Сообщение

[Pentester Academy] Network Pentesting [2013, ENG]

Сообщение Солнышко » 26 фев 2017, 15:53

Network Pentesting


Год выпуска: 2013
Производитель: Pentester Academy
Сайт производителя: www.pentesteracademy.com/course?id=6
Продолжительность: 14:17:38
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Курс от Penstester Academy
A non-exhaustive list of topics to be covered include:

    Information Gathering - OSINT, DNS, SNMP etc.
    Pentesting Network Components - Router, Switch, Firewall, IDS/IPS
    Pentesting Windows Environments - domain controllers, pass-the-hash, active directory etc.
    Pentesting Linux Environments
    Pentesting Mobile Application Backends
    Attacking via the DMZ - Web, Email etc.
    Post Exploitation on Windows, Linux and Mobile OSs
    Data Exfiltration - tools and techniques
    Privilege Escalation on Windows and Linux
    Keeping Access - Backdoors and Rootkits
    Web Application vulnerability to Shell
    Scenario based Pentesting
    Social Engineering Attacks - JAVA Applets, HID devices etc.
    AV Evasion Techniques
    Firewall and IDS Evasion
  • … additions will happen based on student feedback
1 Course Introduction
2 Pentesting Routers: Setting up the Lab
3 Pentesting Routers: Default Credentials for SSH, SNMP etc.
4 Pentesting Routers: Attacking SSH with Metasploit, Ncrack, Hydra and Medusa
5 Pentesting Routers: Attacking SNMP with Nmap, Metasploit and Medusa
6 Pentesting Routers: Attacking the Web Admin Interface
7 Pentesting Routers: SNMP Post Exploitation
8 Pentesting Routers: SNMP audit with Metasploit, Snmpcheck and Onesixtyone
9 Pentesting Routers: SNMP audit Braa and Nmap NSE Scripts
10 Pentesting Windows Environments: Study Plan
11 Pentesting Windows Endpoints: Software Based Vulnerabilities
12 Pentesting Windows Endpoints: Software Misconfigurations
13 Pentesting Windows Endpoints: Social Engineering
14 Pentesting Windows Endpoints: Firewall Bypass using Reverse Shells
15 Pentesting Windows Endpoints: HTTP/HTTPS Tunneling Payload
16 Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
17 Pentesting Windows Endpoints: Port Forwarding
18 Pentesting Windows Endpoints: Pivoting
19 Pentesting Windows Endpoints: Reverse Connects through Pivots
20 Pentesting Windows Endpoints: AV Bypass using Python
21 Pentesting Windows Endpoints: Win7 Privilege Escalation and UAC Bypass
22 Pentesting Windows Endpoints: Win7 Hash Dumping and Mimikatz
23 Pentesting Windows Endpoints: Remote Network Monitoring
24 Pentesting Windows Endpoints: Windows Sessions, Stations and Desktops
26 Pentesting Windows Endpoints: Log Management with Wevtutil
27 Pentesting Windows Endpoints: Post Exploitation with WMIC
28 Pentesting Windows Endpoints: Custom Connect Shell Backdoor
29 Pentesting Windows Endpoints: Custom Bind Shell Backdoor
30 Pentesting Windows Endpoints: Hidden Bind Shell Payload
31 Pentesting Windows Endpoints: Bitsadmin
32 Pentesting Windows Endpoints: Password Recovery from Browsers
33 Pentesting Windows Endpoints: Dictionary Attacks on Browser Master Password
34 Pentesting Windows Endpoints: Tampering the PAC
35 Pentesting Windows Endpoints: Blocking Websites using a Malicious PAC
36 Pentesting Windows Endpoints: Social Engineering using a Malicious PAC
37 Pentesting Windows Endpoints: DNS Poisoning with the Hosts File
38 AV Evasion with the Veil Framework
39 Setting up an AV Testing Lab
40 AV Evasion No Silver Bullet Part 1
41 AV Evasion No Silver Bullet Part 2
42 AV Evasion No Silver Bullet Part 3
43 AV Evasion using the Metasploit Loader
44 AV Evasion using the Metasploit Loader 64-bit
45 Run Meterpreter as a 34/64-bit DLL
46 Running Metasploit Loader as a DLL
47 DLL Hijacking Basics
48 Loading Meterpreter via DLL Hijacking using DllMain #FAIL
49 DLL Hijacking using Reversing with IDA Free
50 DLL Hijacking uTorrent
51 Exploiting uTorrent via a Network Share using Metasploit
52 Exploiting VLC via DLL Hijacking
53 DLL Hijacking DTools
54 Meterpreter via DllMain in DLL Hijacking
55 Privilege Escalation via DLL Hijacking
56 Using Shellcodeexec for AV Evasion
57 Detecting Meterpreter
58 AV Evasion with Powershell
59 DLL Injection using AppInit_DLLs Part 1
60 DLL Injection using AppInit_DLLs Part 2
61 DLL Injection using AppInit_DLLs Part 3
62 Firefox Addon Attack
63 DLL Hijacking using .local Redirection
64 Stripping Manifest Files for DLL Hijacking
65 DLL Function Forwarding Basics: Understanding Imports
66 DLL Function Forwarding Basics: Dumping DLL Exports
67 DLL Function Forwarding Basics: Creating a Hijack DLL Part 1
68 DLL Function Forwarding Basics: Creating a Hijack DLL Part 2
69 DLL Function Forwarding Basics: Getting Meterpreter
70 DLL Function Forwarding Basics: Getting Meterpreter 64-bit
71 DLL Function Forwarding Basics: Meterpreter (32-bit) in a Thread
72 DLL Function Forwarding Basics: Meterpreter (64-bit) in a Thread
73 Perpetual Meterpreter
74 Run with Escalation - Manifest File and ShellExecuteEx
75 Anti-Forensics: Windows Prefetch Directory
76 Anti-Forensics: Disabling Windows Prefetch
77 0wning Windows Prefetch with Meterpreter
78 Remote Memory Dumping and Analysis
79 Dumping Passwords from Browser Memory
80 Dumping Logon Credentials from Memory Dumps
81 Full Memory Analysis with MDD and HxD
82 Remote Memory Dump Analysis with Volatility
83 Dumping Process Memory with Volatility
Файлы примеров: отсутствуют
Формат видео: MP4
Видео : AVC, 1280x720 (16:9), 30.000 fps, ~186 Kbps avg, 0.007 bit/pixel
Аудио: 44.1 KHz, AAC LC, 2 ch, ~126 Kbps
Note: Раздача переработана, причесана.
Пожалуйста, перекачайте торрент.

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:53
Размер: 6 ГБ
Размер: 6 443 653 899 байт
Сидеров: 59
Личеров: 30
Скачали: 2
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 5 месяцев 21 день 9 часов 43 минуты 42 секунды назад
Последний личер: 2 месяца 12 дней 15 часов 21 минуту 45 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 492.82 КБ / Просмотров 5 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность