About this video

This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access.

Starting with an overview of the course, you’ll move on to build your virtual lab environment. Next, you’ll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you’ll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you’ll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade.

By the end of this course, you’ll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently.

The resources are placed here: https://github.com/PacktPublishing/Ethical-Hacking---Capture-the-Flag-Walkthroughs---v1

Publication date:
September 2020
2 hours 42 minutes

About the Author

  • Cliff Krahenbill

    Cliff Krahenbill, known as Professor K, is a technology professional and online instructor. He received his Master of Science degree in Cybersecurity from UMUC in 2015 and Master of Science degree in Information Technology from Capella University in 2007. Professor K has been working in the field of technology since 1998 as a Microsoft support technician, Microsoft certified trainer, technology support specialist, senior network technology consultant, IT auditor, and most recently as the owner and operator of his own technology firm, CLK Technology Solutions, located in Tucson, Arizona. Professor K's expertise in technology lies in designing, building, supporting network infrastructures and network security. He has been teaching online courses since 2008 and conducts online classes for universities and colleges. He holds numerous technology certifications including the following: MCTS: Windows Server 2008 Active Directory, Configuration MCTS: Windows Server 2008 Applic

    Browse publications by this author