Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    The Redteam Blueprint - A Unique Guide To Ethical Hacking

    Posted By: ELK1nG
    The Redteam Blueprint - A Unique Guide To Ethical Hacking

    The Redteam Blueprint - A Unique Guide To Ethical Hacking
    Last updated 9/2021
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 10.49 GB | Duration: 30h 21m

    Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.

    What you'll learn
    300+ HD Videos
    180+ Hands on Exercises
    400+ Topics
    30+ Hours of Content
    How a Red Team Works at a Silicon Valley Company
    Building out your own Red Team at a large organization
    High Level and Low Level Crash Course on Windows Operating System Internals
    High Level and Low Level Crash Course on Linux Operating System Internals
    How the Kernel, Memory and the CPU work
    Beginner to Intermediate Networking
    How compiled programs work
    Full Guide to Python Programming
    Full Guide to Assembly Programing and Manual Shellcode Generation
    How Penetration Tests Actually Work and their Methodologies
    How and What Kerberos is
    Building, Managing and Attacking an Enterprise Active Directory Infrastructure
    The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale
    Building out Finding Reports and designing them for the right audience
    Being able to speak to Executives and Leadership at large organizations
    Passive and Active Reconnaissance tools and Techniques
    Real World Up to Date Exploitation Techniques
    Post Exploitation Techniques
    Custom Fix of Public Exploit Code
    The ability to creatively deploy persistence and backdoor binaries
    Living of the Land and Moving Laterally across the network
    Password Cracking
    Full Guide on Job Hunting in Silicon Valley
    Requirements
    Basic I.T Knowledge
    Any Machine with at least 4GB of Memory (RAM)
    No Prior Security or Ethical Hacking Skills
    Description
    Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews. Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.Building out a Red Team at Enterprise Silicon Valley ScaleSkills to manage the Red Team as well as internal programs that can chance how the organization worksNetworkingWindows Operating SystemLinux Operating SystemOperating System Internals (Memory, Stack, Heap, Kernels)Programming (Assembly & Python)Passive & Active ReconnaissanceAttack and Create Active Directory Infrastructure Custom ExploitationPost Exploitation Breaking Jail ShellsAbusing a Compromise to Lead to large scale attacksPassword CrackingBuild out a sophisticated in home labBuilding a Personal Security BrandBuilding a PortfolioJob Hunting the Silicon Valley WaySmashing the Job InterviewThese are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors. Don't wait! Take your career to the next level with the RedTeam Blueprint. 

    Overview

    Section 1: Welcome! Who Is This Guy?!

    Lecture 1 Introduction

    Section 2: The 3 Teams

    Lecture 2 Module Overview - The 3 Teams

    Lecture 3 The Red Team

    Lecture 4 The Blue Team

    Lecture 5 The Purple Team

    Section 3: Penetration Testing Process

    Lecture 6 Module Overview - Penetration Testing Process

    Lecture 7 Penetration Testing Methodology

    Lecture 8 Metrics & Why They Are Important

    Lecture 9 Routine Assessments Part 1 - What Are Routine Assessments?

    Lecture 10 Routine Assessments Part 2 - Yearly Assessments

    Lecture 11 Routine Assessments Part 3 - Quarterly Assessments?

    Lecture 12 Routine Assessments Part 4- Monthly Assessments?

    Lecture 13 Routine Assessments Part 5 - Constant Assessments?

    Lecture 14 Routine Assessments Part 6 - Building an Assessment Plan

    Lecture 15 Building & Working with an Enterprise Budget

    Lecture 16 Specialties?!

    Lecture 17 The CIA Triangle

    Section 4: The Windows Operating System

    Lecture 18 Installing & Using VirtualBox for Lab Virtualization

    Lecture 19 Windows at a Glance

    Lecture 20 The Windows File System

    Lecture 21 Windows Logs

    Lecture 22 Windows Internals - UAC

    Lecture 23 Windows Internals - Permissions

    Lecture 24 Windows Internals - Alternate Data Streams

    Lecture 25 Windows Internals - API Calls

    Lecture 26 Windows Internals - The SID

    Lecture 27 Windows Internals - Tokens

    Lecture 28 Windows Internals - Named Pipes

    Lecture 29 Windows Internals - PE Files & DLLs

    Lecture 30 Windows Command Line - Accessing the Command Line

    Lecture 31 Windows Command Line - Navigation

    Lecture 32 Windows Command Line - Working with Files and Directories

    Lecture 33 Windows Command Line - Working with Pipes

    Lecture 34 Windows Command Line - Standard I/O/E

    Lecture 35 Windows Command Line - Managing Windows

    Section 5: The Linux Operating System

    Lecture 36 Where is the GUI?!

    Lecture 37 The Linux File System

    Lecture 38 Linux Command Line - Navigation

    Lecture 39 Linux Command Line - Working with Files and Directories

    Lecture 40 Linux Command Line - Standard I/O/E Recap

    Lecture 41 Linux Command Line - Working with Data

    Lecture 42 Linux Command Line - Working with File Permissions

    Lecture 43 Linux Command Line - Man Pages

    Lecture 44 Linux Command Line - Base64

    Lecture 45 Linux Command Line - Hex

    Lecture 46 Linux Command Line - Network Connections Recap

    Lecture 47 Linux Processes

    Lecture 48 What are INodes?

    Lecture 49 Working with Open Files

    Lecture 50 Symbolic Links

    Lecture 51 The ID's

    Lecture 52 Linux Pipes

    Lecture 53 Linux Run Levels

    Lecture 54 Linux Logs

    Section 6: Operating System Internals

    Lecture 55 The Kernel

    Lecture 56 One Ring to Rule Them All

    Lecture 57 What is a CPU?

    Lecture 58 The CPU Registers

    Lecture 59 The CPU Flags

    Lecture 60 What is Memory & How does it work?

    Lecture 61 The Stack

    Lecture 62 The Heap

    Lecture 63 Extra information on Memory

    Lecture 64 Debuggers

    Lecture 65 Taking a look at ASLR

    Lecture 66 A Quick Word About AntiVirus

    Section 7: Active Directory

    Lecture 67 What is Active Directory

    Lecture 68 Basic Windows Server Configuration

    Lecture 69 Install AD DS

    Lecture 70 The AD Tree

    Lecture 71 OU's and their Permissions

    Lecture 72 Managing Users and Groups

    Lecture 73 Adding Machine to the Domain

    Lecture 74 Setting up Group Policies

    Lecture 75 Cached Credentials

    Section 8: Kerberos

    Lecture 76 What is Kerberos?

    Lecture 77 Kerberos Realms

    Lecture 78 The Authentication Server

    Lecture 79 The Ticket Granting Server

    Section 9: Data Manipulation

    Lecture 80 What is Encryption

    Lecture 81 Symmetric Encryption

    Lecture 82 Asymmetric Encryption

    Lecture 83 RSA Encryption

    Lecture 84 AES Encryption

    Lecture 85 What is Hashing?

    Lecture 86 MD5 Hashing

    Lecture 87 SHA Hashing

    Lecture 88 What is Encoding?

    Lecture 89 Base64 Encoding

    Lecture 90 Hex Encoding

    Lecture 91 URL Encoding

    Lecture 92 What is Compression?

    Lecture 93 Lossless vs Lossy Compression

    Lecture 94 LZ77 & LZ78 Compression Algorithms

    Lecture 95 Data Manipulation - Hands On

    Section 10: Networking

    Lecture 96 What is Networking?

    Lecture 97 The OSI Model

    Lecture 98 TCP/IP

    Lecture 99 UDP

    Lecture 100 The Switch

    Lecture 101 Routers & Gateways

    Lecture 102 What is a Protocol?

    Lecture 103 ICMP

    Lecture 104 DNS

    Lecture 105 DHCP

    Lecture 106 ARP

    Lecture 107 What is an IDS

    Lecture 108 What is an IPS

    Lecture 109 What is HA?

    Lecture 110 Proxys

    Lecture 111 The DMZ

    Lecture 112 Quick Talk on Databases

    Section 11: VPNs

    Lecture 113 What is a VPN

    Lecture 114 What is IPSEC?

    Lecture 115 What is IKE?

    Section 12: Firewalls

    Lecture 116 What is a Firewall?

    Lecture 117 Packet Filtering Firewalls

    Lecture 118 Stateful Inspecting Firewalls

    Lecture 119 Web Application Firewalls

    Section 13: Configuring PFSense Firewalls

    Lecture 120 Installing PFSense

    Lecture 121 The Firewall UI

    Lecture 122 Configuring a DMZ

    Lecture 123 Configuring a VPN

    Lecture 124 Backup & Logging

    Lecture 125 PFsense Hands On

    Section 14: Program Theory

    Lecture 126 What is a Compiler?

    Lecture 127 What is a Linker?

    Section 15: Python Course

    Lecture 128 Why Python?

    Lecture 129 Installing Python

    Lecture 130 Hello World

    Lecture 131 Variables

    Lecture 132 Type Casting

    Lecture 133 Operators

    Lecture 134 If/Else

    Lecture 135 Loops

    Lecture 136 The Dictionary

    Lecture 137 Lists

    Lecture 138 Tuples

    Lecture 139 Modules

    Lecture 140 Classes

    Lecture 141 Inheritance

    Lecture 142 Configuration Files

    Lecture 143 Logging

    Lecture 144 Error Handling

    Lecture 145 Sockets

    Lecture 146 Threading

    Lecture 147 Python Hands On

    Section 16: Assembly Course

    Lecture 148 Why Assembly?

    Lecture 149 Hello World

    Lecture 150 Variables

    Lecture 151 Saving States

    Lecture 152 Arithmetic

    Lecture 153 Loops

    Lecture 154 Logic Control

    Lecture 155 Reading Files

    Lecture 156 Writing Files

    Lecture 157 Op Code

    Lecture 158 Bit Operators

    Lecture 159 Assembly Hands On

    Section 17: Scope Identification

    Lecture 160 Goal & Scope Identification

    Lecture 161 Stability Considerations

    Lecture 162 Briefing Stake Holders

    Lecture 163 Prepping

    Lecture 164 Scope Identification Hands On

    Section 18: Reconnaissance

    Lecture 165 What is Reconnaissance?

    Lecture 166 Installing Kali

    Lecture 167 Passive Recon - Google

    Lecture 168 Passive Recon - Shodan

    Lecture 169 Passive Recon - Whois

    Lecture 170 Passive Recon - Netcraft

    Lecture 171 Passive Recon - Job Posting

    Lecture 172 Active Recon - Port Scanning

    Lecture 173 Active Recon - DNS

    Lecture 174 Active Recon - Nikto

    Lecture 175 Active Recon - Dirb

    Lecture 176 Active Recon - Sparta

    Lecture 177 Active Recon - Working with NC

    Lecture 178 Active Recon - Banner Grabbing

    Lecture 179 Active Recon - Vulnerability Scanners

    Lecture 180 Active Recon - Browsing

    Lecture 181 Active Recon - Manual vs Automated

    Lecture 182 Reconnaissance Hands On

    Section 19: Exploitation

    Lecture 183 Finding Exploits

    Lecture 184 Misconfigurations

    Lecture 185 Looking for 0 days

    Lecture 186 Metasploit - What is Metasploit?

    Lecture 187 Metasploit - Exploits and Payloads

    Lecture 188 Metasploit - The Meterpreter

    Lecture 189 Metasploit - Adding an Exploit to Metasploit

    Lecture 190 Metasploit - MSFVenom

    Lecture 191 Metasploit - Hands On

    Lecture 192 The OWASP Top 10

    Lecture 193 SQL Injection & SQLMap

    Lecture 194 XSS

    Lecture 195 Insecure Direct Object Reference

    Lecture 196 Local File Inclusion

    Lecture 197 Remote File Inclusion

    Lecture 198 The Authenticated Unauthenticated Pages

    Lecture 199 Broken Authentication and Session Management

    Lecture 200 Faulty Redirects

    Section 20: Post Exploitation

    Lecture 201 Stabilizing Shells

    Lecture 202 Breaking Out Of The Jail Shell

    Lecture 203 What is Persistence?

    Lecture 204 Windows Persistence

    Lecture 205 Linux Persistence

    Lecture 206 What is Privilege Escalation?

    Lecture 207 OS Version

    Lecture 208 Common Configuration Issues

    Lecture 209 File Permissions

    Lecture 210 MySQL

    Lecture 211 Sudo

    Lecture 212 Relative Path Sudo Binary

    Lecture 213 Unquoted Service Path

    Lecture 214 Service Misconfigurations

    Lecture 215 LinuxPrivChecker

    Lecture 216 Im Root Now What?

    Lecture 217 Pulling Hashes

    Lecture 218 Pass The Hash

    Lecture 219 SSH Keys

    Lecture 220 Checking Logs

    Lecture 221 Duel Homed Machines

    Lecture 222 Network Traffic

    Lecture 223 ARP Poisoning

    Lecture 224 Web Servers

    Lecture 225 Account Directory Attacks

    Lecture 226 Password Spraying

    Lecture 227 SSH Tunneling

    Lecture 228 Pivoting

    Section 21: Password Cracking

    Lecture 229 What is Password Cracking?

    Lecture 230 John The Ripper

    Lecture 231 Hashcat

    Lecture 232 Rainbow Tables

    Lecture 233 Password Cracking Hands On

    Section 22: Covering Your Tracks

    Lecture 234 Why Cover Your Tracks?

    Lecture 235 Clearing Windows Logs

    Lecture 236 Clearing Linux Logs

    Lecture 237 Quick Talk on Logging

    Lecture 238 Clearing Command History

    Lecture 239 Persistent Backdoors

    Lecture 240 The Clean Up

    Lecture 241 Covering Your Tracks Hands On

    Section 23: Reporting

    Lecture 242 The Format

    Lecture 243 The Audience

    Lecture 244 Business Risks on Findings

    Lecture 245 Remediation Options

    Lecture 246 Working With The Blue Team

    Section 24: Attacking Active Directory (Realistic Scenario)

    Lecture 247 Reconnaissance

    Lecture 248 Exploitation

    Lecture 249 Post Exploitation

    Lecture 250 Finding New Access

    Lecture 251 Moving Up In The World!

    Lecture 252 Getting Domain Admin

    Section 25: Job Hunting

    Lecture 253 The Resume

    Lecture 254 Professional Email

    Lecture 255 Certifications

    Lecture 256 Personal Brand

    Lecture 257 Searching for the Job

    Lecture 258 Analyzing the Job Post

    Lecture 259 Applying for the Job

    Lecture 260 The Future Company

    Lecture 261 Salary Requirements

    Lecture 262 The Interview Process - The Screening Call

    Lecture 263 The Interview Process - Prepping for the Technical Interviews

    Lecture 264 The Interview Process - The Technical Screening Interview

    Lecture 265 The Interview Process - Prepping for the On Site Final Interview

    Lecture 266 The Interview Process - The Onsite

    Lecture 267 The Interview Process - The Offer

    Lecture 268 Congratulations!

    Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming,Anyone who wants to learn the full skillset truly required to land the job,Anyone who wants to learn how professional hackers work and target real organizations from a real hacker,Anyone who wants to make a career move into Ethical Hacking from another field