Ethical Hacking
Showing 73–84 of 108 results
Penetration Testing with the Metasploit Framework
For professional penetration testers who want to take their skills to the next level using the Metasploit framework. This is a hands-on course that will show you in a different angle the penetration testing workflow and how to apply it in practice.
People Information Gathering with the Social Engineering Toolkit (SET)
Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.
Persistence with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to obtain persistence using Empire.
Post Exploitation with Kali Linux
Kali Linux is a flavor of Linux that comes pre-loaded with many security tools for all levels of the attack kill chain. This course will teach you about post exploitation techniques using Kali Linux.
Post Exploitation with Meterpreter
In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks.
Privilege Escalation with Certify
Certify is a C# tool written by Will Schroeder and Lee Christiansen that can be used to find and compromise vulnerable configurations of Active Directory Certificate Services, allowing you to establish persistence and elevate your domain privileges.
Privilege Escalation with PEASS-NG
Adversaries frequently use unprivileged access to enter and browse a network, but they need privileged access to complete their tasks. In this course, you will learn privilege escalation using the PEASS-NG suite.
Privilege Escalation with SweetPotato
Escalating local privileges is an essential step on a red team engagement, it allows you to fully own a target machine. In this course, you'll learn privilege escalation using SweetPotato.
Reconnaissance with EyeWitness
Reconnaissance is the first and most important phase of any red team engagement. In this course, we will explore actively scanning websites and hosts using EyeWitness to gather information about targets and their organizations.
Red Team Operations: Target and Capability Development
Hey Humans! Come join us for an exciting adventure and Red Team Operation! In this course, we will be discussing the scenario and how to set up infrastructure and planning for your operation.
Scan Web Applications with Bash
Enumerating web applications is the first step of a web application penetration testing. This course will teach you how to enumerate and find vulnerabilities in web applications using Bash.
Scanning for Vulnerabilities with Nmap 7 Scripting Engine (NSE)
This course will teach you how to use the built-in and custom scripts of Nmap Scripting Engine (NSE) to detect vulnerabilities.