Offensive hacking unfolded. Become a pro Pentester.

Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Lear...

Full description

Saved in:
Bibliographic Details
Online Access: Streaming Video (via O'Reilly/Safari)
Corporate Author: Packt Publishing
Other title:Become a pro Pentester
Format: Electronic Video
Language:English
Published: [Place of publication not identified] : Packt Publishing, [2022]
Edition:[First edition].
Subjects:

MARC

LEADER 00000cgm a22000007i 4500
001 b12788195
006 m o c
007 vz czazuu
007 cr |||||||||||
008 221004s2022 xx 621 o o vleng d
005 20240829142707.6
019 |a 1362788460 
020 |a 9781804615294  |q (electronic video) 
020 |a 1804615293  |q (electronic video) 
029 1 |a AU@  |b 000072806960 
035 |a (OCoLC)safo1346569209 
035 |a (OCoLC)1346569209  |z (OCoLC)1362788460 
037 |a safo9781804615294 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
049 |a GWRE 
050 4 |a TK5105.59 
245 0 0 |a Offensive hacking unfolded.  |p Become a pro Pentester. 
246 3 0 |a Become a pro Pentester 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (10 hr., 21 min.)) :  |b sound, color. 
306 |a 102100 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
500 |a "Published in September 2022." 
511 0 |a Avinash Yadav, presenter. 
520 |a Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed October 4, 2022). 
650 0 |a Hacking. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
700 1 |a Yadav, Avinash,  |e presenter. 
710 2 |a Packt Publishing. 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/videos/~/9781804615294/?ar  |z Streaming Video (via O'Reilly/Safari) 
915 |a 7 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 185f0ee8-8c14-5d5e-a283-3f7119b2c782  |s 1d95d659-1c8f-544f-b702-bd905b693334 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK5105.59  |h Library of Congress classification  |i web  |n 1