17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] [Packt] Hands-on Web Penetration Testing With Metasploit 4.x - [FCO]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Test and secure your system services. Implement efficient techniques with Metasploit
Video Details
ISBN 9781789537468
Course Length 3 hours 41 minutes
Table of Contents
• BUILD YOUR OWN ETHICAL HACKING LAB
• STEPS FOR ETHICAL HACKING
• SCANNING WITH NMAP
• SCANNING WITH NESSUS
• EXPLOITS WITH METASPLOIT
• WORKING WITH BACKDOORS
• POST EXPLOIT: METERPRETER
• GATHER, PRESENT, AND MONITOR YOUR REPORT
Video Description
Prepare yourself for common attacks, simulate real-world possibilities, and learn from test scenarios and case studies.
You'll carry out exploitations, build/port exploits of various kinds in Metasploit, find weaknesses in target systems, and hunt for vulnerabilities using Metasploit and its supporting tools. You'll master the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. Towards the end of the course, you will implement time-saving techniques using Metasploit.
By the end of the course, you will know how to fully protect your system using Metasploit, and will have gained the skills to carry out penetration testing in complex and highly-secured environments.
Style and Approach
This course is packed with step-by-step instructions that are useful for those getting started with Metasploit. This easy-to-follow guide for Metasploit explains, simply and clearly, how to use this essential IT power tool.
What You Will Learn
• Work comfortably with Metasploitable in Kali Linux with a VirtualBox
• Think like a hacker
• Scan for vulnerabilities with Nmap and Nessus frameworks
• Search for exploits and payloads for defined vulnerabilities with Metasploit
• Create our own vulnerabilities with Trojans/Backdoors with the Veil framework
• Use Meterpreter to escalate privileges and make your sessions sustainable
Authors
Atil Samancioglu
Atil Samancioglu is a best-selling online instructor and has instructed more than 80,000 students on Ethical Hacking. Atil has trained more than 20.000 students on the following Ethical Hacking subjects: Kali Linux, Metasploit, metasploitable, social engineering, Nmap, Man-in-the-Middle attacks, MITM proxy, Beef, Wireshark, Maltego, SQL Injection, XSS, social media safety, VPN server creation, Meterpreter, Ettercap, WPA Enterprise. He currently works as eBusiness Team Leader in a multinational company.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01.Build Your Own Ethical Hacking Lab/0101.The Course Overview.mp4
8.5 MB
01.Build Your Own Ethical Hacking Lab/0102.Exploring VirtualBox.mp4
29.5 MB
01.Build Your Own Ethical Hacking Lab/0103.Installation of Kali Linux Part – 1.mp4
34.9 MB
01.Build Your Own Ethical Hacking Lab/0104.Installation of Kali Linux Part – 2.mp4
28.5 MB
01.Build Your Own Ethical Hacking Lab/0105.Installation of Windows.mp4
31.8 MB
01.Build Your Own Ethical Hacking Lab/0106.Installation of Metasploitable.mp4
35.7 MB
02.Steps for Ethical Hacking/0201.Methodology of Hackers.mp4
19.9 MB
02.Steps for Ethical Hacking/0202.Understanding Bit Hacker Jargon!.mp4
9.8 MB
02.Steps for Ethical Hacking/0203.Reconnaissance and Passive Information Gathering.mp4
23.9 MB
03.Scanning with Nmap/0301.Usage of Metasploitable.mp4
18 MB
03.Scanning with Nmap/0302.Usage of Zenmap.mp4
35.2 MB
03.Scanning with Nmap/0303.Exploring Open Ports.mp4
25.7 MB
03.Scanning with Nmap/0304.Using Metasploit.mp4
18.5 MB
04.Scanning with Nessus/0401.Downloading Nessus.mp4
18.9 MB
04.Scanning with Nessus/0402.Installation of Nessus.mp4
27.7 MB
04.Scanning with Nessus/0403.Scan Results of Nessus.mp4
20.5 MB
04.Scanning with Nessus/0404.Aggressive Scan Results.mp4
29.5 MB
05.Exploits with Metasploit/0501.Metasploit Framework Files.mp4
27.6 MB
05.Exploits with Metasploit/0502.Metasploit Framework Overview.mp4
20.5 MB
05.Exploits with Metasploit/0503.Searching for Exploits.mp4
19 MB
05.Exploits with Metasploit/0504.Payloads and Exploits.mp4
17.4 MB
05.Exploits with Metasploit/0505.Gaining Access.mp4
11.2 MB
06.Working with Backdoors/0601.Understanding TrojanBackdoors.mp4
4.8 MB
06.Working with Backdoors/0602.Veil Installation.mp4
26.6 MB
06.Working with Backdoors/0603.Veil Overview.mp4
17.1 MB
06.Working with Backdoors/0604.Backdoor Creation.mp4
28.5 MB
06.Working with Backdoors/0605.Delivery of the Backdoor.mp4
25.7 MB
06.Working with Backdoors/0606.Using Backdoor with Metasploit.mp4