Penetration Testing in Action
Offered By: Pluralsight
Course Description
Overview
This course will teach you about the real world attacks and how to use the same tactics and procedures to defend against them.
This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you'll learn about penetration testing in action. First, you'll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you'll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. Then, using the web server, you'll discover how to pivot to the internal network and compromise internal hosts. Finally, you'll learn how to create a custom payload to bypass the anti-virus and malware protection solution, install a backdoor in the windows client machine, loot the machine, and compromise the domain controller. By the end of this course, you'll learn how to target simple hacks allowing further courses in this series to delve into other vectors, advanced techniques, and more complex scenarios thus engaging you into an adventure style learning path.
This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you'll learn about penetration testing in action. First, you'll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you'll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. Then, using the web server, you'll discover how to pivot to the internal network and compromise internal hosts. Finally, you'll learn how to create a custom payload to bypass the anti-virus and malware protection solution, install a backdoor in the windows client machine, loot the machine, and compromise the domain controller. By the end of this course, you'll learn how to target simple hacks allowing further courses in this series to delve into other vectors, advanced techniques, and more complex scenarios thus engaging you into an adventure style learning path.
Syllabus
- Course Overview 1min
- Course Introduction 3mins
- Setting up Your Virtual Penetration Test Lab 8mins
- Initial Compromise 28mins
- Hunting Internal Targets 24mins
- Owning the Domain 25mins
Taught by
Daniel Teixeira
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network