YoVDO

Post Exploitation Hacking

Offered By: Cybrary

Tags

Ethical Hacking Courses Cybersecurity Courses Metasploit Courses Information Gathering Courses Meterpreter Courses

Course Description

Overview

In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.


Syllabus

  • Section 1
    • Post Exploitation Hacking Introduction
    • Basics of Networking Mac & IP Addressing
    • Basics of Networking - Tcp; Udp; Icmp
    • Basics of Networking - Headers
    • Introduction Information Gathering
  • Section 2
    • Linux Host Information Gathering (part 1) Ifconfig
    • Linux Host Information Gathering (part 2) netstat
    • Linux Host Information Gathering (part 3) Nsswitch.conf.info
    • Linux Tools Lab (part 1) Ifconfig, Arp, Netstat
    • Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch
    • Linux Scanning Lab
    • Linux Network Information Gathering Lecture (part 1)
    • Linux Network Information Gathering Lecture (part 2)
    • Linux Sniffing
    • Windows Host Tools (part 1)
    • Windows Host Information Gathering Lecture
    • Windows Host Tools (part 2)
    • Windows Network Tools Lab
    • Windows Network Information Gathering Lecture (part 1)
    • Windows Network Information Gathering Lecture (part 2)
    • Windows Network Information Gathering Lecture (part 3)
  • Section 3
    • Introduction Part 3 Persistence & Backdooring
    • Tftp Use Lab
    • Enabling Rdp Windows Lab
    • Rdp Lecture
    • Ncat Backdoor Lecture
    • Windows Ncat Backdoor Lab
    • New User Backdoor Lecture
    • Windows New User Backdoor Lab
    • Batch Schtasks At (part 1)
    • Batch Schtasks At (part 2) Windows Scheduling
    • Linux Bash History - Touch - Lab
  • Section 4
    • Linux Bash History - Covering Tracks
    • Password Cracking Concepts
    • Windows Logs, Timestamps, & Passwords Lecture
    • Windows Clearing Event Logs
    • Windows Passwords
    • Conclusion

Taught by

Joe Perry

Related Courses

Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
The Complete Penetration Testing Bootcamp
Udemy
Don's Introduction to Ethical Hacking for Beginners
Udemy
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy