Companies Home Search Profile

How to Hack The Box To Your OSCP (The Extra Boxes)

Focused View

Vonnie Hudson

4:14:43

164 View
  • 1.1 VMWare Workstation Pro Trial.html
  • 1. VMWare Workstation.mp4
    05:14
  • 2.1 Kali Linux VM.html
  • 2. Kali Linux.mp4
    08:03
  • 3.1 Windows 11 Pro.html
  • 3. Windows 11 Pro.mp4
    13:18
  • 4.1 Commando VM.html
  • 4. CommandoVM.mp4
    15:56
  • 5.1 htb_toyour_oscp_bonus_boxes_command_kali.zip
  • 5. Connecting CommandVM to HackTheBox via Kali Linux.mp4
    15:50
  • 6.1 PimpMyKali.html
  • 6. PimpMyKali + VSCode.mp4
    06:10
  • 7.1 Oh My TMUX!.html
  • 7. Oh My TMUX!.mp4
    07:50
  • 8.1 Installing Docker in Kali.html
  • 8.2 RustScan.html
  • 8. Docker + Rustscan.mp4
    07:38
  • 9.1 FeroxBuster.html
  • 9.2 ProjectDiscovery (Nuclei, Naabu, HTTPx and SubFinder).html
  • 9. FeroxBuster + Project Discovery (nuceli, naabu, httpx and subfinder).mp4
    11:00
  • 10.1 Burp Suite Community Edition.html
  • 10.2 Wappalyzer Technology Profiler Chrome Extension.html
  • 10. Burp Community + Burp Browser + Wappalyzer.mp4
    04:44
  • 1.1 htb_toyour_oscp_bonus_boxes_recon.zip
  • 1. Recon.mp4
    21:58
  • 2.1 htb_toyour_oscp_bonus_boxes_resource_development.zip
  • 2. Resource Development.mp4
    29:51
  • 3.1 htb_toyour_oscp_bonus_boxes_credential_access.zip
  • 3. Credential Access.mp4
    14:21
  • 4. Initial Access.mp4
    10:15
  • 5.1 htb_toyour_oscp_bonus_boxes_priv_esc_1.zip
  • 5. Privilege Escalation (Sort Of!).mp4
    18:31
  • 6.1 htb_toyour_oscp_bonus_boxes_discovery.zip
  • 6. Discovery.mp4
    04:20
  • 7.1 htb_toyour_oscp_bonus_boxes_static_analysis.zip
  • 7. Static Code Analysis.mp4
    11:40
  • 8.1 htb_toyour_oscp_bonus_boxes_insecure_deserialization.zip
  • 8.2 ysoserial.net.html
  • 8. Privilege Escalation (Insecure Deserialization).mp4
    15:20
  • 9.1 htb_toyour_oscp_bonus_boxes_priv_esc_juicy.zip
  • 9.2 JuicyPotatoNG.html
  • 9. Privilege Escalation (Token Impersonation).mp4
    07:14
  • 10.1 htb_toyour_oscp_bonus_boxes_priv_esc_impact.zip
  • 10. Impact + Persistence.mp4
    07:03
  • 11.1 htb_toyour_oscp_bonus_boxes_de_initial_access.zip
  • 11. Detection Engineering Initial Access Analysis.mp4
    03:48
  • 12. Detection Engineering Weak Passwords.mp4
    00:57
  • 13. Detection Engineering Kerberoasting.mp4
    04:00
  • 14. Detection Engineering Silver Tickets.mp4
    02:26
  • 15.1 SigmaHQ Rules.html
  • 15. EXTRA Detection Engineering JuicyPotatoNG.mp4
    07:16
  • Description


    Go Beyond Root: Pop The Box and Build Real Detections

    What You'll Learn?


    • How to execute 20 MITRE ATT&CK Tools, Techniques and Procedures!
    • How to use over 30 modern attack tools!
    • How to setup the PERFECT modern hacking rig
    • How to finally FEEL like a confident cybersecurity professional

    Who is this for?


  • New SOC Analysts
  • New Penetration Testers
  • New Red Teamers
  • New Blue Team Defenders
  • Help Desk Analysts (wanting to get into cyber)
  • Network Admins, Sys Admins and Network Engineers (wanting to get into cyber)
  • Cybersecurity Managers (who want to know how the bad guy compromise environments)
  • More details


    Description

    Are you ready to feel the fun of KNOWING how to hack?

    In this course you will learn how to build a modern hacking lab.

    You'll learn how to master the latest tools and attacker tradecraft for compromise victim environments.

    You'll finally feel the pleasure and freedom of knowing what you're talking about.

    I had a BLAST creating this course for you guys and I'm so excited to share all the awesome with you.

    In this course you will learn:


    • ping (for recon)

    • nmap

    • rustscan

    • whatweb + Wappalyzer

    • Burp Browser (why you should say NO to FoxyProxy!)

    • feroxbuster

    • kerbrute

    • ldp

    • ldapsearch

    • crackmapexec

    • smbclient

    • How to install Impact from scratch (because you know... it always breaks)

    • getTGT

    • GetUserSPNs

    • What the heck a SPN is anyway! You'll learn that - finally

    • hashcat

    • Silver Tickets

    • ticketer

    • How to manually convert passwords into NTLM hashes

    • SQL Commands

    • How to build a reverse shell in Powershell

    • rlwrap

    • netcat

    • iconv

    • xxd

    • base64

    • PEAS-ng (winPEAS)

    • Powershell Remoting

    • evil-winrm

    • Reverse Engineering .NET Binaries

    • Wireshark

    • Insecure Deserialization

    • ysoserial

    • JuicyPotatoNG

    • Persistence Mechanisms

    • Beyond Root: Threat Hunting the Attack

    • Beyond Root: Mitigations

    Seriously! This is the best course I've ever made on hacking.  It's the combination of all my experience jam packed into one tiddy little course.

    You'll also get:


    • Hacking links and resources

    • Complete commands to copy and paste directly into your terminal!

    So what are you waiting for?

    Why are you still reading?

    Enroll now and change your life.

    Let's go!

    Who this course is for:

    • New SOC Analysts
    • New Penetration Testers
    • New Red Teamers
    • New Blue Team Defenders
    • Help Desk Analysts (wanting to get into cyber)
    • Network Admins, Sys Admins and Network Engineers (wanting to get into cyber)
    • Cybersecurity Managers (who want to know how the bad guy compromise environments)

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Vonnie Hudson
    Vonnie Hudson
    Instructor's Courses
    I'll never forget the day I first got hacked. I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system. I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room. Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun. But one day I met my match. I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer. For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish. I was freaking out! It's really hard to describe just how scary this was. I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567" This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love. That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened. Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world. Since then I've never looked back. So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York. I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list. My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux. I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH. I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride! I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside! Thanks again -Vonnie
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 25
    • duration 4:14:43
    • Release Date 2022/12/06