学习道德黑客和渗透测试 - 实践
上次更新时间:2024-12-06
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
1. Course Overview
2. Section 2
- 1. Video - Section Overview (免费)
- 2. Video - Downloading ISO and OVA Files for VirtualBox
- 3. Video and lab - Creating a Virtual install of Kali using VirtualBox
- 4. Video and Lab - Create a Virtual Install of Windows 10 Pro Using VirtualBox
- 5. Video and lab - Installing Metasploitable2 Using VirtualBox
- 6. Video and lab - Creating an Install of Metasplotable3-w2k8
- 7. Video and Lab - Creating a Virtual Install of CSI Linux 2021.2
3. Troubleshooting VirtualBox
4. Passive Reconnaissance
- 1. Video - Section Overview
- 2. Video and Lab - Gathering Information Using Maltego
- 3. Video and Lab - Gathering Information Using CSI Linux Investigator
- 4. Video and Lab - Preparing CSI Linux to Use Shodan
- 5. Video and Lab - Using Shodan to Find Vulnerable Devices
- 6. Video and lab - Using Shodan to Search for Vulnerable Databases
5. Active Scanning with Nmap
6. Scanning for Vulnerabilities Using Nessus
7. Scanning for Vulnerabilities Using OpenVAS
8. Exploiting Microsoft Windows
9. MSFVENOM
10. Exploiting Linux
11. Social Engineering
12. BASH Scripting for Pentesters
13. Password Cracking
14. Pentesting Wireless Networks
15. Web Based Application Attacks
16. Browser Exploitation Framework (BeEF)
17. Remaining Anonymous
18. Capture the Flag Walkthrough - Mr. Robot
19. Capture the Flag Walkthrough – Stapler
课程内容
19个章节 , 65个讲座
1. Course Overview
2. Section 2
- 1. Video - Section Overview (免费)
- 2. Video - Downloading ISO and OVA Files for VirtualBox
- 3. Video and lab - Creating a Virtual install of Kali using VirtualBox
- 4. Video and Lab - Create a Virtual Install of Windows 10 Pro Using VirtualBox
- 5. Video and lab - Installing Metasploitable2 Using VirtualBox
- 6. Video and lab - Creating an Install of Metasplotable3-w2k8
- 7. Video and Lab - Creating a Virtual Install of CSI Linux 2021.2
3. Troubleshooting VirtualBox
4. Passive Reconnaissance
- 1. Video - Section Overview
- 2. Video and Lab - Gathering Information Using Maltego
- 3. Video and Lab - Gathering Information Using CSI Linux Investigator
- 4. Video and Lab - Preparing CSI Linux to Use Shodan
- 5. Video and Lab - Using Shodan to Find Vulnerable Devices
- 6. Video and lab - Using Shodan to Search for Vulnerable Databases