Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Practical Exploitation with Mubix

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a comprehensive 10-hour video series on practical exploitation and cybersecurity techniques. Learn about penetration testing, red team auditing, and various tools and methods used in ethical hacking. Explore topics such as BloodHoundAD, ProxyChains, DNSChef, Evil WinRM, and Impacket. Gain insights into Metasploit Framework, including setup, modules, commands, and advanced techniques like pivoting and persistence. Discover how to create custom modules, use external tools, and leverage Meterpreter for post-exploitation. Cover a wide range of subjects from initial access and enumeration to password manipulation and firewall bypassing. Perfect for cybersecurity enthusiasts and professionals looking to enhance their offensive security skills.

Syllabus

Pentest / Red Team Audit Logging.
BloodHoundAD, ProxyChains & DNSChef - Practical Exploitation with Mubix [Cyber Security Education].
Nab Hashes without Admin via Internal Monologue - Practical Exploitation [Cyber Security Education].
Pentesting with Evil WinRM - Practical Exploitation [Cyber Security Education].
Changing Users Passwords - Metasploit Minute [Cyber Security Education].
LDAP Domain Dump - Metasploit Minute [Cyber Security Education].
Devious Fun With Impacket - Metasploit Minute [Cyber Security Education].
RSS Plugin Module - Metasploit Minute [Cyber Security Education].
Web Delivery Update - Metasploit Minute [Cyber Security Education].
Eternal Blue Attack - Metasploit Minute [Cyber Security Education].
How to setup Metasploitable 3 - Metasploit Minute [Cyber Security Education].
Meterpreter Python Extension - Metasploit Minute [Cyber Security Education].
Show Mount - Metasploit Minute [Cyber Security Education].
Get Proxy - Metasploit Minute [Cyber Security Education].
SLEEP! - Metasploit Minute [Cyber Security Education].
Meterpreter Certificate Validation - Metasploit Minute [Cyber Security Education].
Meterpreter Transports - Metasploit Minute [Cyber Security Education].
Meterpreter Timeouts - Metasploit Minute [Cyber Security Education].
The Meterpreter Wishlist - Metasploit Minute [Cyber Security Education].
Hiding Shells: Prepend Migrate - Metasploit Minute [Cyber Security Education].
5 Ways To Get Initial Access - Metasploit Minute [Cyber Security Education].
Moar Persistence - Metasploit Minute [Cyber Security Education].
In Depth Core Commands - Metasploit Minute [Cyber Security Education].
Making Your First POST Module, PART 2 [Cyber Security Education].
Making your first POST Module, PART 1 [Cyber Security Education].
Forking, Branching, and Pulling - Metasploit Minute [Cyber Security Education].
Making Your First AUX Module, Part 2 - Metasploit Minute [Cyber Security Education].
Making Your First AUX Module, Part 1 - Metasploit Minute [Cyber Security Education].
MSF Venom - Metasploit Minute [Cyber Security Education].
IRB Interactive Ruby Shell - Metasploit Minute [Cyber Security Education].
Alternative Payloads - Metasploit Minute [Cyber Security Education].
Using External Tools With Metasploit - Metasploit Minute [Cyber Security Education].
Using Metasploit Capture Modules - Metasploit Minute [Cyber Security Education].
Meterpreter Extensions - Metasploit Minute [Cyber Security Education].
Meterpreter Standard API - Metasploit Minute [Cyber Security Education].
WiFi Pineapple Hopping - Metasploit Minute [Cyber Security Education].
Meterpreter Core Commands - Metasploit Minute [Cyber Security Education].
Hopping Through Restricted FireWalls - Metasploit Minute [Cyber Security Education].
Meterpreter Relays With PHP Hop - Metasploit Minute [Cyber Security Education].
Windows Post Modules - Metasploit Minute [Cyber Security Education].
Armitage and Cobalt Strike - Metasploit Minute [Cyber Security Education].
Pivoting In Metasploit - Metasploit Minute [Cyber Security Education].
Linux Persistance - Metasploit Minute [Cyber Security Education].
Exploitation Using Java RMI Service - Metasploit Minute [Cyber Security Education].
Discovering And Enumerating Targets - Metasploit Minute [Cyber Security Education].
Metasploit Modules - Metasploit Minute [Cyber Security Education].
Resource Files - Metasploit Minute [Cyber Security Education].
Basic MSF Console Commands - Metasploit Minute [Cyber Security Education].
Top 5 Standalone Tools in Metasploit - Metasploit Minute [Cyber Security Education].
Metasploit Framework Github Setup on Mac OSX - Metasploit Minute [Cyber Security Education].
The Metasploit Directory Structure - Metasploit Minute [Cyber Security Education].
Metasploit Framework Github Setup on Kali Linux - Metasploit Minute [Cyber Security Education].
Kali Linux Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
Debian Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
Windows 8 Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
What is Metasploit - Metasploit Minute [Cyber Security Education].

Taught by

Hak5

Reviews

Start your review of Practical Exploitation with Mubix

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.