Companies Home Search Profile

Practical Guide to Windows Pentesting with Kali Linux

Focused View

9:00:28

12 View
  • 1. The Course Overview.mp4
    02:53
  • 2. Pre-Installed Kali Linux.mp4
    10:50
  • 3. Installing Kali Linux from Scratch.mp4
    07:19
  • 4. Updating, Downloading and Installing Apps.mp4
    10:24
  • 5. Running Services on Kali.mp4
    04:00
  • 6. Understanding Different Types of Tools.mp4
    02:51
  • 7. Footprinting the Network.mp4
    08:46
  • 8. Manipulating Google.mp4
    07:43
  • 9. Scanning with NMAP and Zenmap.mp4
    07:29
  • 10. Using Maltego.mp4
    10:26
  • 11. Installing OpenVAS.mp4
    04:13
  • 12. Scanning with OpenVAS.mp4
    05:13
  • 13. Installing Nessus.mp4
    08:46
  • 14. Scanning with Nessus.mp4
    05:08
  • 15. Exploiting with Metasploit.mp4
    04:38
  • 16. Metasploit and MSFvenom.mp4
    10:34
  • 17. Using Armitage.mp4
    07:32
  • 18. Other Ways to Exploit.mp4
    07:41
  • 19. What Is Yuki and How Do We Install It.mp4
    08:09
  • 20. Scanning with Yuki.mp4
    04:44
  • 21. Installing, Configuring, and Scanning with Sniper.mp4
    06:07
  • 22. Using Individual Tools.mp4
    06:33
  • 23. Understanding Cross-Site Scripting.mp4
    03:48
  • 24. Implementing an XSS Attack.mp4
    07:51
  • 25. SQL Injection Theory.mp4
    01:58
  • 26. Implementing a SQL Attack.mp4
    12:31
  • 27. Cracking Passwords with John the Ripper.mp4
    07:05
  • 28. Cracking Passwords with Hydra.mp4
    05:21
  • 29. Checking AD Password Strengths of Users.mp4
    10:27
  • 30. Using Software to Bypass Local Passwords.mp4
    04:40
  • 31. Monitoring Resources.mp4
    05:21
  • 32. Gathering Your Findings.mp4
    05:35
  • 33. Report Presentation.mp4
    09:33
  • Pentesting-with-kali-linux.zip
  • 1. The Course Overview.mp4
    02:15
  • 2. Disclaimer.mp4
    01:30
  • 3. Test Lab Architecture.mp4
    02:08
  • 4. Setting Up Kali.mp4
    04:12
  • 5. Setting Up Target Win 10.mp4
    24:57
  • 6. Setting Up Target Win 2016.mp4
    07:07
  • 7. Creating the Domain.mp4
    16:42
  • 8. Scanning.mp4
    21:03
  • 9. Service Identification.mp4
    20:02
  • 10. Using Public Exploits.mp4
    20:06
  • 11. Exploiting with Metasploit.mp4
    09:54
  • 12. Social Engineering.mp4
    14:15
  • 13. Evading Anti-Virus.mp4
    30:19
  • 14. Final Word on Exploitation.mp4
    01:48
  • 15. About Post-Exploitation.mp4
    01:38
  • 16. Meterpreter.mp4
    12:07
  • 17. Privilege Escalation.mp4
    16:34
  • 18. Collecting Credentials.mp4
    13:12
  • 19. Password Brute-Force.mp4
    11:52
  • 20. Achieving Persistence.mp4
    41:00
  • 21. Pivoting.mp4
    13:51
  • 22. Pass-the-Hash Attack.mp4
    25:58
  • 23. Review And Next Steps.mp4
    01:49
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 56
    • duration 9:00:28
    • English subtitles has
    • Release Date 2024/03/15

    Courses related to Penetration Testing

    Courses related to Kali Linux