INE-OSCP
by irdk - August 27, 2020 at 02:40 PM
#1
INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
Hidden Content
You must register or login to view this content.
Reply
#2
thank you, this looks amazing and extremely helpful
Reply
#3
(August 27, 2020 at 02:40 PM)irdk Wrote: INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
[Hidden Content]

Doesn't it come as watermarked with the name/address of whoever bought it to protect pirating... ?
Reply
#4
thanks for the course info
Reply
#5
Thank you so much for this amazing content
Reply
#6
(August 27, 2020 at 02:40 PM)irdk Wrote: INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
[Hidden Content]


Thanks for the share man appreciate it
Reply
#7
Thanks for sharing thank you
Reply
#8
[quote = "irdk" pid = '2786429' dateline = '1598535603']
Курс INE-OSCP по технологиям безопасности

[img] https://i.imgur.com/thq937Pl.png [/ img]

Этот курс обеспечивает основу в продвинутом тестировании на проникновение, которое подготовит студентов к курсу «Тестирование на проникновение с Kali Linux (PWK)», предлагаемому Offensive Security. Курс также подготовит студентов к экзамену на сертификацию Offensive Security Certified Professional (OSCP), который обычно начинается с курса PWK. Студенты должны быть знакомы с командной строкой Linux, общей сетевой терминологией и базовыми сценариями Bash / Python перед тем, как приступить к изучению этого курса.


Введение в курс



  • Введение в Kali Linux


  • Установка Kali Linux


  • Обновление командной строки


  • Kali Linux Services


  • Bash Scripting в Kali Linux


  • Сбор информации


  • Сбор информации


  • Сканирование


  • TCP против UDP


  • Сканирование с помощью Nmap


  • Сканирование с помощью Nessus


  • Сканирование с помощью Metasploit


  • Перечисление


  • Установка Kioptrix: Уровень 1


  • Перечисление SSH


  • Перечисление HTTP


  • Перечисление SMB


  • Перечисление DNS


  • Другое перечисление


  • Netcat


  • Введение в Netcat


  • Переполнение буфера


  • Введение в переполнение буфера


  • Расплывание


  • Нахождение смещения


  • Перезапись EIP


  • Поиск плохих персонажей


  • Поиск подходящего модуля


  • Генерация шеллкода и получение рут-прав


  • Эксплуатации


  • Получение корней с Metasploit


  • Компиляция эксплойта


  • Изменение шелл-кода


  • Атаки на стороне клиента


  • Атаки Java-апплетов


  • Обход антивируса


  • Предварительные атаки на пароли


  • Использование веб-приложений


  • Установка XSS и MySQL ФАЙЛА


  • Межсайтовый скриптинг (XSS)


  • SQL-инъекция (SQLi)


  • Включение локального файла (LFI)


  • Включение удаленного файла (RFI)


  • Передача файлов


  • Введение в передачу файлов


  • Повышение привилегий


  • Введение в повышение привилегий


  • Пост-эксплуатация


  • Пост-эксплуатация в Linux


  • Постэксплуатация Windows


  • Атаки на пароли после эксплойтов


  • Поворот


  • Замковый камень


  • Kioptrix Уровень 1.1 Прохождение


  • BTRSys 2.1 Прохождение


  • Прохождение DroopyCTF


  • Прохождение SickOS 1.2


  • Резюме

  • Заключение курса
супер


СКАЧАТЬ:
[Скрытый контент]
[/ quote]
Reply
#9
Thanks for the share man appreciate it
Reply
#10
Thanks for sharing thank you !
Reply
#11
Thanks for the sharing. I appreciate it
Reply
#12
Thank you for this share
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
OSCP PDF Hiiieiieiie 147 7,066 October 24, 2020 at 07:13 PM
Last Post: Despotic
[OSCP] PWK 2020 v2 nicels 190 8,335 October 12, 2020 at 03:08 PM
Last Post: Jaw
👾OSCP + AWAE LABS👾 Fetisha Kazegura 33 1,303 June 24, 2020 at 02:52 PM
Last Post: Jaw

 Users browsing this thread: 1 Guest(s)