HOME > IT & Software > Ethical hacking and pentesting guide

Ethical hacking and pentesting guide

SynopsisEthical hacking and pentesting guide, available at $59.99, ha...
Ethical hacking and pentesting guide  No.1

Ethical hacking and pentesting guide, available at $59.99, has an average rating of 4.65, with 247 lectures, 16 quizzes, based on 102 reviews, and has 6360 subscribers.

You will learn about The basics of the web and networking Portscanning and network hacking Getting a foothold Privilege escalations Web hacking API hacking Mobile hacking Pentesting This course is ideal for individuals who are OSCP students or IT engineers or QA Engineers or Pentesters It is particularly useful for OSCP students or IT engineers or QA Engineers or Pentesters.

Enroll now: Ethical hacking and pentesting guide

Summary

Title: Ethical hacking and pentesting guide

Price: $59.99

Average Rating: 4.65

Number of Lectures: 247

Number of Quizzes: 16

Number of Published Lectures: 247

Number of Published Quizzes: 16

Number of Curriculum Items: 268

Number of Published Curriculum Objects: 267

Original Price: $59.99

Quality Status: approved

Status: Live

What You Will Learn

  • The basics of the web and networking
  • Portscanning and network hacking
  • Getting a foothold
  • Privilege escalations
  • Web hacking
  • API hacking
  • Mobile hacking
  • Pentesting
  • Who Should Attend

  • OSCP students
  • IT engineers
  • QA Engineers
  • Pentesters
  • Target Audiences

  • OSCP students
  • IT engineers
  • QA Engineers
  • Pentesters
  • SUDO

    I can not promise this course will find you bugs. I can promise i will leave you with a solid methodology that’s netted me a few nice extra monthly salaries. This method is not guaranteed to work for you. You will need to adept. You will need to work.

    If any course promises you that they WILL find you bugs, run as fast as you can.

    WHOAMI

    My name is uncle rat and i am here to help you take the next step. I am not here to hold your hand, i am here to push you over the edge. You’ve been practicing on pratice platforms for long enough now, don’t you think? It’s time.

    I will provide you with a solid methodology to build upon. I don’t want you to follow in my footsteps, i want you write your own legend. This is after all the place where legends are born.

    Every chapter has at least a video file with slides to download and where applicable a full text PDF with extra information. All extra’s like cheat sheets are seperatly downloadeable for your comfort.

    – The XSS Rat

    CAT ‘goals.txt’

    I can hack, but i can only hack one target at a time. My passion is teaching so why not hit two birds with one stone?

    I created this course because i strongly believe that if i hack 1 target i am just me but if i train 1000 hackers, we are an army.

    This is my goal, i want to make the internet a safer place but i can’t do it alone.

    Who this course is for:

  • Beginner bug bounty hunters who are looking for a solid methodology and mindset

  • Experienced pen-testers looking to get into bug bounties

  • Companies training their cybersecurity staff to withstand even the toughest of logic attacks

  • The course Contains :

  • The basics of networking, the web, and hacking

  • OSCP based enumeration techniques and an attack plan for foothold and priv esc

  • API testing

  • Mobile testing

  • Web application testing

  • And much more

  • Course Curriculum

    Chapter 1: 00×00 Syllabus

    Lecture 1: Syllabus

    Chapter 2: 0x01 – Introduction

    Lecture 1: introduction

    Lecture 2: intro video

    Lecture 3: What is Ethical hacking

    Lecture 4: How to engage a target

    Lecture 5: How to engage a target.mp4

    Lecture 6: @Ch1R0n1n: What it means to be an Ethical Hacker.pdf

    Lecture 7: @Ch1R0n1n: What it means to be an Ethical Hacker.pptx

    Lecture 8: @Ch1R0n1n: What is an Ethical Hacker.mp4

    Lecture 9: Assignment: Lets fuzz hackxpert.com

    Chapter 3: 0x02 -Networking And Web Application basics

    Lecture 1: Web fundamentals Video

    Lecture 2: Web fundamentals

    Lecture 3: Networking fundamentals

    Lecture 4: Assignment: Networking

    Lecture 5: Transferring files.mp4

    Lecture 6: Downloading files

    Lecture 7: Fuzzing

    Chapter 4: 0x03 – Tools

    Lecture 1: Assignment: Using OWASP ZAP

    Lecture 2: Linux CLI

    Lecture 3: Netcat

    Lecture 4: Netcat In depth Article

    Lecture 5: Owasp ZAP

    Lecture 6: DNS in depth

    Lecture 7: DNS

    Lecture 8: Assignment: 00×03 DNS

    Chapter 5: 0x04 Passive information gathering

    Lecture 1: Passive information gathering

    Lecture 2: Passive information gathering.mp4

    Chapter 6: 00×05 Getting a foothold

    Lecture 1: Getting a foothold

    Lecture 2: Directory Busting Video Part

    Lecture 3: Directory Busting PPTX

    Lecture 4: Directory Brute forcing by Uncle rat PDF

    Lecture 5: Working with Exploits

    Lecture 6: Working with Exploits.pptx

    Lecture 7: SMB enum

    Lecture 8: SMB Enumeration.mp4

    Lecture 9: SMB Enumeration slides

    Lecture 10: SNMP enum

    Lecture 11: NFS enum

    Lecture 12: Telnet enum

    Lecture 13: SSH enum

    Lecture 14: FTP Enum

    Lecture 15: FTP Enum

    Lecture 16: FTP Enumeration

    Chapter 7: 00×06 Priviledge escalation

    Lecture 1: Linux priv-esc

    Lecture 2: Linux priv esc PPTX

    Lecture 3: Linux priv esc Article

    Lecture 4: Linux priv esc Ex 1

    Lecture 5: Linux priv esc Ex 2

    Lecture 6: Windows Priv Esc

    Lecture 7: Windows priv esc Article

    Chapter 8: 0x07 Vulnerability scanning

    Lecture 1: Vulnerability scanning

    Lecture 2: Nmap NSE

    Lecture 3: OpenVas

    Lecture 4: Vulnerability scanning 02

    Chapter 9: 0x08 -Buffer overflows

    Lecture 1: Buffer overflows Walkthrough

    Lecture 2: Buffer Overflows PPTX

    Chapter 10: 0x09 Burp suite (Large section)

    Lecture 1: Intro

    Lecture 2: Dashboard + live and passive scans

    Lecture 3: Target tab

    Lecture 4: Proxy tab

    Lecture 5: Intruder

    Lecture 6: Repeater.

    Lecture 7: Sequencer

    Lecture 8: Decoder.

    Lecture 9: Comparer

    Lecture 10: 10 Market place (Plugins)

    Lecture 11: Burp Suite Extender

    Lecture 12: Burp collaborator

    Lecture 13: Burp Authorize

    Lecture 14: Burp Match and replace

    Lecture 15: Burp Suite Content discovery

    Lecture 16: Burp suite Top 5 Proffesional extensions

    Lecture 17: Testing mobile applications with burp suite

    Lecture 18: Burp suite How to use burp to look for SQLi

    Chapter 11: 00×10-00 Introduction to JWT hacking

    Lecture 1: JWT hacking

    Lecture 2: Lab: JWT hacking

    Chapter 12: 00×10-01 Open redirects

    Instructors

  • Ethical hacking and pentesting guide  No.2
    Wesley Thijs
    I am the XSS?Rat
  • Ethical hacking and pentesting guide  No.3
    Brian McGee
    Ch1R0n1n
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 4 votes
  • 3 stars: 13 votes
  • 4 stars: 36 votes
  • 5 stars: 47 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!