crunch password generators 00:00:00
Online Learning Thailand.