SELLING Pentesting courses 47 hours [Video]
by CKZ - October 25, 2020 at 03:39 PM
#1
Lightbulb 
I will sell unique courses on pentesting. The entire course program takes 47 hours. During the training process, you can start practicing! 

In addition to the courses there is material on which you can apply the skills you have learned without consequences from the feds!

Video extension:   1080p50
Format:  mp4
The size of the archive with the course:  59GB

Program/ThemesSpoiler
Topic 1. Introduction to ethical hacking (3 hours)
1.1. Principles of ethical hacking
1.2. Basic terms and definitions in the field of information security
1.3. Standards and Federal laws on information security
1.4. Pentest
1.5. Tasks pentest
1.6. The stages of a pentest


Topic 2. Intelligence and information gathering (7 hours)
2.1. Collecting information from open sources (OSINT) - basic principles and objectives
2.2. OSINT Methodology
2.3. using search engines to search for vulnerabilities (Google hacking)
2.4. Collecting information from social networks and the organization's website
2.5. Getting information about the organization's domain names and network
2.6. Application of social engineering methods
2.7. Automation of information gathering


Theme 3. Scanning networks and enumeration (7 hours)
3.1. Principles and methods of scanning networks
3.2. Scan tools
3.3. Search for hosts connected to the network
3.4. Search for open ports
3.5. To determine the version of the services
3.6. Anonymization of scanning using proxy and VPN
3.7. methods and principles of enumeration
3.8. Getting user names
3.9. Collecting information about running services and network infrastructure
3.10. Working with SSH, RDP, SNMP, SMTP, LDAP, NTP, DNS,
3.11. Tools for enumeration


Theme 4. Attacks aimed at denial of service (5 hours)
4.1. Attack network layer
4.2. How bandwidth overflow attacks work: TCP/UDP/ICMP flood
4.3. Principles of attack with amplification: memcached, DNS, ntp dos
4.4. application-level Attacks on the HTTP Protocol: SlowHTTP, GET/POST flood
4.5. Attacks on vulnerabilities in web server or openssl
4.6. Attacks directly on web applications
4.7. Tools for testing resistance to attacks on denial of service

Topic 5. Vulnerability search and system hacking (16 hours)
5.1. principles of attacks on the system and services running in it
5.2. The sequence of actions during the attack on the system
5.3. Methods of search for vulnerabilities
5.4. Brute force passwords
5.5. The use of vulnerability scanners


Topic 6. bypass IDS / firewalls and honeypots (3 hours)
6.1. Firewalls-principles of operation, methods of circumvention
6.2. how IDS works: packet analysis at different levels of the ISO\OSI model, how signatures work, and existing solutions
6.3. Bypass the IDS, the basic principles and automation
6.4. Web application firewall and its bypass
6.5. Hanipots-principles of operation, analysis of existing solutions, detection methods

Topic 7. Social engineering (6 hours)
7.1. Methods and techniques of social engineering
7.2. The impersonation
7.3. Phishing attacks
7.4. Pretexting
7.5. Malicious email attachments


Theme 8. Elevation of privilege and postexploitation in Linux (5 hours)
8.1. General information about Linux security mechanisms
8.2. elevation of privileges in the presence of physical access to the system: changing credentials on the hard disk, modifying the OS loader to get keys in clear form.
8.3. privilege Escalation using SOFTWARE vulnerabilities: configuring, compiling and running exploits, exploiting logical vulnerabilities and configuration errors.
8.4. Attacks on virtualization: docker, lxc
8.5. post-operation Techniques: bind/reverse-shell, web-shell, substitution of system services, adding PAM modules, implementation of http requests in the processing process, using User Defined Functions in MySQL
8.6. Masking processes, files, and network connections


Topic 9. privilege Escalation and post-exploitation in Windows (5 hours)
9.1. UAC workarounds: DLL / Registry Hijacking
9.2. Exploiting vulnerabilities in non-updated operating systems
9.3. Getting administrator rights in a domain controller
9.4. extracting credentials using Mimikatz
9.5. “Pass the Hash” and “Pass the Ticket "
Techniques 9.6. post-operation Techniques


Course price: 700$
Contacts for purchase: Telegram -> @ckzboom / Jabber -> [email protected]
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Multi-Accounting in attempt to scam
Reply
#2
(October 25, 2020 at 03:39 PM)CKZ Wrote: I will sell unique courses on pentesting. The entire course program takes 47 hours. During the training process, you can start practicing! 

In addition to the courses there is material on which you can apply the skills you have learned without consequences from the feds!

Video extension:   1080p50
Format:  mp4
The size of the archive with the course:  59GB

Program/ThemesSpoiler
Topic 1. Introduction to ethical hacking (3 hours)
1.1. Principles of ethical hacking
1.2. Basic terms and definitions in the field of information security
1.3. Standards and Federal laws on information security
1.4. Pentest
1.5. Tasks pentest
1.6. The stages of a pentest


Topic 2. Intelligence and information gathering (7 hours)
2.1. Collecting information from open sources (OSINT) - basic principles and objectives
2.2. OSINT Methodology
2.3. using search engines to search for vulnerabilities (Google hacking)
2.4. Collecting information from social networks and the organization's website
2.5. Getting information about the organization's domain names and network
2.6. Application of social engineering methods
2.7. Automation of information gathering


Theme 3. Scanning networks and enumeration (7 hours)
3.1. Principles and methods of scanning networks
3.2. Scan tools
3.3. Search for hosts connected to the network
3.4. Search for open ports
3.5. To determine the version of the services
3.6. Anonymization of scanning using proxy and VPN
3.7. methods and principles of enumeration
3.8. Getting user names
3.9. Collecting information about running services and network infrastructure
3.10. Working with SSH, RDP, SNMP, SMTP, LDAP, NTP, DNS,
3.11. Tools for enumeration


Theme 4. Attacks aimed at denial of service (5 hours)
4.1. Attack network layer
4.2. How bandwidth overflow attacks work: TCP/UDP/ICMP flood
4.3. Principles of attack with amplification: memcached, DNS, ntp dos
4.4. application-level Attacks on the HTTP Protocol: SlowHTTP, GET/POST flood
4.5. Attacks on vulnerabilities in web server or openssl
4.6. Attacks directly on web applications
4.7. Tools for testing resistance to attacks on denial of service

Topic 5. Vulnerability search and system hacking (16 hours)
5.1. principles of attacks on the system and services running in it
5.2. The sequence of actions during the attack on the system
5.3. Methods of search for vulnerabilities
5.4. Brute force passwords
5.5. The use of vulnerability scanners


Topic 6. bypass IDS / firewalls and honeypots (3 hours)
6.1. Firewalls-principles of operation, methods of circumvention
6.2. how IDS works: packet analysis at different levels of the ISO\OSI model, how signatures work, and existing solutions
6.3. Bypass the IDS, the basic principles and automation
6.4. Web application firewall and its bypass
6.5. Hanipots-principles of operation, analysis of existing solutions, detection methods

Topic 7. Social engineering (6 hours)
7.1. Methods and techniques of social engineering
7.2. The impersonation
7.3. Phishing attacks
7.4. Pretexting
7.5. Malicious email attachments


Theme 8. Elevation of privilege and postexploitation in Linux (5 hours)
8.1. General information about Linux security mechanisms
8.2. elevation of privileges in the presence of physical access to the system: changing credentials on the hard disk, modifying the OS loader to get keys in clear form.
8.3. privilege Escalation using SOFTWARE vulnerabilities: configuring, compiling and running exploits, exploiting logical vulnerabilities and configuration errors.
8.4. Attacks on virtualization: docker, lxc
8.5. post-operation Techniques: bind/reverse-shell, web-shell, substitution of system services, adding PAM modules, implementation of http requests in the processing process, using User Defined Functions in MySQL
8.6. Masking processes, files, and network connections


Topic 9. privilege Escalation and post-exploitation in Windows (5 hours)
9.1. UAC workarounds: DLL / Registry Hijacking
9.2. Exploiting vulnerabilities in non-updated operating systems
9.3. Getting administrator rights in a domain controller
9.4. extracting credentials using Mimikatz
9.5. “Pass the Hash” and “Pass the Ticket "
Techniques 9.6. post-operation Techniques


Course price: 700$
Contacts for pturchase: Telegram -> @ckzboom / Jabber -> [email protected]
thank you for sharing this one
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
I will Remove eBay negatives from your account within 24-48 hours TheBeast7x 5 379 November 21, 2020 at 12:30 AM
Last Post: TheBeast7x
Trading Private Courses Sorientio 20 1,550 October 15, 2020 at 02:22 PM
Last Post: Sorientio
Get $1 Every 48 hours On AutoPilot - Easily Scaleable PhotoGallery 6 259 October 14, 2020 at 01:29 PM
Last Post: PhotoGallery

 Users browsing this thread: 1 Guest(s)