Be A White Hat Hacker and Pen Tester
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size670.7 MB
- Uploaded Bytutsnode
- Downloads80
- Last checkedDec. 22nd '22
- Date uploadedDec. 21st '22
- Seeders 33
- Leechers16
Description
Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metaspoilt, Scapy and WireShark.
The course is divided into the following main sections:
Ethical Hacking Concepts
-What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques
Real World Information Gathering
-Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration
Scanning and Vulnerability Gathering
-Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification
Network Attacking Techniques
Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks
Web Exploitation Techniques
Learn about password attacks, SQL Injections, RCE and DOS attacks
Wireless Network Security
Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks
Metaspoilt
Learn to use the metaspoilt tool for your projects
Detection Evasion
Learn about the detection evasion techniques
This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise.
Who this course is for:
Students who want to be system security professionals
Students who want to learn Ethical Hacking
Requirements
Students should have some background in testing and knowledge of web servers, networks and web technologies
Last Updated 12/2018
Files:
Be A White Hat Hacker and Pen Tester [TutsNode.net] - Be A White Hat Hacker and Pen Tester 3 - Real World information gathering- 4 - Maltego Demo.mp4 (80.6 MB)
- 3 - Real World information gathering Information Intelligence Techniques English.srt (22.1 KB)
- 5 - Real World information gathering Search Engines.mp4 (50.3 MB)
- 5 - Real World information gathering Search Engines English.srt (13.5 KB)
- 6 - Real World information gathering Web Application Firewall Detection English.srt (10.7 KB)
- 4 - Maltego Demo English.srt (8.7 KB)
- 3 - Real World information gathering Information Intelligence Techniques.mp4 (38.8 MB)
- 6 - Real World information gathering Web Application Firewall Detection.mp4 (23.0 MB)
- 3 - Real-World-Information-Gathering-Powerpoint.zip (1.0 MB)
- 16 - Chapter-6-Video-3.pptx (352.2 KB)
- 16 - Exploiting and Counter Measures English.srt (13.2 KB)
- 15 - Web Testing Tools English.srt (12.1 KB)
- 14 - Web Exploitation Basic Techniques English.srt (11.8 KB)
- 15 - Chapter-6-Video-2.pptx (208.9 KB)
- 14 - Web Exploitation Basic Techniques.mp4 (36.2 MB)
- 15 - Web Testing Tools.mp4 (30.7 MB)
- 16 - Exploiting and Counter Measures.mp4 (17.5 MB)
- 14 - Chapter-6-Video-1.pptx (691.4 KB)
- 9 - Scanning and Vulnerability gathering Practical Avoidance Techniques English.srt (21.2 KB)
- 7 - Scanning and Vulnerability gathering Scapy English.srt (13.0 KB)
- 8 - Scanning and Vulnerability gathering Vulnerability Assesment English.srt (13.0 KB)
- 9 - Scanning and Vulnerability gathering Practical Avoidance Techniques.mp4 (23.0 MB)
- 8 - Scanning and Vulnerability gathering Vulnerability Assesment.mp4 (18.4 MB)
- 7 - Scanning and Vulnerability gathering Scapy.mp4 (18.0 MB)
- 7 - Scanning-And-Vulnrability-Gathering-Powerpoint.zip (1.4 MB)
- 2 - Ethical hacking and Penetration testing English.srt (17.2 KB)
- 2 - Ethical hacking and Penetration testing.mp4 (24.4 MB)
- 2 - Introduction-To-Ethical-Hacking-And-Penetration-Testing-Powerpoint.zip (1,010.9 KB)
- 10 - Network attacking techniques English.srt (15.9 KB)
- 11 - Wifi hack Demo English.srt (13.9 KB)
- 11 - Wifi hack Demo.mp4 (40.5 MB)
- 10 - Network attacking techniques.mp4 (25.0 MB)
- 10 - Network-Attacking-Techniques-Powerpoint.zip (2.6 MB)
- 13 - Desktop hacking techniques Hacking Different Systems English.srt (15.6 KB)
- 12 - Desktop hacking techniques English.srt (14.8 KB)
- 12 - Desktop hacking techniques.mp4 (24.2 MB)
- 13 - Desktop hacking techniques Hacking Different Systems.mp4 (23.0 MB)
- 12 - Desktop-Hacking-Techniques-Powerpoint.zip (2.2 MB)
- 17 - Wireless network Security Wireless networks and Standards English.srt (15.4 KB)
- 19 - Wireless network Security Wireless Sniffing English.srt (15.3 KB)
- 18 - Wireless network Security Breaking WEP Encryption English.srt (12.5 KB)
- 19 - Wireless network Security Wireless Sniffing.mp4 (21.2 MB)
- 17 - Wireless network Security Wireless networks and Standards.mp4 (18.7 MB)
- 18 - Wireless network Security Breaking WEP Encryption.mp4 (15.1 MB)
- 17 - Wireless-Network-Security-Powerpoint.zip (4.8 MB)
- 23 - Detection Evasion English.srt (12.4 KB)
- 23 - Detection Evasion.mp4 (19.7 MB)
- 23 - Detection-Evasion-Powerpoint.zip (18.6 MB)
- 21 - Metasploit Advance Metaspoilt Concepts English.srt (12.0 KB)
- 20 - Metasploit Introduction English.srt (10.4 KB)
- 22 - Metasploit Practical Usage English.srt (8.7 KB)
- 21 - Metasploit Advance Metaspoilt Concepts.mp4 (29.6 MB)
- 20 - Metasploit Introduction.mp4 (18.6 MB)
- 22 - Metasploit Practical Usage.mp4 (12.5 MB)
- 20 - Metaspoilt-Powerpoint.zip (2.0 MB)
- 25 - Bonus Lecture More Interesting Stuff Offers and Discounts.html (1.7 KB)
- 24 - Course Summary English.srt (9.3 KB)
- 24 - Course Summary.mp4 (9.8 MB)
- 1 - Introduction English.srt (8.5 KB)
- 1 - Introduction.mp4 (8.8 MB)
- TutsNode.net.txt (0.1 KB) .pad
- 0 (0.1 KB)
- 1 (2.0 KB)
- 2 (217.1 KB)
- 3 (163.6 KB)
- 4 (259.3 KB)
- 5 (281.9 KB)
- 6 (407.0 KB)
- 7 (46.7 KB)
- 8 (136.1 KB)
- 9 (313.9 KB)
- 10 (473.9 KB)
- 11 (494.2 KB)
- 12 (24.1 KB)
- 13 (303.1 KB)
- 14 (346.4 KB)
- 15 (353.2 KB)
- 16 (437.6 KB)
- 17 (455.3 KB)
- 18 (128.0 KB)
- 19 (499.5 KB)
- 20 (35.9 KB)
- 21 (395.2 KB)
- 22 (31.7 KB)
- 23 (254.2 KB)
- 24 (200.7 KB)
- 25 (223.4 KB)
- 26 (413.6 KB)
- 27 (358.4 KB)
- 28 (502.9 KB)
- 29 (137.0 KB)
- 30 (470.4 KB)
- 31 (13.1 KB)
- [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
Code:
- udp://open.stealth.si:80/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://fasttracker.foreverpirates.co:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://explodie.org:6969/announce
- udp://tracker.cyberia.is:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.uw0.xyz:6969/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.birkenwald.de:6969/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.dler.org:6969/announce
- udp://9.rarbg.me:2970/announce