Ethical Hacking - Capture the Flag Walkthroughs - v2

Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In...

Descripción completa

Detalles Bibliográficos
Otros Autores: Krahenbill, Cliff, author (author)
Formato: Video
Idioma:Inglés
Publicado: Packt Publishing 2020.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630567006719
Descripción
Sumario:Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In Detail Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world. You'll get up to speed with Python, PHP scripting, and more. As you progress, you’ll be guided through each of the capture-the-flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You’ll also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers. By the end of this course, you’ll have gained a solid understanding of ethical hacking and how to use the essential pentesting tools in the real world.
Notas:Title from resource description page (Safari, viewed November 11, 2020).
Descripción Física:1 online resource (1 video file, approximately 1 hr., 38 min.)