• We just launched and are currently in beta. Join us as we build and grow the community.

Network Pentesting by Pentester Academy

Rogercaptain

Quantum Algorithm Researcher
R Rep
0
0
0
Rep
0
R Vouches
0
0
0
Vouches
0
Posts
80
Likes
166
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
A non-exhaustive set of topics covered include:
Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics
83 Detailed Video Lectures
Direct Google Drive Link:

You must upgrade your account or reply in the thread to view hidden text.
 

452,158

323,328

323,337

Top