Penetration Testing Bootcamp Introduction

Author:

HackerSploit

Keywords:

hackersploit,pentest,hacking,penetration testing tools,penetration testing with kali linux,penetration testing live,penetration testing tutorial,penetration testing course,penetration testing linux,penetration testing career,penetration testing certification,penetration testing for beginners hindi,penetration testing for beginners kali linux,penetration testing tutorial hindi,penetration testing tutorial for beginners,kali linux,hacker exploit

Subtitles:
hello everyone welcome to the penetration testing bootcamp this is part of the open source cybersecurity training initiative or the project and let's get started with taking a look at what we'll be covering during the class which will span you know into various sections so first of all I will be covering essential terminology that you know you would want to know when getting into pen testing or ethical hacking for that matter secondly we'll be moving into you know giving you an introduction to penetration testing and the various penetration testing methodology is available to you I will then move on to setting up a pen testing lab for both Windows and Linux so that you can you know you understand the fundamentals of doing so and you can easily recreate this whenever you want the way you want will then move on to passive information gathering so we'll be working with OSI NT and publicly available information and then of course naturally we will move on to active information gathering we'll be talking about scanning DNS interrogation etc and then we move on to a numeration we will be trying to enumerate as much information from various services on our target as possible so that we have an idea of what we're dealing with I will then move on to vulnerability scanning so we'll take a look at how to use tools like NIT likenesses open open vas and nikto to perform various levels of one bility scanning either on web applications or on actual hosts and they'll help us build a profile of the targets and what one ability is there that they actually affect them we'll also talk about CBS and the CBS s or the common phone ability scoring system in section 8 will now talk about the network penetration testing so we'll be specifically talking about sniffing man-in-the-middle attacks why shock using TCP dump also ARP spoofing and generally just network based attacks that involved you know performing like THD DHCP poisoning stuff like that after that we'll take a look at actual exploitation so we'll be taking a look at Windows and the next exploitation we'll also take a look at all to use Metasploit and how to create custom s exploits how to actually read other exploits and all to compile them will then take a look at a very brief let antivirus evasion with various tools in Kali Linux and then finally we take a look at post exploitation at the various tools you can use so PowerShell mini cats etc and then with those dumped password hashes we can then take a look at password cracking with tools like John the Ripper hash cat etc etc and then finally we will end this a pentesting course with an introduction to web application penetration testing so we'll be explaining the fundamentals of how the web works I will talk about the Oh a stop ten and I'll demonstrate the various four abilities how they can be how can they all can they be exploited and so on and so forth so that's the entire syllabus by the way the slides for this course will be available to download and will be actually documented on our website exploit org and we can finally take a look at the crookedy course prerequisites all right so the first prerequisite is that you need to have a basic understanding of how to use Linux as we're going to be using a Linux based based penetration testing distribution so if you aren't familiar with Linux or you need to learn the fundamentals really quickly and then check out our Linux essentials for hackers YouTube playlist the link to that will be in the description section and it should be annotated in a cart above here so you can get started with that immediately and finally you need a good understanding of the OSI model and the tcp/ip stack we are currently working on the Network+ course open source of course that will actually take you through this quite well and will actually teach you the essentials of what you need to know that being said this is going to be the end of this video in the next video we'll actually get started with section 1 we will be talking about the essential terminology and then we'll move on from there so thank you very much for joining us and we are very excited to get started with this course you [Music]

Loading