Companies Home Search Profile

PENETRATION TESTING PROFESSIONAL

Focused View

26:14:19

135 View
  • Appendix.zip
    • 1 - Module - Web Application Security
    • 1.0-same origin.mp4
      10:03
    • 1.1http cookies and session.mp4
      10:12
    • 1.2-burp suite.mp4
      15:11
    • 1.3-owasp zap.mp4
      10:56
    • crawling and spidering.mp4
      07:55
    • cross site request forgery.mp4
      06:41
    • cross site scripting.mp4
      13:25
    • dirbuster.mp4
      06:13
    • dom xss.mp4
      10:32
    • exploiting blind sql injection.mp4
      13:00
    • exploiting error-based sql injection.mp4
      11:33
    • exploiting in-band sql injections.mp4
      08:12
    • files and resources vulnerabilities.mp4
      11:40
    • finding sql injection.mp4
      12:30
    • session hijacking and fixation.mp4
      12:19
    • sqlmap basics.mp4
      17:45
    • sql injection basics.mp4
      08:51
    • subdomain enumeration.mp4
      06:46
    • web app fingerprinting.mp4
      06:44
    • web app information gathering.mp4
      07:54
    • xss beef.mp4
      12:32
      2 - Module - System Security
    • 1 Architecture Fundamentals.zip
    • 2 Assembler Debuggers Tools.zip
    • 3 Buffer Overflow.zip
    • 4 Shellcoding.zip
    • debugging buffer overflows goodpassword.mp4
      11:35
    • exploiting buffer overflows 32bit ftp.mp4
      10:29
    • immunity debugger.mp4
      08:32
    • stack frames.mp4
      10:47
      3 - Module - network Security
    • Advanced Port Scanning.mp4
      19:05
    • Authentication bruteforcing.mp4
      21:46
    • Client side exploitation.mp4
      06:22
    • Exploting Via Pivoting.mp4
      06:52
    • Foca shodan.mp4
      11:38
    • Host discovery with Fping Hping Nmap.mp4
      14:31
    • Hping basic.mp4
      11:54
    • Idle Scan hping nmap.mp4
      12:28
    • Information gathering dns.mp4
      14:38
    • LM NTLM Cracking.mp4
      04:41
    • MaintainingAccess.mp4
      09:40
    • Maltego.mp4
      12:30
    • Man in the Middle.mp4
      10:20
    • Mapping the Network.mp4
      14:02
    • Metasploit basic usage.mp4
      12:48
    • Metasploit usage 2.mp4
      11:25
    • Nessus.mp4
      10:48
    • NetBIOS and Null Session.mp4
      15:44
    • Nmap NSE.mp4
      08:25
    • Nmap basics.mp4
      09:49
    • Pillaging.mp4
      11:44
    • Privilege escalation.mp4
      14:23
    • Remote exploitation.mp4
      03:35
    • SNMP Enumeration.mp4
      06:35
    • Traffing Sniffing with TCPdump.mp4
      07:52
    • Whois lookup.mp4
      05:01
    • Wireshark Introduction.mp4
      11:19
      4 - Module - Ruby and Metasploit
    • exploitation with ruby.mp4
      16:53
    • form extraction.mp4
      13:27
    • metasploit write custom modules.mp4
      16:24
    • meterpreter api.mp4
      38:30
    • meterpreter scripting.mp4
      35:58
    • nokogiri.mp4
      16:10
    • packetfu.mp4
      11:38
    • packetfu sniffing.mp4
      21:26
    • post flooding.mp4
      13:37
      5 - Module - Wifi Security
    • discover wi-fi network.mp4
      13:49
    • protocol and wireshark filters.mp4
      09:25
    • rogue access point.mp4
      12:48
    • wep cracking.mp4
      27:40
    • wpa capture attacks.mp4
      13:56
  • Syllabus PTPV3.pdf
    • 01.System Security
        Module 1 Introduction
      • C ++ Tutorial.mp4
        06:44
      • Introduction.pdf
      • NasmX.mp4
        15:55
        Module 2 Cryptography and Password cracking
      • Cryptography and Password Cracking.pdf
      • SSH Tunneling.mp4
        13:49
        Module 3 Buffer overflow
      • Buffer Overflow.pdf
      • FTP32Bit.mp4
        12:12
      • Sample1.mp4
        13:48
        Module 4 Shellcoding
      • Shellcoding.mp4
        12:41
      • Shellcoding.pdf
        Module 5 Malware
      • Malware.pdf
        Module 6 Rootkit coding
      • Rootkit Coding.pdf
      02.Network Security
        Module 1 Information Gathering
      • Foca and Shodan.mp4
        10:50
      • Fping and Nmap Scan.mp4
        08:45
      • Information Gathering.pdf
      • Information Gathering DNS.mp4
        13:24
      • Maltego.mp4
        10:49
        Module 2 Scanning and target detection
      • Hping.mp4
        09:15
      • Idle Scan with Hping.mp4
        04:23
      • Nmap.mp4
        28:09
      • Scanning.pdf
        Module 3 Enumeration and Footprinting
      • Enumeration.pdf
      • NetBios.mp4
        17:11
        Module 4 Sniffing and MITM Attacks
      • Sniffing and MITM Attacks.pdf
      • Traffic Sniffing.mp4
        30:14
        Module 5 VA And Exploitation
      • Client Side Exploitation Java Rhino.mp4
        09:40
      • Exploitation.pdf
      • Java Rhino Exploitation With SET.mp4
        12:30
      • Metasploit Installation and use.mp4
        10:43
      • NTLM v1 Weakness.mp4
        06:46
      • Ncrack And Medusa.mp4
        08:58
      • Nessus Prescan.mp4
        10:45
      • Nessus Scan and Report.mp4
        13:36
      • Remote Exploitation.mp4
        03:07
        Module 6 Post Exploitation
      • Data Harvesting.mp4
        11:43
      • Maintaining Access.mp4
        19:45
      • Network and Pivoting.mp4
        17:26
      • Post Exploitation.pdf
      • Privilege Escalation.mp4
        12:38
        Module 7 Anonymity
      • Anonymity.pdf
        Module 8 Social Engineering
      • SET.mp4
        30:49
      • Social Engineering.pdf
      03.Web Application Security
        Module 1 Introduction
      • Introduction.pdf
        Module 2 Information gathering
      • Dirbuster.mp4
        07:25
      • Information Gathering.pdf
      • Subdomain Enumeration.mp4
        07:06
      • Web App Information Gathering.mp4
        07:57
      • Web app Enumeration.mp4
        15:07
      • Web app Fingerprinting.mp4
        04:10
        Module 3 Vulnerability assessment
      • Vulnerability Assessment.pdf
        Module 4 XSS
      • Cross Site Scripting.pdf
      • XSS.mp4
        13:24
      • XSS Beef.mp4
        16:57
        Module 5 SQL Injection attacks
      • SQLi Error Based.mp4
        22:41
      • SQLi Error Based Tools.mp4
        17:23
      • SQL Injection.pdf
        Module 6 Advanced Web Attacks
      • Advanced Web Attacks.pdf
      04.Ruby and Metasploit
        1.Installation and Fundamentals
      • Installation and Fundamentals.pdf
        2.Control Structures
      • Control Structures.pdf
        3.Methods Variables and Scope
      • Methods Variables and Scope.pdf
        4.Classess Modules and Exception
      • Classess Modules and Exception.pdf
        5.Pentesters Prerequisites
      • Pentesters Prerequisites.pdf
        6.Input Output
      • Input Output.pdf
        7.Network and OS Interaction
      • Network and OS Interaction.pdf
      • PacketFu Sniffing.mp4
        21:26
      • Packetfu.mp4
        11:38
        8.The Web
      • Form Extraction.mp4
        13:27
      • Nokogiri.mp4
        16:10
      • Post Flooding.mp4
        13:37
      • The Web.pdf
        9.Exploitation with Ruby
      • 9.Exploitation with Ruby.pdf
      • Exploitation with Ruby.mp4
        16:53
        10.Metasploit
      • Metasploit.pdf
      • Metasploit writing custom modules.mp4
        16:24
      • Meterpreter API.mp4
        38:30
      • Meterpreter scripting.mp4
        35:58
        Resources
      • ruby scripts module1-4.rar
      • ruby scripts module5.rar
      • ruby scripts module6.rar
      • ruby scripts module7.rar
      • ruby scripts module8.rar
      • ruby scripts module9.rar
      • ruby scripts module10.rar
      05.Wi-Fi Security
        1.Prerequisites
      • 1.Prerequisites.pdf
        2.Environment Setup
      • 2.Environment Setup.pdf
        3.Wireless Standards and Networks
      • Wireless Standards and Networks.pdf
        4.Discover Wi-Fi Networks
      • Discover Wireless.mp4
        13:49
      • Discover Wi-Fi Networks.pdf
        5.Traffic Analysis
      • 5.Traffic Analysis.pdf
      • Protocol and Wireshark Filters.mp4
        09:25
        6.Attacking Wi-Fi Networks
      • Attacking Wi-Fi Networks.pdf
      • WEP Cracking.mp4
        27:40
      • WPA Capture Attacks.mp4
        13:56
        7.Wi-Fi as Attack Vector
      • 7.Wi-Fi as Attack Vector.pdf
      • Rogue Access Point.mp4
        12:48
      Documentation
    • 2.pdf
    • 3.pdf
    • 4.pdf
    • 5.pdf
    • Blind Penetration test (Lab #6).pdf
    • CainAndAbel (Lab #8).pdf
    • Client-side Exploitation (Lab #11).pdf
    • DNS and SMB Relay Attack (Lab #12).pdf
    • Information Gathering (Lab #2).pdf
    • Nessus (Lab #7).pdf
    • NetBIOS Hacking (Lab #9).pdf
    • Nmap5 cheatsheet eng v1.pdf
    • Ochoa 2008-Pass-The-Hash.pdf
    • OpenPentestBookmarks.pdf
    • Poisoning and Sniffing (Lab #10).pdf
    • Post Exploitation (Lab #5).pdf
    • SNMP Analysis (Lab #13).pdf
    • Scanning (Lab #3).pdf
    • System Security (Lab #1).pdf
    • VA And Exploitation (Lab #4).pdf
    • aslr.pdf
    • eCPPT-Pre-Exam-Manual.pdf
    • elsfoo 1.pdf
    • hera manual.pdf
    • hping3 cheatsheet v1.0-ENG.pdf
    • reporting guide.pdf

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    eLearnSecurity is an information technology security company that develops and provides certifications with a practical focus. eLearnSecurity deliver course material electronically through the distance learning model.
    • language english
    • Training sessions 117
    • duration 26:14:19
    • Release Date 2023/06/16