Companies Home Search Profile

Practical Linux for Pentesting & Bug Bounties

Focused View

Shifa Cyclewala,Rohit Gautam,Hacktify Cyber Security

4:40:55

0 View
  • 1 - Introduction.mp4
    03:01
  • 2 - Tour to Penetration Testing OS.mp4
    02:27
  • 3 - Installation of Virtual Box.mp4
    04:54
  • 4 - Installation of VMware.mp4
    03:48
  • 5 - Installation of Linux ISO on VMWare.mp4
    06:03
  • 5 - Link to Download VMware Workstation.txt
  • 6 - Installation of Linux ISO on VirtualBox.mp4
    04:16
  • 7 - Installation of Linux OVA on VMWare.mp4
    03:33
  • 8 - Installation of Linux OVA on VirtualBox.mp4
    02:28
  • 9 - Windows boot process.mp4
    02:46
  • 10 - Linux boot Process.mp4
    09:39
  • 11 - Breaking root password.mp4
    05:49
  • 12 - Setting password for GRUB.mp4
    08:07
  • 13 - What are Package Managers.mp4
    04:54
  • 14 - yum.mp4
    07:09
  • 15 - brew.mp4
    04:26
  • 16 - dpkg.mp4
    04:27
  • 17 - rpm.mp4
    04:46
  • 18 - chocolaty.mp4
    03:38
  • 19 - apt.mp4
    02:53
  • 20 - Searching for Package.mp4
    02:12
  • 21 - Installing and Removing Package.mp4
    02:33
  • 22 - Updating Package.mp4
    02:21
  • 23 - Upgrading Package.mp4
    01:16
  • 24 - Adding Repositories.mp4
    08:14
  • 25 - GUI Package Manager Synaptic.mp4
    03:58
  • 26 - Installing with git.mp4
    02:52
  • 27 - Linux System Information Commands.mp4
    05:35
  • 28 - Linux Hardware Information Commands.mp4
    05:55
  • 29 - Performance Monitoring Commands.mp4
    03:27
  • 30 - Performance Monitoring Commands 2.mp4
    03:43
  • 31 - Userinfo and Management Commands.mp4
    05:49
  • 32 - File Directory and Deletion Commands.mp4
    11:23
  • 33 - Directory Management Commands.mp4
    04:05
  • 34 - RenameMove and Case Sensitive Commands.mp4
    04:18
  • 35 - Symbolic Links Commands.mp4
    02:02
  • 36 - File Reading Commands.mp4
    05:13
  • 37 - Process and Kill Commands.mp4
    03:21
  • 38 - Process and Kill Commands 2.mp4
    02:22
  • 39 - Background and Foreground Commands.mp4
    02:25
  • 40 - Linux Permissions Fundamentals.mp4
    09:03
  • 41 - Adding Permissions.mp4
    05:34
  • 42 - Removing Permissions.mp4
    02:46
  • 43 - Execution Permissions.mp4
    04:24
  • 44 - Linux Octal Permissions.mp4
    02:52
  • 45 - chown.mp4
    05:51
  • 46 - chgroup.mp4
    02:28
  • 47 - Linux Network Management 1.mp4
    03:26
  • 48 - Linux Network Management 2.mp4
    02:06
  • 49 - Linux Network Management 3.mp4
    05:08
  • 50 - Linux Network Management 4.mp4
    03:37
  • 51 - Linux Network Management 5.mp4
    02:38
  • 52 - Linux Network Management 6.mp4
    05:00
  • 53 - iwconfig.mp4
    05:41
  • 54 - Spoofing your MAC Address.mp4
    04:07
  • 55 - Linux Archive Management Commands.mp4
    04:55
  • 56 - Linux Search and Pattern Commands.mp4
    05:24
  • 57 - Linux SSH Management 1.mp4
    06:39
  • 58 - Linux SSH Management Live 2.mp4
    02:56
  • 59 - Linux SAMBA Management 1.mp4
    08:17
  • 60 - Linux SAMBA Management 2.mp4
    04:53
  • 61 - Linux File System Architecture.mp4
    01:39
  • 62 - root 1.mp4
    01:44
  • 63 - root 2.mp4
    02:11
  • 64 - etc.mp4
    02:36
  • 65 - home.mp4
    02:52
  • 66 - Practical-Linux-for-PenTesting.pdf
  • 66 - Snapshot of Linux Booting Proccess.html
  • 67 - Practical-Linux-for-PenTesting.docx.pdf
  • 67 - Quick and Faster way of Assigning permissions.html
  • 68 - Linux System Command.html
  • 69 - Linux System Information.html
  • 70 - Understanding Top Performance Monitoring Commands.html
  • 71 - Introduction to Linux Performance Commands.html
  • 72 - Understanding Userinfo Commands.html
  • 73 - Efficient Text Manipulation Mastering Advanced Techniques in Linux.html
  • Description


    Practical course to Linux Fundamentals for pentesting & bug bounties

    What You'll Learn?


    • Linux Fundamentals
    • Linux vs Windows
    • Penetration Testing OS
    • Virtual Box
    • VMware
    • Boot Process
    • Password Management
    • Package Manager
    • Linux System Information
    • Linux Hardware Information
    • Performance Monitoring
    • Userinfo and Management
    • File, Directory and Deletion
    • Directory Management
    • Rename, Move and Case Sensitive
    • Symbolic Links
    • File Reading
    • Process and Kill
    • Linux Permissions and Umask
    • Linux Network Management
    • Linux DHCP Server
    • Linux File System
    • Linux SAMBA Management
    • DNS Server Configuration
    • Hacker Challenge
    • Bash for Pentesting
    • Subdomain Enumeration Passive
    • Subdomain Enumeration Active
    • Identifying Live Subdomains using Bash
    • Subdomain Enumeration using wayback
    • JS Recon using Bash

    Who is this for?


  • Anybody interested in learning Linux, Web application hacking / Penetration testing.
  • Any Beginner who wants to start using Linux for Penetration Testing
  • Any Beginner who wants to start with Bash Scripting for Automation of Bug Bounties
  • Trainer who are willing to start teaching Linux for Pentesting
  • Any Professional who working in Cyber Security and Pentesting
  • Ethical Hackers who wants to learn Linux Fundamentals
  • Beginners in Cyber Security Industry for Analyst Position
  • SOC person who is working into a corporate environment
  • Developers who wants to fix vulnerabilities and build secure applications
  • What You Need to Know?


  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory & Internet Connection
  • Operating System: Windows / OS X / Linux
  • More details


    Description

    Welcome to Linux for Pentesting & Bug Bounties Course. This course covers fundamentals of Linux and Bash scripting to write your own tools which can be useful for penetration testing and bug bounties. There is no prerequisite of prior linux knowledge and you will be able to install linux, understand fundamentals, write bash scripts for web attacks and mass automation.

    This course helps any beginner to intermediate to understand linux fundamentals to make you comfortable with using linux and writing bash scripts tools.

    This course will start from basic fundamentals of linux like - commands, directory structure, network management, archive management, linux file permissions, performance monitoring, userinfo management, input/output redirection, linux ip tables,  virtual hosting and much more.

    In addition to fundamentals of linux, you will also learn how to write your own tools in bash for Subdomain Enumeration - Active & Passive, Directory Fuzzers, CORS Automation, XSS Automation, Open Redirect Automation, Wayback using Bash etc.

    This course is highly practical which helps you learn on exact environment when you start your penetrating testing or bug hunting journey.


    This course also includes important interview questions and answers related to linux which will be helpful in any job interviews.


    Here's a more detailed breakdown of the course content:

    In all the sections we will start the fundamentals of Linux and Writing Bash Scripts to make our own useful tools.


    In Introduction to Linux, we will cover What is Linux, Difference between Windows and Linux, Different Flavours of Linux and Tour to Penetration Testing OS like Kali Linux and Parrot OS.

    We will see all the types of XSS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

    We will also cover Lab Setup for Installation of Linux in Virtual Box and VMware, We will also cover how to setup readymade virtual machine ova files as well which will save your time of installation.


    Boot Process - Windows & Linux Boot Process,

    Password Management - Breaking root password, Setting password for GRUB

    Package Managers - yum, apt, brew, dpkg, rpm, chocolaty, searching for package, installing packages, removing packages, adding repositories, GUI Package managers, how to use git.

    Linux Fundamentals - Linux System Information Commands, Linux Hardware Information Commands, Performance Monitoring Commands, User info and Management Commands, File, Directory and Deletion Commands, Directory Management Commands, Rename,Move and Case Sensitive Commands, Symbolic Links Commands, File Reading Commands, Process and Kill Commands, Background and Foreground Commands, Linux Permissions Fundamentals, Linux Network Management, Linux DHCP Server, What is DNS?, Linux Archive Management Commands, Linux Search and Pattern Commands, Linux SSH Management, Linux SAMBA Management, Linux File System Architecture, Linux IP tables, Web Servers, Virtual Hosts, Bash Scripting Basics, User Inputs, Bash Loops, Customising shell, Using Linux for recon,

    Shell Scripting - We will create scripts/tools for Subdomain Brute force, CORS Automation, URLS to Domain, Waybackurls using Bash, HTTPX/ HTTProbe Tool using Bash, Open Redirect/SSRF and much more.


    You will also get additional BONUS sessions, in which I m going to share my personal bash scripts for hunting bugs. I have also added Interview Questions and answers for linux which will be helpful for those are preparing for Job Interviews and Internships.


    With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.

    Notes:

    • This course is created for educational purposes only.

    • Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

    Who this course is for:

    • Anybody interested in learning Linux, Web application hacking / Penetration testing.
    • Any Beginner who wants to start using Linux for Penetration Testing
    • Any Beginner who wants to start with Bash Scripting for Automation of Bug Bounties
    • Trainer who are willing to start teaching Linux for Pentesting
    • Any Professional who working in Cyber Security and Pentesting
    • Ethical Hackers who wants to learn Linux Fundamentals
    • Beginners in Cyber Security Industry for Analyst Position
    • SOC person who is working into a corporate environment
    • Developers who wants to fix vulnerabilities and build secure applications

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Shifa Cyclewala
    Shifa Cyclewala
    Instructor's Courses
    I am Shifa Cyclewala the Founder of Hacktify Cyber SecurityI am into Cyber Security Training for many years. Students have loved our courses and given 5 ★ Ratings and made Bestseller across MumbaiMy students have been in the Top 15 Cyber Security Researchers of India twice in a Row.Apart from training's, I'm a Security researcher and a Mobile Application Developer.I have worked for all the topmost international schools of India as a technical Instructor.I have worked with Software development Companies into their development team ZingHR was the last Organization i worked with.I am Working towards development of Women in Cybersecurity and  • Presented Cyber security awareness sessions in many colleges across Mumbai • Speaker at VULNCON 2020 • Trained more than 30000+ individuals in Cyber Security • Conducted more than 50 workshops pan India • Invited as Keynote speaker at Rohidas Management Studies, A.E Khalsekar College, DY Patil College, Shah and Anchor Engineering College, KJ Somaiya etc.. • Invited as a Key Speaker at Women in Cyber Security (WCS) and Infosec Girls.
    Rohit Gautam
    Rohit Gautam
    Instructor's Courses
    I am Rohit Gautam the CEO & Founder of Hacktify Cyber SecurityI am into Cyber Security Training for many years. Students have loved my courses and given 5 ★ Ratings and made Bestseller on UdemyMy students have been in the Top 15 Cyber Security Researchers of India twice in a Row.Apart from training's, I'm a security researcher with special interest in network exploitation and web application security analysis and Red TeamingI have worked for all the topmost banks of India in their VAPT Team.I have worked with ICICI, Kotak, IDFC bank I have also experience working with NSDL and some financial organizations like EdelweissI have worked on many private projects with NTRO & Govt of India.I was acknowledged with Swag, Hall of Fame, Letter Of Appreciation, and Monetary rewards by Google, Facebook, Conclusion, Seek, Trip Advisor, Riddlr, Hakon, Acorns, Faasos, and many more companies for finding out vulnerabilities in their organization and responsibly reporting it.
    Hacktify Cyber Security
    Hacktify Cyber Security
    Instructor's Courses
    Hacktify Cyber Security provides quality trainings in field of Ethical Hacking, Bug Bounties, App Sec, Network Security, Mobile Security, Cloud Security and Cyber Forensics. Innovative and realtime experience courses tailored for the Industry for hands-on and practical exposureWe believe and have a vision to educate and make professionals ready for the future.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 65
    • duration 4:40:55
    • English subtitles has
    • Release Date 2024/09/18