Curriculum
Course:
Penetration Testing
Login
Curriculum
Penetration Testing
Introduction
0/3
About the Course
02:13
Preview
Objectives
01:34
Preview
Downloading Course Material
Text lesson
Module-1: Setting up Lab
0/7
Itus-1: Downloading Vmware
02:52
Itus-2: Installing Vmware
05:28
Itus-3: Downloading Kali Linux
04:50
Itus-4: Installing Kali Linux
13:05
Itus-5: Setting up Metasploitable2
03:27
Itus-6: Setting up Metasploitable3
03:50
Itus-7: Setting up Kioptrix
02:55
Module-2: Reconnaissance
0/12
Iisheeg-1: Concept of Reconnaissance
06:38
Iisheeg-2: Types Of Reconnaissance
05:49
Iisheeg-3: The Harvester
07:05
Preview
Itus-1: Theharvester Walkthrough
07:48
Itus-2: The Censys
09:09
Itus-3: Fingerprint Web Server
15:47
Itus-4: Hunting Emails
05:24
Itus-5: Spiderfoot
03:30
Itus-6: Spiderfoot Walkthrough
10:44
Itus-7: Wafwoof Walkthrough
04:18
Itus-8: Subdomain enumeration Part-1
07:57
Itus-9: Subdomain enumeration Part-2
04:52
Module 3: Scanning Networks
0/10
Iisheeg-1: Concept of Nmap
04:27
Iisheeg-2: Nmap States
03:07
Itus-1: Nmap Basic Scanning
03:38
Preview
Itus-2: Nmap Scanning Live Hosts
03:03
Itus-3: Nmap OS Discovery
02:42
Itus-4: Nmap Scanning Multiple Host
03:54
Itus-5: Nmap Scanning Exclusive IP
02:21
Itus-6: Nmap Scanning with Host File
05:20
Itus-7: Nmap Bypassing Firewall
03:17
Itus-8: Nmap Scanning Vulnerability
05:58
Module-4: Basic System Hacking
0/8
Iisheeg-1: What is System Hacking
03:45
Iisheeg-2: What is Payload and its types
02:23
Iisheeg-3: Concept of Msfvenom
06:31
Preview
Itus-1: Mfsvenom Executable Payload
11:58
Iisheeg-4: Concept of Netcat
02:06
Itus-2: Powershell Payload (ps1)
08:39
Itus-3: Hacking Machines using Html Application Payload
08:42
Itus-4: Hacking Machines using Microsoft Installer Payload (MSI)
07:27
Module-5: Exploiting Vulnerabilities
0/22
Itus-1: Exploiting Unreallrcd Backdoor Part-1
04:44
Itus-2: Exploiting Unreallrcd Backdoor Part-2
05:19
Itus-3: Exploitation of Rmi-Classloader Part-1
07:15
Itus-4: Exploitation of Rmi-Classloader Part-2
09:08
Itus-5: Exploitation of VSFTP backdoor part-1
09:22
Itus-6: Exploitation of VSFTP backdoor part-2
11:25
Itus-7: Three Way to Scan Eternal Blue Vulnerability
06:04
Itus-8: Exploiting Eternal Blue Part-1
05:27
Itus-9: Exploiting Eternal Blue Part-2
10:51
Itus-10: ProFTPD Mod_Copy Execution Part-1
03:52
Itus-11: ProFTPD Mod_Copy Execution Part-2
06:23
Itus-12: Exploiting Drupal Vulnerability Part-1
08:25
Itus-13: Exploiting Drupal Vulnerability Part-2
08:24
Itus-14: Exploiting Payroll Application
04:26
Itus-15: Apache Unauthenticated File Upload
13:03
Itus-16: Kioptrix Methodology
03:28
Itus-17: Network Scanning Kioptrix
05:44
Itus-18: Kioptrix Enumeration
07:54
Itus-19: Kioptrix Nikto Enumeration
04:59
Itus-20: Kioptrix SMB Auxiliary Scanning
03:56
Itus-21: Exploiting Samba 2.2 Vulnerability Part-1
06:26
Itus-22: Exploiting Samba 2.2 Vulnerability Part-2
08:20
Module-6: Privilege Escalation
0/9
Iisheeg-1: What is Privilege Escalation
03:39
Iisheeg-2: Types of Privilege Escalation
01:38
Iisheeg-3: What is User Account Control (UAC)
01:49
Iisheeg-4: How does UAC work
03:47
Itus-1: Windows Escalate UAC Protection Bypass
09:11
Itus-2: Windows Escalate UAC Protection Bypass (In Memory Injection)
07:56
Itus-3: Windows UAC Protection Bypass (Via FodHelper Registry Key)
07:00
Itus-4: Windows Escalate UAC Protection Bypass (Via Eventvwr Registry Key)
08:29
Itus-5: Windows Escalate UAC Protection Bypass (Via COM Handler Hijack)
13:20
Module: Wordlist
0/5
Itus-1: Kali Linux Wordlists
02:20
Itus-2: Dirb Wordlists
03:10
Itus-3: Rockyou Wordlist
01:56
Itus-4: Wfuzz Wordlists
01:34
Itus-5: Seclists Wordlists
02:20
Module: Directory Bruteforcing
0/6
Iisheeg-1: Concept of Directory Bruteforcing
04:39
Itus-1: Directory Bruteforcing using Dirb
04:55
Itus-2: Directory Bruteforcing using DirBuster
04:21
Itus-3: Directory Bruteforcing using Wfuzz
07:21
Itus-4: Directory Bruteforcing using Metasploit
04:19
Itus-6: Directory Bruteforcing using DirSearch
04:55
Cracking Passwords
0/9
Iisheeg-1: Concept of Password Cracking
06:10
Iisheeg-2: Password Cracking Techniques
09:34
Itus-1: Crunch Tool
04:55
Itus-2: John the ripper
08:09
Itus-3: Hashcat tool
05:21
Itus-4: CrackStation
05:10
Itus-5: Cracking FTP password
10:04
Itus-6: Cracking SSH Password
10:20
Itus-7: Cracking RDP passwords
10:05
CTF 1: Tomcat Penetration Testing
0/7
Itus-1: Tomcat Penetration Testing Methodology
06:23
Itus-2: Tomcat Host Discovery
02:20
Itus-3: Tomcat Port Scanning and Service Enumeration
04:21
Itus-4: Tomcat Web Application Vulnerability Scanning
05:04
Itus-5: Tomcat Exploitation
04:55
Itus-6: Tomcat Privilege Escalation
07:28
Itus-7: Tomcat Flag Capture
01:21
CTF 2: DomDom-1 Penetration Testing
0/4
Itus-1: DomDom-1 Scanning
08:34
Itus-2: DomDom-1 Enumeration
10:12
Itus-3: DomDom-1 Exploit
04:55
Itus-4: DomDom-1 Privilege Escalation
04:55
CTF 3: Star Wars-1 Penetration Testing
0/3
Itus-1: Star Wars-1 Reconnaissance
13:00
Itus-2: Star Wars-1 Exploitation
15:01
Itus-3: Star Wars-1 Privilege Escalation Part-1
12:11
CTF 4: Tomato-1 Penetration Testing
0/5
Itus-1: Tomato-1 Reconnaissance
07:21
Itus-2: Tomato-1 Enumeration
04:55
Itus-3: Tomato-1 Exploiting Part-1
11:21
Itus-4: Tomato-1 Exploiting Part-2
10:00
Itus-5: Tomato-1 Privilege Escalation
11:34
CTF 5: Photographer 1 Penetration Testing
0/4
Itus-1: Photographer 1 Reconnaissance
04:42
Itus-2: Photographer 1 Enumeration
08:21
Itus-3: Photographer 1 Exploitation
13:21
Itus-4: Photographer 1 Privilege Escalation
12:34
Video lesson
Objectives
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
I agree with storage and handling of my data by this website.
Privacy Policy
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Lost Password?