Udemy- Learn The Basics of Ethical Hacking and Penetration Testing

seeders: 2
leechers: 58
Added on August 17, 2014 by novice-proin Other > Tutorials
Torrent verified.



Udemy- Learn The Basics of Ethical Hacking and Penetration Testing (Size: 3.15 GB)
 20. Google Search Techniques for penetration testers.mp463.72 MB
 29. DNS Enumerating for penetration testers.mp463.1 MB
 28.Web Application Firewall Detection, HTTP and DNS load balancer detection.mp454.09 MB
 23.gather information using WhatWeb, HttpRecon and SSL SCAN.mp436.42 MB
 26. finding subdomains, extracting exif data and finding hidden web dirs.mp431.91 MB
 17.harvesting a company emails.mp430.31 MB
 27.ShodanHQ for fun and profit.mp419.97 MB
 30.Mail Server Enumeration for penetration testers.mp419.95 MB
 13.how to locally copying company websites.mp417.95 MB
 14.newsgroups and list-servers.mp417.82 MB
 35. Network scanning techniques.mp4115.6 MB
 36. Vulnerability Identification and Assessment techniques.mp492.26 MB
 37. Practical Evasion and avoidance Techniques.mp454.68 MB
 32. packet Crafting and Manipulating with Scapy.mp437.4 MB
 34. Network Enumeration and Mapping Techniques.mp417.25 MB
 33. port scanning with scapy.mp416.11 MB
 38. Password cracking, MITM, Sniffing SSL and RDP Attacks.mp4140.34 MB
 41. Attacking and Hacking Windows.mp4232.85 MB
 39. Windows Security Overview for Penetration Testers.mp484.32 MB
 42. Attacking and Hacking Linux.mp468.03 MB
 40. Linux Security Overview for Penetration Testers.mp452.19 MB
 43. Windows post exploitation techniques.mp4185.68 MB
 44. Linux post exploitation techniques.mp4159.37 MB
 45. Data mining techniques.mp45.75 MB
 48. Exploiting SQL Injection to Full System Access (MYSQL).mp4237.49 MB
 53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access.mp4155.57 MB
 51. Exploiting Blind SQL Injection to Full System Access (MSSQL).mp4141.15 MB
 52. Exploiting RFI, Local File include, File Uploads and RCE.mp4116.84 MB
 47.Web Application Scanning and Mapping.mp480.34 MB
 49. Exploiting SQL Injection to Full System Access (MSSQL).mp473.7 MB
 46. Web Application Primer.mp466.79 MB
 50. Exploiting Blind SQL Injection to Full System Access (MYSQL).mp453.33 MB
 54. Using Immunity Debugger and Metasploit to develop a windows exploit.mp4458 MB
 55. The end.mp411.35 MB
 4.Types of Hackers.mp414.42 MB
 8.Important Terms 2.mp412.44 MB
 7.Important Terms 1.mp410.48 MB
 6.Computer Crimes.mp410.17 MB
 10.Penetration Testing Types.mp47.44 MB
 2.Hacking vs Ethical Hacking.mp47.35 MB
 1.About the course.mp46.88 MB
 9.Why Penetration Testing.mp45.3 MB
 5.Hacktivism.mp45.23 MB
 3. Who is a Hacker.mp44.29 MB

Description

image


https://www.udemy.com/learn-the-basics-of-ethical-hacking-and-penetration-testing/

image

LEARN The Secrets and The Arts of Penetration Testing

The best course to start your journey in the penetration testing and ethical hacking world

You will learn many NEW and AMAZING Things like:

Gather Information Intelligence

You will learn how to find and gather important information about your target during penetration testing.

Find Web Applications and Systems Security Vulnerabilities

You will learn how to find and exploit web application vulnerabilities like: SQL Injection, XSS and more.

Scan Your Target Stealthy

You will learn how to use Nmap to scan targets protected by IDS and how to bypass them.

Exploit Web applications and System vulnerabilities

You will learn how to take over Windows, Linux targets and how to exploit most of Web Vulnerabilities to gain system access.

Real World Client Side Attacks

You will learn how to hack people using modern web browsers to gain access to their systems.

Tactical Post Exploitation on windows and linux systems

You will not stop after hacking a system but you will learn how to take more advantage of a hacked system and collect more important information

Develop Windows Exploits

You will learn how to Create an exploit for a FTP program from scratch using python, immunity debugger and how to convert it to metasploit exploit module.

Ask and we will answer your questions within 24 hours

Just ask about anything about the course and we will answer you within 24 hours.

17 hours HD hands-on penetration testing videos

You will get 17 Hours of High Definition Practical Penetration Testing videos with 20% theory and 80% Hands On.

Use The most powerful tools

You will learn how to use powerful tools like: Metasploit, SQLMap, Havij, Nmap and much more!

You will have FUN

You will enjoy every single minute of our course during your journey to learn real world penetration testing and ethical hacking techniques.

image

SECTION 1:
Solid Introduction to Ethical Hacking and Penetration Testing


1) About the course
03:22

2) Hacking vs Ethical Hacking
03:25

3) Who is a Hacker ?
02:14
4) Types of Hackers
10:28
5) Hacktivism
02:30
6) Computer Crimes
05:11

7) Important Terms 1
06:19

8) Important Terms 2
06:52

9) Why Penetration Testing ?
02:45

10) Penetration Testing Types
04:39
SECTION 2:
Real World Information Intelligence Techniques

11) Introduction to Information Intelligence Techniques
03:34

12) organizing information during a penetration test
06:01

13) how to locally copying company websites
05:50

14) newsgroups and list-servers
05:11

15) online job listing
03:26

16) the power of social media websites
03:36

17) harvesting a company emails
09:15

18) how to generate a targeted wordlist for password cracking
03:13

1) information intelligence with Maltego
04:06

20) Google Search Techniques for penetration testers
16:50

21) other search engines for penetration testers
04:12

22) Enumerating Internal Network From Outside
05:51

23) gather information using WhatWeb, HttpRecon and SSL SCAN
09:25

24) Whois Lookups, finding other Web Sites Hosted on a Web Server
04:18

25) IP Address Geolocation
04:08

26) finding subdomains, extracting exif data and finding hidden web dirs
10:15

27) ShodanHQ for fun and profit
06:57

28) Web Application Firewall Detection, HTTP and DNS load balancer detection
15:35

29) DNS Enumerating for penetration testers
26:37

30) Mail Server Enumeration for penetration testers
07:36

31) Intel Gathering Methodology for penetration testers
02:22

SECTION 3:
Scanning and vulnerability Assessment


32) packet Crafting and Manipulating with Scapy
13:41

33) port scanning with scapy
06:19

34) Network Enumeration and Mapping Techniques
09:24

35) Network scanning techniques
47:35

36) Vulnerability Identification and Assessment techniques
31:22

37) Practical Evasion and avoidance Techniques
19:37

SECTION 4:
Network Attacking Techniques


38) Password cracking, MITM, Sniffing SSL and RDP Attacks
49:21

SECTION 5:
Windows and Linux Attacking Techniques


39) Windows Security Overview for Penetration Testers
34:54

40) Linux Security Overview for Penetration Testers
20:20

41) Attacking and Hacking Windows
58:32

42) Attacking and Hacking Linux
16:37

SECTION 6:
Windows and Linux Post-Exploitation Techniques


43) Windows post exploitation techniques
01:04:51

44) Linux post exploitation techniques
23:51

45) Data mining techniques
03:03

SECTION 7:
Web Exploitation Techniques


46) Web Application Primer
28:33

47) Web Application Scanning and Mapping
20:34

48) Exploiting SQL Injection to Full System Access (MYSQL)
01:02:02

49) Exploiting SQL Injection to Full System Access (MSSQL)
28:20

50) Exploiting Blind SQL Injection to Full System Access (MYSQL)
13:50

51) Exploiting Blind SQL Injection to Full System Access (MSSQL)
48:58

52) Exploiting RFI, Local File include, File Uploads and RCE
35:06

53) Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access
01:01:13

SECTION 8:
Windows Exploit Development


54) Using Immunity Debugger and Metasploit to develop a windows exploit
02:05:59

SECTION 9:
The end but it is not the end


55) The end

image


image


image

Sharing Widget


Download torrent
3.15 GB
seeders:2
leechers:58
Udemy- Learn The Basics of Ethical Hacking and Penetration Testing

All Comments

seeder 1 leacher 63 ?????????? WTF!!!!!
Hey I need Here is link for that course :
1)https://www.udemy.com/android-app-development-fundamentals-i-second-edition/
2)https://www.udemy.com/android-app-development-fundamentals-ii-second-edition/
I need these course .
Thanks for ur effort ..... :)
sure :) it's coming soon
seed it bro..... good things... downloading it,,,, but need more seed
Sure :)
downloading is stucked after 49.7%.......not downloading AT ALL. need heavy seeding. seed it please... i need these files. please notify me.... novice-pro