About this video
This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access.
Starting with an overview of the course, you’ll move on to build your virtual lab environment. Next, you’ll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you’ll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you’ll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade.
By the end of this course, you’ll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently.
The resources are placed here: https://github.com/PacktPublishing/Ethical-Hacking---Capture-the-Flag-Walkthroughs---v1
- Publication date:
- September 2020
- 2 hours 42 minutes