Guide To Pentesting
About this course
Learn remote penetration testing from start to finish. Starting off by introducing you to the course and what to expect. Building our own penetration testing environment so that all stages of a professional penetration test are covered.
Course Structure
Introduction & Setting up a Virtual Hacking Lab
(44 minutes)
- Introduction to the Course (1:57)
- Installing Windows Server 2012 as a Domain Controller (9:07)
- Installing PFSense as a router for our lab (11:11)
- Installing and configuring Windows Web Server (3:23)
- Installing and configuring Ubuntu Application Server (8:17)
- Installing Kali Linux as our penetration testing system (3:58)
- Installing 2x Windows 10 Clients (4:44)
Basic Reconnaissance
- Basics of Nmap (9:58)
- Advanced Use of Nmap (4:33)
- Alternatives to Nmap (6:24)
- arpscan
- massscan
- Unicornscan
- How to Use Nikto (3:48)
- How to Use Nessus (8:04)
- Passive Reconnaissance (7:20)
- Wireshark
- Manual
Testing / Exploitation
Web Application Exploitation
- SQL injection (7:01)
- XSS (5:25)
- Command Injection (6:27)
- File Inclusion (6:46)
- Gaining and Maintaining Persistence (7:36)
Infrastructure Exploitation
- Username Enumeration (6:32)
- Brute Force Attacks (10:19)
- Using Metasploit (13:14)
- Packet Captures & Man in the Middle Attacks (Coming soon!)
- Lateral Movement (Coming soon!)
- Gaining and Maintaining Persistence (Coming soon!)
Combining Everything
- Configuring the entire network (Coming soon!)
- Internal Penetration Test (Coming soon!)
- External Penetration Test (Coming soon!)
Reporting
- Compiling the results – Finalising the Course (Coming soon!)