Torrent details for "[Packt] Hands-on Web Penetration Testing with Metasploit 4.x - [FCO] TGx Exclusive"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
740.51 MB
Info Hash:
5f02b6802eb3470088607bfd5c9e9375945992bb
Added By:
Added:  
04-01-2019 16:26
Views:
1,283
Health:
Seeds:
0
Leechers:
0
Completed:
11
wide




Description
wide
Image error


By: Atil Samancioglu
Released: Sunday, December 30, 2018 New Release!
Torrent Contains: 41 Files, 8 Folders
Course Source: https://www.packtpub.com/networking-and-servers/hands-web-penetration-testing-metasploit-4x-video

Test and secure your system services. Implement efficient techniques with Metasploit

Video Details


ISBN 9781789537468
Course Length 3 hours 41 minutes

Table of Contents

• BUILD YOUR OWN ETHICAL HACKING LAB
• STEPS FOR ETHICAL HACKING
• SCANNING WITH NMAP
• SCANNING WITH NESSUS
• EXPLOITS WITH METASPLOIT
• WORKING WITH BACKDOORS
• POST EXPLOIT: METERPRETER
• GATHER, PRESENT, AND MONITOR YOUR REPORT

Video Description

Prepare yourself for common attacks, simulate real-world possibilities, and learn from test scenarios and case studies.

You'll carry out exploitations, build/port exploits of various kinds in Metasploit, find weaknesses in target systems, and hunt for vulnerabilities using Metasploit and its supporting tools. You'll master the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. Towards the end of the course, you will implement time-saving techniques using Metasploit.

By the end of the course, you will know how to fully protect your system using Metasploit, and will have gained the skills to carry out penetration testing in complex and highly-secured environments.

Style and Approach

This course is packed with step-by-step instructions that are useful for those getting started with Metasploit. This easy-to-follow guide for Metasploit explains, simply and clearly, how to use this essential IT power tool.

What You Will Learn

• Work comfortably with Metasploitable in Kali Linux with a VirtualBox
• Think like a hacker
• Scan for vulnerabilities with Nmap and Nessus frameworks
• Search for exploits and payloads for defined vulnerabilities with Metasploit
• Create our own vulnerabilities with Trojans/Backdoors with the Veil framework
• Use Meterpreter to escalate privileges and make your sessions sustainable

Authors

Atil Samancioglu

Atil Samancioglu is a best-selling online instructor and has instructed more than 80,000 students on Ethical Hacking. Atil has trained more than 20.000 students on the following Ethical Hacking subjects: Kali Linux, Metasploit, metasploitable, social engineering, Nmap, Man-in-the-Middle attacks, MITM proxy, Beef, Wireshark, Maltego, SQL Injection, XSS, social media safety, VPN server creation, Meterpreter, Ettercap, WPA Enterprise. He currently works as eBusiness Team Leader in a multinational company.

For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/


Image error

Image error

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes