Pentester Academy - Network Pentesting [2015, ENG] :: Ивановский Торрент трекер
Важное объявление!
У Нас Все раздачи мультитрекерные, при нуле пиров в релизах, можете смело вставать на закачку!
Статистика раздачи
Размер:     |    Зарегистрирован:     |    Скачан:     |   
Нет
 
     
 
 
Автор Сообщение

HUNTER

Стаж:
4 года 11 месяцев
Сообщений:
66098

Репутация: 101

[+] [-]
Вне форума [Профиль] [ЛС]

Network Pentesting- -Год выпуска: 2015
Производитель: Pentester Academy
Сайт производителя: www.pentesteracademy.com/course?id=6
Продолжительность: 01:13:12
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: A non-exhaustive list of topics to be covered include:
  • Information Gathering - OSINT, DNS, SNMP etc.
  • Pentesting Network Components - Router, Switch, Firewall, IDS/IPS
  • Pentesting Windows Environments - domain controllers, pass-the-hash, active directory etc.
  • Pentesting Linux Environments
  • Pentesting Mobile Application Backends
  • Attacking via the DMZ - Web, Email etc.
  • Post Exploitation on Windows, Linux and Mobile OSs
  • Data Exfiltration - tools and techniques
  • Privilege Escalation on Windows and Linux
  • Keeping Access - Backdoors and Rootkits
  • Web Application vulnerability to Shell
  • Scenario based Pentesting
  • Social Engineering Attacks - JAVA Applets, HID devices etc.
  • AV Evasion Techniques
  • Firewall and IDS Evasion
  • … additions will happen based on student feedback

Содержание

1 Course Introduction
Course Introduction
2 Pentesting Routers: Setting up the Lab
Pentesting Routers: Setting up the Lab
3 Pentesting Routers: Default Credentials for SSH, SNMP etc.
Pentesting Routers: Default Credentials for SSH, SNMP etc.
4 Pentesting Routers: Attacking SSH with Metasploit, Ncrack, Hydra and Medusa
Pentesting Routers: Attacking SSH with Metasploit, Ncrack, Hydra and Medusa
5 Pentesting Routers: Attacking SNMP with Nmap, Metasploit and Medusa
Pentesting Routers: Attacking SNMP with Nmap, Metasploit and Medusa
6 Pentesting Routers: Attacking the Web Admin Interface
Pentesting Routers: Attacking the Web Admin Interface
7 Pentesting Routers: SNMP Post Exploitation
Pentesting Routers: SNMP Post Exploitation
8 Pentesting Routers: SNMP audit with Metasploit, Snmpcheck and Onesixtyone
Pentesting Routers: SNMP audit with Metasploit, Snmpcheck and Onesixtyone
9 Pentesting Routers: SNMP audit Braa and Nmap NSE Scripts
Pentesting Routers: SNMP audit Braa and Nmap NSE Scripts
10 Pentesting Windows Environments: Study Plan
Pentesting Windows Environments: Study Plan
11 Pentesting Windows Endpoints: Software Based Vulnerabilities
Pentesting Windows Endpoints: Software Based Vulnerabilities
12 Pentesting Windows Endpoints: Software Misconfigurations
Pentesting Windows Endpoints: Software Misconfigurations
13 Pentesting Windows Endpoints: Social Engineering
Pentesting Windows Endpoints: Social Engineering
14 Pentesting Windows Endpoints: Firewall Bypass using Reverse Shells
Pentesting Windows Endpoints: Firewall Bypass using Reverse Shells
15 Pentesting Windows Endpoints: HTTP/HTTPS Tunneling Payload
Pentesting Windows Endpoints: HTTP/HTTPS Tunneling Payload
16 Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
17 Pentesting Windows Endpoints: Port Forwarding
Pentesting Windows Endpoints: Port Forwarding
18 Pentesting Windows Endpoints: Pivoting
Pentesting Windows Endpoints: Pivoting
19 Pentesting Windows Endpoints: Reverse Connects through Pivots
Pentesting Windows Endpoints: Reverse Connects through Pivots
20 Pentesting Windows Endpoints: AV Bypass using Python
Pentesting Windows Endpoints: AV Bypass using Python
21 Pentesting Windows Endpoints: Win7 Privilege Escalation and UAC Bypass
Pentesting Windows Endpoints: Win7 Privilege Escalation and UAC Bypass
22 Pentesting Windows Endpoints: Win7 Hash Dumping and Mimikatz
Pentesting Windows Endpoints: Win7 Hash Dumping and Mimikatz
23 Pentesting Windows Endpoints: Remote Network Monitoring
Pentesting Windows Endpoints: Remote Network Monitoring
24 Pentesting Windows Endpoints: Windows Sessions, Stations and Desktops
Pentesting Windows Endpoints: Windows Sessions, Stations and Desktops
25 Pentesting Windows Endpoints: Impersonation
Pentesting Windows Endpoints: Impersonation
26 Pentesting Windows Endpoints: Log Management with Wevtutil
Pentesting Windows Endpoints: Log Management with Wevtutil
27 Pentesting Windows Endpoints: Post Exploitation with WMIC
Pentesting Windows Endpoints: Post Exploitation with WMIC
28 Pentesting Windows Endpoints: Custom Connect Shell Backdoor
Pentesting Windows Endpoints: Custom Connect Shell Backdoor
29 Pentesting Windows Endpoints: Custom Bind Shell Backdoor
Pentesting Windows Endpoints: Custom Bind Shell Backdoor
30 Pentesting Windows Endpoints: Hidden Bind Shell Payload
Pentesting Windows Endpoints: Hidden Bind Shell Payload
31 Pentesting Windows Endpoints: Bitsadmin
Pentesting Windows Endpoints: Bitsadmin
32 Pentesting Windows Endpoints: Password Recovery from Browsers
Pentesting Windows Endpoints: Password Recovery from Browsers
33 Pentesting Windows Endpoints: Dictionary Attacks on Browser Master Password
Pentesting Windows Endpoints: Dictionary Attacks on Browser Master Password
34 Pentesting Windows Endpoints: Tampering the PAC
Pentesting Windows Endpoints: Tampering the PAC
35 Pentesting Windows Endpoints: Blocking Websites using a Malicious PAC
Pentesting Windows Endpoints: Blocking Websites using a Malicious PAC
36 Pentesting Windows Endpoints: Social Engineering using a Malicious PAC
Pentesting Windows Endpoints: Social Engineering using a Malicious PAC
37 Pentesting Windows Endpoints: DNS Poisoning with the Hosts File
Pentesting Windows Endpoints: DNS Poisoning with the Hosts File
38 AV Evasion with the Veil Framework
AV Evasion with the Veil Framework
39 Setting up an AV Testing Lab
Setting up an AV Testing Lab
40 AV Evasion No Silver Bullet Part 1
AV Evasion No Silver Bullet Part 1
41 AV Evasion No Silver Bullet Part 2
AV Evasion No Silver Bullet Part 2
42 AV Evasion No Silver Bullet Part 3
AV Evasion No Silver Bullet Part 3
43 AV Evasion using the Metasploit Loader
AV Evasion using the Metasploit Loader
44 AV Evasion using the Metasploit Loader 64-bit
AV Evasion using the Metasploit Loader 64-bit
45 Run Meterpreter as a 34/64-bit DLL
Run Meterpreter as a 34/64-bit DLL
46 Running Metasploit Loader as a DLL
Running Metasploit Loader as a DLL
47 DLL Hijacking Basics
DLL Hijacking Basics
48 Loading Meterpreter via DLL Hijacking using DllMain #FAIL
Loading Meterpreter via DLL Hijacking using DllMain #FAIL
49 DLL Hijacking using Reversing with IDA Free
DLL Hijacking using Reversing with IDA Free
50 DLL Hijacking uTorrent
DLL Hijacking uTorrent
51 Exploiting uTorrent via a Network Share using Metasploit
Exploiting uTorrent via a Network Share using Metasploit
52 Exploiting VLC via DLL Hijacking
Exploiting VLC via DLL Hijacking
53 DLL Hijacking DTools
DLL Hijacking DTools
54 Meterpreter via DllMain in DLL Hijacking
Meterpreter via DllMain in DLL Hijacking
55 Privilege Escalation via DLL Hijacking
Privilege Escalation via DLL Hijacking
56 Using Shellcodeexec for AV Evasion
Using Shellcodeexec for AV Evasion
57 Detecting Meterpreter
Detecting Meterpreter
58 AV Evasion with Powershell
AV Evasion with Powershell
59 DLL Injection using AppInit_DLLs Part 1
DLL Injection using AppInit_DLLs Part 1
60 DLL Injection using AppInit_DLLs Part 2
DLL Injection using AppInit_DLLs Part 2
61 DLL Injection using AppInit_DLLs Part 3
DLL Injection using AppInit_DLLs Part 3
62 Firefox Addon Attack
Firefox Addon Attack
63 DLL Hijacking using .local Redirection
DLL Hijacking using .local Redirection
64 Stripping Manifest Files for DLL Hijacking
Stripping Manifest Files for DLL Hijacking
65 DLL Function Forwarding Basics: Understanding Imports
DLL Function Forwarding Basics: Understanding Imports
66 DLL Function Forwarding Basics: Dumping DLL Exports
DLL Function Forwarding Basics: Dumping DLL Exports
67 DLL Function Forwarding Basics: Creating a Hijack DLL Part 1
DLL Function Forwarding Basics: Creating a Hijack DLL Part 1
68 DLL Function Forwarding Basics: Creating a Hijack DLL Part 2
DLL Function Forwarding Basics: Creating a Hijack DLL Part 2
69 DLL Function Forwarding Basics: Getting Meterpreter
DLL Function Forwarding Basics: Getting Meterpreter
70 DLL Function Forwarding Basics: Getting Meterpreter 64-bit
DLL Function Forwarding Basics: Getting Meterpreter 64-bit
71 DLL Function Forwarding Basics: Meterpreter (32-bit) in a Thread
DLL Function Forwarding Basics: Meterpreter (32-bit) in a Thread
72 DLL Function Forwarding Basics: Meterpreter (64-bit) in a Thread
DLL Function Forwarding Basics: Meterpreter (64-bit) in a Thread
73 Perpetual Meterpreter
Perpetual Meterpreter
74 Run with Escalation - Manifest File and ShellExecuteEx
Run with Escalation - Manifest File and ShellExecuteEx
75 Anti-Forensics: Windows Prefetch Directory
Anti-Forensics: Windows Prefetch Directory
76 Anti-Forensics: Disabling Windows Prefetch
Anti-Forensics: Disabling Windows Prefetch
77 0wning Windows Prefetch with Meterpreter
0wning Windows Prefetch with Meterpreter
78 Remote Memory Dumping and Analysis
Remote Memory Dumping and Analysis
79 Dumping Passwords from Browser Memory
Dumping Passwords from Browser Memory
80 Dumping Logon Credentials from Memory Dumps
Dumping Logon Credentials from Memory Dumps
81 Full Memory Analysis with MDD and HxD
Full Memory Analysis with MDD and HxD
82 Remote Memory Dump Analysis with Volatility
Remote Memory Dump Analysis with Volatility
83 Dumping Process Memory with Volatility
Dumping Process Memory with Volatility
Файлы примеров: отсутствуют
Формат видео: MP4
Видео : AVC, 1066x720 (3:2), 29.970 fps, x264 core 142 ~2 400 Kbps avg, 0.104 bit/pixel
Аудио: 44.1 KHz, AAC LC, 2 ch, ~160 Kbps

Скриншоты

....

_________________
Показать сообщения:    

Текущее время: Сегодня 05:26

Часовой пояс: GMT



Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах
Вы не можете прикреплять файлы к сообщениям
Вы не можете скачивать файлы