وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
6

Learn Ethical Hacking and Pentesting – Hands-on

سرفصل های دوره

An Introduction to the Hacking Techniques of Hackers, Ethical Hackers, Pentesters and Cyber Security Professionals


1. Course Overview
  • 1.1 Course Overview - Ethical Hacking.pptx.html
  • 1. Video - Course Overview

  • 2. Section 2 - Building Your Virtual Lab Environment Using VirtualBox
  • 1. Video - Section Overview
  • 2.1 Direct links for Windows 10.docx
  • 2. Video - Downloading ISO and OVA Files for VirtualBox
  • 3.1 Lab - Creating a Virtual Install of Kali Using VirtualBox.pdf
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox
  • 4.1 Lab - Create a Virtual Install of Windows 10 Using VirtualBox.pdf
  • 4. Video and Lab - Create a Virtual Install of Windows 10 Pro Using VirtualBox
  • 5.1 Lab Creating a Virtual Install of Metasploitable2 Using VirtualBox.pdf
  • 5. Video and lab - Installing Metasploitable2 Using VirtualBox
  • 6.1 Lab - Create a Virtual Install of Metasploitable3 w2k8 Using VirtualBox.pdf
  • 6. Video and lab - Creating an Install of Metasplotable3-w2k8
  • 7.1 Lab - Creating a Virtual Install of CSI Linux.pdf
  • 7. Video and Lab - Creating a Virtual Install of CSI Linux 2021.2

  • 3. Troubleshooting VirtualBox
  • 1. Video - Adding a NAT Network in VirtualBox 7.0.2
  • 2. Video - Installing the VirtualBox Extension Pack
  • 3. Video - Fix Duplicate IP Address Issue With VirtualBox
  • 4. Video - Taking a Snapshot of Your Current Configuration

  • 4. Passive Reconnaissance
  • 1. Video - Section Overview
  • 2.1 Lab - Gathering Information Using Maltego.pdf
  • 2. Video and Lab - Gathering Information Using Maltego
  • 3.1 Lab - Gathering Information Using CSI Linux.pdf
  • 3. Video and Lab - Gathering Information Using CSI Linux Investigator
  • 4.1 Lab Preparing CSI Linux to Use Shodan.pdf
  • 4. Video and Lab - Preparing CSI Linux to Use Shodan
  • 5.1 Lab Using Shodan to Find Vulnerable Devices Connected to the Internet.pdf
  • 5. Video and Lab - Using Shodan to Find Vulnerable Devices
  • 6.1 Lab Using Shodan to Search for Vulnerable Databases.pdf
  • 6. Video and lab - Using Shodan to Search for Vulnerable Databases

  • 5. Active Scanning with Nmap
  • 1. Video - Section Overview
  • 2.1 Lab - Introduction to Nmap.pdf
  • 2. Video and Lab - Introduction to Nmap
  • 3. Video - Service and Open Port scan
  • 4. Video - OS Detection
  • 5. Video - Host Discovery
  • 6. Video - Analyzing NMap Results
  • 7.1 Lab - Using the Nmap Scripting Engine (NSE).pdf
  • 7. Video and lab - NMap Scripting Engine (NSE)
  • 8.1 Lab Scanning for WannaCry Ransomware.pdf
  • 8. Video and lab - Scanning for WannaCry Ransomware

  • 6. Scanning for Vulnerabilities Using Nessus
  • 1.1 Lab - Installing NESSUS Using Docker.pdf
  • 1. Video and Lab - Installing NESSUS Using Docker
  • 2.1 Lab - Scanning for Vulnerabilities Using Nessus.pdf
  • 2. Video and lab - Scanning for Vulnerabilities Using Nessus
  • 3. Video - Using Your Nessus Scan Results

  • 7. Scanning for Vulnerabilities Using OpenVAS
  • 1.1 Lab - Installing OpenVAS Using Docker.pdf
  • 1. Video and Lab - Installing OpenVAS Using Docker
  • 2.1 Lab - Scanning for Vulnerabilities Using OpenVAS .pdf
  • 2. Video and Lab - Scanning for Vulnerabilities Using OpenVAS

  • 8. Exploiting Microsoft Windows
  • 1.1 Lab - Dumping Wi-Fi Credentials Using netsh - DF.pdf
  • 1. Video and Lab - Dumping Wi-Fi Credentials Using netsh
  • 2.1 Lab Post-Exploitation Meterpreter Scripts.pdf
  • 2. Video and Lab - Post-Exploitation of Microsoft Windows
  • 3.1 Lab - Performing an RDP Brute Force Attack.pdf
  • 3. Video and Lab - Performing an RDP Brute Force Attack

  • 9. MSFVENOM
  • 1.1 Lab - Use Msfvenom to Create a BIND Shell.pdf
  • 1. Video and Lab - Use MSFVENOM to Create a BIND Shell Payload
  • 2.1 Lab - Use Msfvenom to Create a Reverse TCP Payload.pdf
  • 2. Video and Lab - Use MSFVENOM to Create a Reverse TCP Payload
  • 3.1 Lab - Use Msfvenom to Create an HTTPS Payload.pdf
  • 3. Video and Lab - Use MSFVENOM to Create a HTTPS Payload
  • 4.1 Lab - Use Msfvenom to Create Hidden Bind TCP Payload.pdf
  • 4. Video and Lab - Use MSFVENOM to Create a Hidden Bind TCP Payload
  • 5.1 Lab - HTML Smuggling Attack.pdf
  • 5. Video and Lab - HTML Smuggling Attack

  • 10. Exploiting Linux
  • 1. Video - Section Overview
  • 2.1 Lab - Learning to Hack Linux Using Metasploitable2.pdf
  • 2. Lab - Learning to Hack Linux Using Metasploitable2.html
  • 3.1 Lab - Exploring Endpoint Attacks.pdf
  • 3. Lab - Exploring Endpoint Attacks.html
  • 4. Video - Exploiting the UNIXLinux rlogin Vulnerability
  • 5. Video - Exploiting VSFTPD v2.3.4 Using Metasploit

  • 11. Social Engineering
  • 1.1 Lab - Social Engineering with ZPhisher.pdf
  • 1. Video and lab - Lab - Social Engineering with ZPhisher

  • 12. BASH Scripting for Pentesters
  • 1.1 Lab Introduction to BASH Scripting.pdf
  • 1. Video and Lab - Introduction to BASH Scripting
  • 2.1 Lab B - Creating a BASH Script for Scanning Vulnerable Ports.pdf
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports
  • 3.1 Lab -Linux BASH Shell Scripting -Task Scheduling.pdf
  • 3. Lab -Linux BASH Shell Scripting -Task Scheduling.html

  • 13. Password Cracking
  • 1.1 Lab - Using Hydra to Brute Force a Password.pdf
  • 1. Video and Lab - Password Cracking Using Hydra
  • 2.1 Lab Password Cracking Using Medusa.pdf
  • 2. Video and Lab Password Cracking Using Medusa
  • 3.1 Lab - Password Cracking Using Mimikatz.pdf
  • 3. Video and Lab - Passwords Cracking Using Mimikatz

  • 14. Pentesting Wireless Networks
  • 1.1 Lab Installing a Wireless Adapter in Kali.pdf
  • 1. Video and Lab - Installing a Wireless Adapter in Kali
  • 2.1 Lab Hacking a Wireless Network Using Kali Linux.pdf
  • 2. Video and Lab - Hacking a Wireless Network Using Kali Linux
  • 3.1 Lab - Wireless Deauthentication Using Kali Linux.pdf
  • 3. Video and Lab - Wireless Deauthentication Attack
  • 4.1 Lab PMKID Client-less Wireless Attack Using Bettercap.pdf
  • 4. Video and Lab - PMKID Client-less Wireless Attack Using Bettercap

  • 15. Web Based Application Attacks
  • 1.1 Lab - Installing w3af in Kali Linux Using Docker.pdf
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker
  • 2.1 Lab Conducting A Website Vulnerability Scan Using w3af.pdf
  • 2. Video and Lab Conducting A Website Vulnerability Scan Using w3af
  • 3.1 Lab - Performing a Browser Based Attack.pdf
  • 3. Video and Lab Performing a Browser Based Attack
  • 4.1 Lab - SQL Injection Attack using SQLMap.pdf
  • 4. Video and lab - SQL Injection Attack Using SQLmap

  • 16. Browser Exploitation Framework (BeEF)
  • 1. Video - Configure Kali for Exploitation the WAN
  • 2.1 Lab - Browser Exploitation Framework (BeEF) - Client-Side Attacks.pdf
  • 2. Video and lab - The Browser Exploitation Framework (BeEF)

  • 17. Remaining Anonymous
  • 1.1 Lab Anonymize Kali Using Whonix.pdf
  • 1. Video and Lab - Anonymize Kali Using Whonix

  • 18. Capture the Flag Walkthrough - Mr. Robot
  • 1.1 Lab - CTF - mrRobot.pdf
  • 1. Lab file - Capture the Flag (CTF) Mr. Robot.html
  • 2. Video Walk Through -Key #1
  • 3. Video Walk through - Key #2
  • 4. Video Walk Through - Key #3

  • 19. Capture the Flag Walkthrough Stapler
  • 1.1 Lab - CTF - Stapler.pdf
  • 1. Lab File - Walkthrough - CTF Stapler.html
  • 2. Video - Capture the Flag - Stapler Part 1
  • 3. Video - Capture the Flag - Stapler Part 2
  • 4. Video - Capture the Flag - Stapler Part 3
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 20752
    حجم: 6569 مگابایت
    مدت زمان: 621 دقیقه
    تاریخ انتشار: ۱۵ مهر ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید