What you'll learn:
- Ethical Hacking
- Penetration Testing
- Virtual machines
- Hacker hats
- BASH
- BASH Scripting
- Netcat
- Nmap
- Passive Reconnaissance
- Email enumeration
- WHOIS Fingerprinting
- DNS Enumeration
- Active Reconnaissance
- Dirb
- Dirbuster
- Google hacking
- Metadata
- Public password databreaches
- Security Vulnerabilities - Heartbleed
- Security Vulnerabilities - Shellshock
- Security Vulnerabilities - Dirty COW
- Nikto
- Arachni
- Wordpress Scanning
- Nessus
- Metasploit
- Meterpreter
- MSF Venom
- EternalBlue Exploitation
- Web / HTTP / HTML
- SQL Injection
- Cross-Site Scripting
- HTML Injection
- Burpsuite
- Session Hijacking
- Session Fixation
- Local File Include
- Remote File Include
- OS Command Injection
- Cross-Site Request Forgery
- Direct Object Reference
- Buffer Overflow
- Denial of Service attacks
- Linux Password Cracking
- Windows Password Cracking
- Linux Privilege Escalation
- Windows Privilege Escalation
- BurpSuite
Hello!
Don here and I work as a penetration tester / ethical hacking. A LOT of people interested in jumping into my world ask me "Where doI even start?"
So I've built a hands-on practical subject to address this question. Exploitation, Website hacking, SQLi, XSS, Buffer Overflow, Metasploit, Privilege Escalation &More.
Worried about the pre-requisites?Don't be!I've assumed a ground-zero no knowledge approach to this and include introduce the technologies before demonstrating how to break them.
The best part?I'll do the exploitation right in front of you, and then you can do it yourself against Virtual Machines I've built for you.