Sumario: | Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In Detail Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world. You'll get up to speed with Python, PHP scripting, and more. As you progress, you'll be guided through each of the capture-the-flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You'll also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers. By the end of this course, you'll have gained a solid understanding of ethical hacking and how to use the essential pentesting tools in the real world.
|