Practical Guide to Windows Pentesting with Kali Linux
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size4.6 GB
- Uploaded Bytutsnode
- Downloads209
- Last checkedJul. 05th '21
- Date uploadedJul. 02nd '21
- Seeders 25
- Leechers12
Description
Kali Linux is the premier platform for testing and maintaining Windows security. Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your organization data and money.
With this practical course, you will start off with learning how to gather information about the target network and websites to discover all the vulnerable ports. Once you find the necessary info, you’ll learn to bypass security restrictions using exploitation tools to access the target system, hack websites using various pentesting tools. Moving further you’ll be mastering master various exploitation and post exploitation techniques such as Pass-The-Hash techniques.
By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools & collect valuable information from the exploited host.
Contents and Overview
This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Learning Windows Penetration Testing Using Kali Linux you’ll start by gathering information about the target network and websites to discover all the vulnerable ports. Moving on, you’ll learn to bypass security restrictions using exploitation tools to access the target system. Also, you’ll hack websites using various pentesting tools and learn how to present your test reports. By the end of the course, you’ll be able to find, exploit, and prevent security vulnerabilities in Windows OS using Kali Linux.
The second course, Practical Windows Penetration Testing will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack. By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.
About the Authors:
Taking education on security to a completely new level, Angelique Keyter is devoted to making a difference in the world of cybercrime. She has numerous years of hacking and lecturing behind her and focuses her time on making a difference in her community and teaching people how to fight an unseen criminal. Angelique is a certified hacker, Linux professional, and Microsoft solutions expert with more than 20 years of experience. She is a mother of twins and spends a lot of time studying new things and learning new concepts. She believes that you are never too old to learn. She has a passion for gaming and geeky stuff from hacking to robotics to forensic psychology. She is a focused person with a witty sense of humor, always ready to help or play football with her boys.
Gergely Révay, the instructor of this course, hacks stuff for fun and profit at Multinational Corporation in Germany and in the USA. He has worked as a penetration tester since 2011; before that, he was a quality assurance engineer in his home country, Hungary. As a consultant, he did penetration tests and security assessments in various industries, such as insurance, banking, telco, mobility, healthcare, industrial control systems, and even car production.
Who this course is for:
This course is for IT professionals, security enthusiasts, and security professionals who are willing to learn how to find, exploit, and prevent security vulnerabilities in Windows OS using Kali Linux as well as penetration testing on the Windows platform.
Requirements
Basic understanding of penetration testing would be an advantage
Last Updated 4/2019
Files:
Practical Guide to Windows Pentesting with Kali Linux [TutsNode.com] - Practical Guide to Windows Pentesting with Kali Linux 2. Practical Windows Penetration Testing- 20. Achieving Persistence.mp4 (397.9 MB)
- 20. Achieving Persistence-en_US.srt (37.5 KB)
- 5. Setting Up Target Win 10-en_US.srt (20.6 KB)
- 13. Evading Anti-Virus.mp4 (288.8 MB)
- 13. Evading Anti-Virus-en_US.srt (29.2 KB)
- 22. Pass-the-Hash Attack-en_US.srt (26.7 KB)
- 8. Scanning-en_US.srt (23.0 KB)
- 9. Service Identification-en_US.srt (22.4 KB)
- 10. Using Public Exploits-en_US.srt (19.1 KB)
- 17. Privilege Escalation-en_US.srt (17.7 KB)
- 21. Pivoting-en_US.srt (15.2 KB)
- 7. Creating the Domain-en_US.srt (14.5 KB)
- 12. Social Engineering-en_US.srt (14.4 KB)
- 18. Collecting Credentials-en_US.srt (14.4 KB)
- 19. Password Brute-Force-en_US.srt (13.8 KB)
- 5. Setting Up Target Win 10.mp4 (228.5 MB)
- 16. Meterpreter-en_US.srt (12.9 KB)
- 11. Exploiting with Metasploit-en_US.srt (10.5 KB)
- 6. Setting Up Target Win 2016-en_US.srt (5.8 KB)
- 4. Setting Up Kali-en_US.srt (4.4 KB)
- 1. The Course Overview-en_US.srt (3.0 KB)
- 3. Test Lab Architecture-en_US.srt (2.6 KB)
- 14. Final Word on Exploitation-en_US.srt (2.5 KB)
- 15. About Post-Exploitation-en_US.srt (2.3 KB)
- 23. Review And Next Steps-en_US.srt (2.2 KB)
- 2. Disclaimer-en_US.srt (2.1 KB)
- 8. Scanning.mp4 (204.8 MB)
- 22. Pass-the-Hash Attack.mp4 (200.1 MB)
- 10. Using Public Exploits.mp4 (186.3 MB)
- 9. Service Identification.mp4 (172.5 MB)
- 7. Creating the Domain.mp4 (152.9 MB)
- 12. Social Engineering.mp4 (132.5 MB)
- 17. Privilege Escalation.mp4 (125.7 MB)
- 16. Meterpreter.mp4 (108.0 MB)
- 18. Collecting Credentials.mp4 (97.0 MB)
- 11. Exploiting with Metasploit.mp4 (87.8 MB)
- 21. Pivoting.mp4 (85.6 MB)
- 19. Password Brute-Force.mp4 (80.4 MB)
- 6. Setting Up Target Win 2016.mp4 (56.8 MB)
- 1. The Course Overview.mp4 (45.8 MB)
- 4. Setting Up Kali.mp4 (42.7 MB)
- 23. Review And Next Steps.mp4 (33.5 MB)
- 14. Final Word on Exploitation.mp4 (6.4 MB)
- 3. Test Lab Architecture.mp4 (5.7 MB)
- 2. Disclaimer.mp4 (5.5 MB)
- 15. About Post-Exploitation.mp4 (5.1 MB)
- 3. Installing Kali Linux from Scratch-en_US.srt (9.2 KB)
- Pentesting-with-kali-linux.zip (0.2 KB)
- 26. Implementing a SQL Attack-en_US.srt (11.8 KB)
- 2. Pre-Installed Kali Linux-en_US.srt (11.6 KB)
- 10. Using Maltego-en_US.srt (11.3 KB)
- 33. Report Presentation-en_US.srt (10.7 KB)
- 4. Updating, Downloading and Installing Apps-en_US.srt (10.6 KB)
- 7. Footprinting the Network-en_US.srt (10.1 KB)
- 9. Scanning with NMAP and Zenmap-en_US.srt (9.8 KB)
- 16. Metasploit and MSFvenom-en_US.srt (9.8 KB)
- 8. Manipulating Google-en_US.srt (8.9 KB)
- 13. Installing Nessus-en_US.srt (8.8 KB)
- 29. Checking AD Password Strengths of Users-en_US.srt (8.3 KB)
- 24. Implementing an XSS Attack-en_US.srt (8.2 KB)
- 17. Using Armitage-en_US.srt (7.8 KB)
- 19. What Is Yuki and How Do We Install It-en_US.srt (7.7 KB)
- 27. Cracking Passwords with John the Ripper-en_US.srt (7.3 KB)
- 22. Using Individual Tools-en_US.srt (6.9 KB)
- 18. Other Ways to Exploit-en_US.srt (6.9 KB)
- 21. Installing, Configuring, and Scanning with Sniper-en_US.srt (6.9 KB)
- 14. Scanning with Nessus-en_US.srt (6.4 KB)
- 32. Gathering Your Findings-en_US.srt (6.2 KB)
- 12. Scanning with OpenVAS-en_US.srt (5.6 KB)
- 31. Monitoring Resources-en_US.srt (5.6 KB)
- 28. Cracking Passwords with Hydra-en_US.srt (5.5 KB)
- 15. Exploiting with Metasploit-en_US.srt (5.5 KB)
- 30. Using Software to Bypass Local Passwords-en_US.srt (5.3 KB)
- 20. Scanning with Yuki-en_US.srt (4.7 KB)
- 25. SQL Injection Theory-en_US.srt (2.2 KB)
- 11. Installing OpenVAS-en_US.srt (4.6 KB)
- 5. Running Services on Kali-en_US.srt (4.6 KB)
- 23. Understanding Cross-Site Scripting-en_US.srt (4.1 KB)
- 6. Understanding Different Types of Tools-en_US.srt (3.7 KB)
- 1. The Course Overview-en_US.srt (3.5 KB)
- 4. Updating, Downloading and Installing Apps.mp4 (133.3 MB)
- 16. Metasploit and MSFvenom.mp4 (117.6 MB)
- 24. Implementing an XSS Attack.mp4 (101.7 MB)
- 10. Using Maltego.mp4 (100.5 MB)
- 18. Other Ways to Exploit.mp4 (99.3 MB)
- 2. Pre-Installed Kali Linux.mp4 (95.0 MB)
- 29. Checking AD Password Strengths of Users.mp4 (86.7 MB)
- 26. Implementing a SQL Attack.mp4 (76.5 MB)
- 13. Installing Nessus.mp4 (72.1 MB)
- 19. What Is Yuki and How Do We Install It.mp4 (71.9 MB)
- 33. Report Presentation.mp4 (65.3 MB)
- 17. Using Armitage.mp4 (64.8 MB)
- 7. Footprinting the Network.mp4 (64.3 MB)
- 27. Cracking Passwords with John the Ripper.mp4 (61.9 MB)
- 8. Manipulating Google.mp4 (61.6 MB)
- 22. Using Individual Tools.mp4 (59.8 MB)
- 21. Installing, Configuring, and Scanning with Sniper.mp4 (59.7 MB)
- 20. Scanning with Yuki.mp4 (55.4 MB)
- 9. Scanning with NMAP and Zenmap.mp4 (53.4 MB)
- 5. Running Services on Kali.mp4 (51.7 MB)
- 12. Scanning with OpenVAS.mp4 (42.8 MB)
- 31. Monitoring Resources.mp4 (36.2 MB)
- 28. Cracking Passwords with Hydra.mp4 (36.0 MB)
- 3. Installing Kali Linux from Scratch.mp4 (35.1 MB)
- 32. Gathering Your Findings.mp4 (30.7 MB)
- 14. Scanning with Nessus.mp4 (30.6 MB)
- 15. Exploiting with Metasploit.mp4 (29.9 MB)
- 11. Installing OpenVAS.mp4 (29.4 MB)
- 30. Using Software to Bypass Local Passwords.mp4 (27.4 MB)
- 1. The Course Overview.mp4 (21.1 MB)
- 23. Understanding Cross-Site Scripting.mp4 (12.6 MB)
-
Code:
- udp://inferno.demonoid.pw:3391/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://torrent.gresille.org:80/announce
- udp://glotorrents.pw:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://9.rarbg.to:2710/announce
- udp://shadowshq.yi.org:6969/announce
- udp://tracker.zer0day.to:1337/announce