Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Pentesting Primer 101 - Hands-On Lab Scenarios

Posted By: ELK1nG
Pentesting Primer 101 - Hands-On Lab Scenarios

Pentesting Primer 101 - Hands-On Lab Scenarios
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.01 GB | Duration: 2h 53m

Beginner Friendly Ethical Hacking & Penetration Testing primer 2023 - Learn & Experience the entire Pentesting lifecycle

What you'll learn

Offensive Security & Pentesting Basics

Scenario-based lab examples to reflect real world target environments

Full-phased penetration testing lifecycle from Recon to Post-Exploitation with practical examples

Hands-on skills with Metasploit, Nmap, Burp Suite and other popular hacking tools within a lab environment

Generate, Deploy and Manage a variety of Shells

Run exploits against Web Apps, Linux and Windows all within a guided range "Campaign Mode"

Requirements

Basic knowledge in Networking, Linux and Windows

Basic knowledge of Cybersecurity and Pentesting TTP's

A Kali Linux VM and high-speed internet connection to follow along in the labs

Experience with Linux and Windows command line

Description

This 2023 course is targeted for Beginner security professionals and enthusiasts who want to learn more about Penetration Testing and Red Teaming with practical examples. Topics cover the basics of offensive security and dive into the full pentesting lifecycle from Enumeration to Post-Exploitation.The course guides the student through red team and ethical hacking TTP's while showcasing real-world scenarios on a cyber-range which mimics a target network. The cyber-range, Neotek is hosted by Slayer Labs and contains 11 Windows and Linux VM's all engineered to exploit! The course walks through the Neotek Campaign which is stroyline-based, providing hints and targeted directions to the attacker. Completing the course will allow you to own all 11 Neotek range targets!The mission of this course and cyber-range is to provide the user with a technical high-level overview of ethical hacking, along with realistic scenarios and learning opportunities to become proficient in the basics of Pentesting. The goal is to provide real-world scenarios so the student can get hands-on keyboard and start running through the entire process from Enumeration to Post-Exploitation.The course has been designed to trim the fat with the expectation that students can pause, re-watch or do additional research if they are following along hands-on in the labs. With that, the student is expected to know basic tools and TTP's in relation to offensive security, ethical hacking and pentesting. For example - covering how to setup a VM in VirtualBox, explaining the basics of networking or installing additional tools on Kali will not be covered.Each topic dives into the technical side, providing command-line examples and explanations along the way. Topics covered (but are not limited to):Enumeration with Nmap scripts and Metasploit.Initial Exploitation with public Exploit-DB proofs of concepts, WebApp and vulnerable service exploitation & Brute Forcing with Hydra and CrackMapExec.PrivEsc with LinPEAS, WinPEAS, Credential Harvesting, Metasploit Post Modules & Packet Sniffing.Post-Exploitation by Collecting and Cracking Linux and Windows hashes with Mimikatz and John the Ripper, Harvesting SSH Keys, Transferring Files & Establishing Tunnels.Course content uses Kali the majority of the time, but also uses Slayer Labs Neotek range targets for intel collection and as jump boxes, utilizing built-in services such as Nmap and SSH portforwarding. Students should be comfortable using Kali Linux along with Linux and Windows command-line. This course is Begineer-friendly in relation to Penetration Testing, however the student should have prior knowledge in IT fundamentals and Security essentials.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Lab Connection

Section 2: Mission 1: "The Gig"

Lecture 3 TurnersExports

Section 3: Mission 2: "The Highest Bidder"

Lecture 4 OrbitalBids

Section 4: Mission 3: "Whois Radstech?"

Lecture 5 Radstech

Section 5: Mission 4: "Something Phishy"

Lecture 6 NeotekMail

Section 6: Mission 5: "You've Got Mail"

Lecture 7 NeotekOps

Section 7: Mission 6: "Enter the Dragon"

Lecture 8 CobraStarNav - Part 1

Lecture 9 CobraStarNav - Part 2

Section 8: Mission 7: "You Have the Bridge"

Lecture 10 CobraStarBridge

Section 9: Mission 8: "Mega Hack"

Lecture 11 CobraStarSec

Section 10: Mission 9: "I'll Have What It's Having"

Lecture 12 NeotekResearch

Section 11: Mission 10: "The Scrap Yard"

Lecture 13 Scrapyard

Section 12: Final Mission: "The Choice is Yours…"

Lecture 14 CobraStarMainframe

Lecture 15 Supplementary: Chisel Tunneling

Section 13: Bonus Content

Lecture 16 Bonus Content

Beginner security students and/or professionals who are looking to get more hands-on practical experience with offensive security, pentesting, and ethical hacking TTP's,Professionals with entry level security certificates such as Security+, GSEC or Pentest+ who are wanting to learn Red Teaming and Penetration Testing with practical hands-on keyboard scenarios,Students or professionals who want to learn and get hands on experience running through the entire Pentesting process