Never stop talking " STOP the Gaza Genocide "

Network PenTesting | HackerSploit

HackerSploit

HackerSploit

HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.

Course Details

Course Lessons

  1. 1 | Penetration Testing Bootcamp - Introduction 00:04:19
  2. 2 | Penetration Testing Bootcamp - Infosec Terminology 00:10:55
  3. 3 | Penetration Testing Bootcamp - The CIA Triad 00:07:13
  4. 4 | Penetration Testing Bootcamp - Penetration Testing Terminology 00:14:52
  5. 5 | Penetration Testing Bootcamp - Penetration Testing Methodologies 00:09:35
  6. 6 | Penetration Testing Bootcamp - Setting Up A Pentesting Lab 00:07:38
  7. 7 | How To Setup Your Terminal For Penetration Testing 00:40:14
  8. 8 | How To Create Your Own Pentesting Distribution 00:47:18
  9. 9 | Anonymize Your Traffic With Proxychains & Tor 00:09:43
  10. 10 | Penetration Testing Bootcamp - Information Gathering 00:05:33
  11. 11 | Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools 00:04:24
  12. 12 | Passive Reconnaissance - Whois Lookup Tutorial 00:06:19
  13. 13 | Passive Reconnaissance - Email Harvesting With theHarvester 00:08:50
  14. 14 | Passive Reconnaissance - OSINT With Maltego 00:08:34
  15. 15 | Passive Recon With OSRFramework 00:17:50
  16. 16 | Passive Recon - Subdomain Enumeration With Sublist3r 00:05:38
  17. 17 | Google Dorks For Penetration Testing 00:27:10
  18. 18 | DNS Enumeration And Zone Transfers 00:13:55
  19. 19 | DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap 00:10:51
  20. 20 | Network Scanning - TCP Flags & TCP 3-Way Handshake 00:09:44
  21. 21 | TCP-3 Way Handshake Explained 00:06:03
  22. 22 | Managing DNS With resolvconf 00:09:19
  23. 23 | Nmap - Host Discovery With Ping Sweep 00:10:07
  24. 24 | Nmap - OS And Service Version Scanning 00:10:02
  25. 25 | Nmap - TCP Connect & Stealth (SYN) Scanning 00:10:57
  26. 26 | Nmap - UDP Scanning 00:07:19
  27. 27 | Nmap - Output And Verbosity 00:13:39
  28. 28 | Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL) 00:13:23
  29. 29 | Nmap - Firewall Detection (ACK Probing) 00:07:14
  30. 30 | Nmap - Firewall Evasion (Decoys, MTU & Fragmentation) 00:13:55
  31. 31 | Nmap - Scan Timing And Performance 00:29:45
  32. 32 | Introduction To Pentesting - Enumeration 00:39:22
  33. 33 | Introduction To The Nmap Scripting Engine (NSE) 00:06:45
  34. 34 | Nmap - NSE Syntax 00:10:55
  35. 35 | Nmap - Banner Grabbing 00:05:30
  36. 36 | Nmap - FTP Enumeration 00:11:56
  37. 37 | Nmap - DNS Enumeration 00:13:35
  38. 38 | Nmap - SMTP Enumeration 00:07:47
  39. 39 | Nmap - HTTP Enumeration - Detecting HTTP Methods 00:07:08
  40. 40 | Nmap - HTTP Enumeration - Finding Hidden Files And Directories 00:08:04
  41. 41 | Nmap - HTTP Enumeration - WAF Detection And Fingerprinting 00:10:08
  42. 42 | Nmap - SMB Enumeration 00:12:43
  43. 43 | Nmap - MySQL Enumeration 00:12:44
  44. 44 | Vulnerability Scanning With Nmap 00:06:41
  45. 45 | NetBIOS And SMB Enumeration - Nbtstat & smbclient 00:13:02
  46. 46 | DNS Enumeration Tutorial - Dig, Nslookup & Host 00:20:52
  47. 47 | Introduction To Vulnerability Scanning 00:15:46
  48. 48 | How To Install & Configure Nessus 00:14:03
  49. 49 | Host Discovery & Vulnerability Scanning With Nessus 00:41:57
  50. 50 | Greenbone Community Edition - Virtual Appliance Setup & Configuration 00:15:16
  51. 51 | TryHackMe Blue - Walkthrough 00:25:23
  52. 52 | TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation 00:52:17
  53. 53 | EternalBlue - MS17-010 - Manual Exploitation 00:17:35
  54. 54 | TryHackMe Ice - Manual Exploitation Walkthrough 00:32:09
  55. 55 | HackTheBox Walkthrough - Legacy 00:06:56
  56. 56 | HackTheBox Walkthrough - Devel 00:13:01
  57. 57 | HackTheBox - Arctic - Walkthrough 00:38:26
  58. 58 | HackTheBox Walkthrough - Optimum 00:20:14
  59. 59 | Windows Enumeration With winPEAS 00:27:37
  60. 60 | HackTheBox Blue Walkthrough - Learn Windows Enumeration 00:25:00
  61. 61 | TryHackMe Ice - Walkthrough Windows Privilege Escalation 00:32:48
  62. 62 | Windows Privilege Escalation Tutorial For Beginners 00:43:56
  63. 63 | Windows Privilege Escalation - Unquoted Service Paths 00:14:55
  64. 64 | Windows Privilege Escalation - Weak Registry Permissions 00:12:06
  65. 65 | Windows Privilege Escalation - Exploiting Insecure Service Permissions 00:18:05
  66. 66 | Windows Privilege Escalation - Insecure Service Executables 00:13:25
  67. 67 | Windows Privilege Escalation - Exploiting AutoRun Programs 00:23:07
  68. 68 | Windows Privilege Escalation - Exploiting AlwaysInstallElevated 00:12:50
  69. 69 | Windows Privilege Escalation - Searching For Passwords In Windows Registry 00:14:07
  70. 70 | Windows Privilege Escalation - Using Stored Credentials 00:13:06
  71. 71 | Windows Privilege Escalation - Exploiting Scheduled Tasks 00:12:37
  72. 72 | Windows Privilege Escalation - Exploiting Insecure GUI Apps 00:05:52
  73. 73 | Windows Privilege Escalation - Startup Apps 00:14:22
  74. 74 | Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer 00:30:14
  75. 75 | HEK.SI 2022 - Bypassing UAC With UACMe 00:35:08
  76. 76 | BOOK RELEASE - Privilege Escalation Techniques 00:08:03
  77. 77 | Post Exploitation - Transferring Files To Windows Targets 00:22:50
  78. 78 | Windows Post Exploitation - Persistence With Metasploit 00:12:23
  79. 79 | Windows Post Exploitation - Dumping & Cracking NTLM Hashes 00:27:56
  80. 80 | Windows Post Exploitation - Dumping Hashes With Mimikatz 00:18:45
  81. 81 | VulnOS V2 - VulnHub Walkthrough - Boot-To-Root 00:27:58
  82. 82 | PwnLab VulnHub Walkthrough - Boot-To-Root 00:41:03
  83. 83 | SickOS 1.2 VulnHub Walkthrough - Boot-To-Root 00:36:58
  84. 84 | Kioptrix 2014 Walkthrough - Boot-To-Root 00:18:58
  85. 85 | Stapler 1 - CTF Walkthrough - Boot-To-Root 00:31:31
  86. 86 | Mr. Robot CTF Walkthrough - Part 1 00:43:52
  87. 87 | Mr. Robot CTF Walkthrough - Part 2 00:19:35
  88. 88 | Kioptrix 1.1 Walkthrough - Boot-To-Root 00:13:09
  89. 89 | Raven1 VulnHub CTF Walkthrough - Boot-To-Root 00:45:00
  90. 90 | Kioptrix Level 1 CTF Walkthrough - Boot-To-Root 00:27:29
  91. 91 | FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root 00:41:53
  92. 92 | Toppo VulnHub CTF Walkthrough - Boot-To-Root 00:13:52
  93. 93 | Troll 1 CTF Walkthrough - Boot-To-Root 00:25:59
  94. 94 | TryHackMe - Basic Pentesting Walkthrough 00:30:19
  95. 95 | TryHackMe - Vulnversity Walkthrough 00:23:49
  96. 96 | TryHackMe - Kenobi Walkthrough 00:35:37
  97. 97 | HackTheBox Mirai - Raspberry Pi Pentesting 00:17:48
  98. 98 | HackTheBox - Lame - Walkthrough 00:14:05
  99. 99 | HackTheBox - Curling - Walkthrough 00:39:08
  100. 100 | HackTheBox Walkthrough - Popcorn 00:25:48
  101. 101 | HackTheBox Walkthrough - Tenten 00:40:52
  102. 102 | HackTheBox Walkthrough - Cronos 00:31:46
  103. 103 | HackTheBox Blocky Walkthrough - Linux Privilege Escalation 00:36:19
  104. 104 | HackTheBox Knife - Linux Privilege Escalation With GTFOBins 00:19:41
  105. 105 | How To Write A Penetration Testing Report 00:37:06
  106. 106 | Pentesting Diaries 0x1 - SQL Injection 101 01:20:01
    Student Reviews

    ( 5 Of 5 )

    2 reviews
    5 Stars
    100%
    4 Stars
    0%
    3 Stars
    0%
    2 Stars
    0%
    1 Star
    0%
    ا
    احمد

    28-08-2024
    Y
    Youtube

    02-07-2024