Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Capture The Flag (Ctf) - Intermediate Level Training

    Posted By: ELK1nG
    Capture The Flag (Ctf) - Intermediate Level Training

    Capture The Flag (Ctf) - Intermediate Level Training
    Published 8/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.71 GB | Duration: 6h 1m

    Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.

    What you'll learn
    Exploiting Open Ports
    Linux Penetration Testing
    Windows Penetration Testing
    Hacking Webservers
    Perform remote exploitation of systems
    Escalate local privileges to root level
    Requirements
    Need Basic Knowledge about Kali Linux
    Need Basic Knowledge about System Commands
    Need Basic Knowledge about webservers
    Description
    A penetration test, also called a PEN-TEST or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture. These penetration tests are often carried out by ethical hackers. These in-house employees or third parties mimic the strategies and actions of an attacker in order to evaluate the hackability of an organization's computer systems, network or web applications. Organizations can also use pen testing to test their adherence to compliance regulations.Ethical hackers are information technology (IT) experts who use hacking methods to help companies identify possible entry points into their infrastructure. By using different methodologies, tools and approaches, companies can perform simulated cyber attacks to test the strengths and weaknesses of their existing security systems. Penetration, in this case, refers to the degree to which a hypothetical threat actor, or hacker, can penetrate an organization's cybersecurity measures and protocols.Capture the Flag (CTF) Training focuses on enhancing a professional’s regarding Pentesting, the latest knowledge and practical experience for expanding their skill set.This training is an assurance to polish the problem-solving skills, and to offer critical hands-on practice under the right level of pressure so that candidates get the feel of real-life situation.CTF Competitions are the perfect way to enhance the talent of an individual Hacker. Many organizations consider it a right platform to find the skilled ethical hacker with the best academic and hands-on learning experience. CTF training, therefore, is an opportunity not only to learn the skills of ethical hacking but also to be found by the organization for their best of the job opportunities. The successful completion of this training will help the participants in learning

    Overview

    Section 1: Booting Up Kali Linux

    Lecture 1 Installing kali Linux and vmware workstation

    Section 2: Metasploit Framework

    Lecture 2 1.Metasploit Framework - About Metasploit

    Lecture 3 2.Metasploit Framework - Metasploitable Machine

    Lecture 4 3.Metasploit Framework - Footprinting

    Lecture 5 4.Metasploit Framework - Scanning

    Lecture 6 5.Metasploit Framework - Exploiting FTP

    Lecture 7 6.Metasploit Framework - Exploiting RMI

    Section 3: Basic Linux Commands For Pentesters

    Lecture 8 1.Linux Commands for Pentesters

    Lecture 9 2.Linux Commands for Pentesters

    Section 4: Basic - Linux penetration Testing

    Lecture 10 1.Basic Penetration Testing on Linux Base Machine

    Lecture 11 2.Basic Penetration Testing - Lab setup

    Lecture 12 3.Basic Penetration Testing - FootPrinting and scanning

    Lecture 13 4.basic Penetration Testing - Backdoor Webserver

    Lecture 14 5.Baisc Penetration Testing - Gaining shell

    Lecture 15 6.Basic Penetration Testing Gaining - root Access

    Section 5: Basic - Linux penetration Testing-2

    Lecture 16 1.Basic - Linux penetration Testing-2-intro

    Lecture 17 2.Basic - Linux penetration Testing-2-Scanning

    Lecture 18 3.Basic - Linux penetration Testing-2-initial Access

    Lecture 19 4.Basic - Linux penetration Testing-2-Uploading Shell

    Lecture 20 5.Basic - Linux penetration Testing-2-Privilege escalation

    Section 6: Basic - Linux penetration Testing-3

    Lecture 21 1.Basic - Linux penetration Testing-3- introduction

    Lecture 22 2.Basic - Linux penetration Testing-3- scanning

    Lecture 23 3.Basic - Linux penetration Testing-3- Password Cracking

    Lecture 24 4.Basic - Linux penetration Testing-3- initial access

    Lecture 25 5.Basic - Linux penetration Testing-3- initial access-2

    Lecture 26 6.Basic - Linux penetration Testing-3- Privilege escalation

    Section 7: Linux Penetration Testing - CTF

    Lecture 27 1.Linux Penetration Testing - setup Lab

    Lecture 28 2.Linux Penetration Testing - Scanning

    Lecture 29 3.Linux Penetration Testing - User Enumeration

    Lecture 30 4.Linux Penetration Testing - Bruteforce Attack

    Lecture 31 5.Linux Penetration Testing - Gaining shell access

    Lecture 32 6.Linux Penetration Testing -Privilege escalation to User

    Lecture 33 7.Linux Penetration Testing - Privilege escalation

    Section 8: Linux Penetration Testing (Beginner Level)

    Lecture 34 1.Linux Penetration Testing (Beginner Level)-CTF-1

    Lecture 35 2..Linux Penetration Testing (Beginner Level)-CTF-2

    Lecture 36 3..Linux Penetration Testing (Beginner Level)-CTF-3

    Lecture 37 4..Linux Penetration Testing (Beginner Level)-CTF-4

    Section 9: Windows Penetration Testing (Beginner Level)

    Lecture 38 1.Windows Penetration Testing (Beginner Level)- setup

    Lecture 39 2.Windows Penetration Testing (Beginner Level)- scanning

    Lecture 40 3.Windows Penetration Testing (Beginner Level)- capture flag

    Lecture 41 4.Windows Penetration Testing (Beginner Level)- Initial Access

    Lecture 42 5.Windows Penetration Testing (Beginner Level) Privilege escalation

    Lecture 43 6.Windows Penetration Testing (Beginner Level)- Flag

    Section 10: Windows Penetration Testing (Intermediate Level)

    Lecture 44 1.Windows Penetration Testing (Intermediate-level)-Introduction

    Lecture 45 2.Windows Penetration Testing (Intermediate-level)-Scanning

    Lecture 46 3.Windows Penetration Testing (Intermediate-level)-Initial Access

    Lecture 47 4.Windows Penetration Testing (Intermediate-level)-Explore

    Lecture 48 5.Windows Penetration Testing (Intermediate-level)-Privilege escalation

    Lecture 49 6.Windows Penetration Testing (Intermediate-level)-Privilege escalation 2

    Section 11: Linux Penetration Testing (Intermediate Level)

    Lecture 50 1.Linux Penetration Testing (Intermediate Level) -introduction

    Lecture 51 2.Linux Penetration Testing (Intermediate Level) -Scanning

    Lecture 52 3.Linux Penetration Testing (Intermediate Level) - Initial Access

    Lecture 53 4.Linux Penetration Testing (Intermediate Level) - Initial Access-2

    Lecture 54 5.Linux Penetration Testing (Intermediate Level) - initial Access-3

    Lecture 55 6.Linux Penetration Testing (Intermediate Level) - Initial Access-4-Exploiting

    Lecture 56 7.Linux Penetration Testing (Intermediate Level) - Exploiting executable

    Lecture 57 8.Linux Penetration Testing (Intermediate Level) - Exploiting Executable

    Lecture 58 9.Linux Penetration Testing (Intermediate Level) - Privilege escalation

    Ethical Hackers,Penetration Testers