Never stop talking " STOP the Gaza Genocide "

اختبار اختراق المواقع | Hassan Saad

تفاصيل الكورس

دروس الكورس

  1. 1 | 0- Penetration Testing Course - Introduction 00:07:41
  2. 2 | 1- Bash Scripting - Extract Sub Domains From Website 00:26:53
  3. 3 | 2- Bash Scripting - Apache Log File Forensic 00:20:45
  4. 4 | 3- Bash Scripting - Find Live Hosts (Ping Sweep) 00:12:54
  5. 5 | 4- Essential Tools - netcat 00:28:44
  6. 6 | 5- Essential Tools - ncat 00:05:37
  7. 7 | 6- Essential Tools - Wireshark Part1 00:12:33
  8. 8 | 7- Essential Tools - Wireshark Part2 00:08:13
  9. 9 | 8- Essential Tools - Tcpdump 00:18:36
  10. 10 | 9- Passive Information Gathering - (The Harvester , ReconNG) 00:22:46
  11. 11 | 10- Active Information Gathering - (Host , DNS Enumeration) 00:18:12
  12. 12 | 11- Port Scanning (Nmap) 00:29:41
  13. 13 | 12- Vulnerability Scanning (Openvas) 00:23:06
  14. 14 | 13- Gaining Access Techniques Using Nmap , Searchsploit and Metasploit Part 1 00:23:39
  15. 15 | 14- Gaining Access Techniques Using Nmap , Searchsploit and Metasploit Part 2 00:23:14
  16. 16 | 15- Gaining Access Techniques Part 3 00:26:25
  17. 17 | 16- Client Side Techniques - Sending Link 00:19:42
  18. 18 | 17- Client Side Techniques - Sending File 00:28:53
  19. 19 | 18- Web Hunting - Cross Site Scripting 00:30:32
  20. 20 | 19- Web Hunting - File Inclusion - (Local , Remote) 00:25:25
  21. 21 | 20- Web Hunting - SQL Injection - (Information Retrieval) 00:30:17
  22. 22 | 21- Web Hunting - SqlMap - (Automate SQL Injection) 00:17:49
  23. 23 | 22- Web Hunting - SQLI Authentication Bypass - Proxies 00:33:33
  24. 24 | 23- Password Techniques - Word List Generation (Crunch) 00:19:36
  25. 25 | 24- Password Techniques - Word List Generation - (Cewl , John The Ripper) 00:24:34
  26. 26 | 25- Password Techniques - (Online Techniques) 00:26:17
  27. 27 | 26- Password Techniques - (Offline Techniques) 00:18:24
  28. 28 | 27- Post Gaining Access - Privilege Escalation - Kernel Level 00:22:13
  29. 29 | 28- Post Gaining Access - Privilege Escalation - Files Misconfiguration 00:19:12
  30. 30 | 29- Post Gaining Access - Maintaining Access - (Shell , Meterpreter , Backdoor) 00:27:26
  31. 31 | 30- Advanced Gaining Access - Buffer Overflow - (Code Review) 00:22:47
  32. 32 | 31- Advanced Gaining Access - Buffer Overflow - (Debugger , Registers) 00:22:35
  33. 33 | 32- Advanced Gaining Access - Buffer Overflow - (Shellcode) 00:19:29
    تقييمات الطلاب

    ( 4.8 من 5 )

    ٤ تقييم
    5 نجوم
    75%
    4 نجوم
    25%
    3 نجوم
    0%
    نجمتين
    0%
    نجمة
    0%
    K
    Khaled Mahamoud

    14-10-2024
    J
    Joseph

    28-07-2024
    Y
    Youtube

    02-07-2024
    N
    Nada Mohamed

    16-07-2024