How to Setup Your Terminal for Penetration Testing
Offered By: HackerSploit via YouTube
Course Description
Overview
Learn how to streamline your penetration testing workflow by leveraging Linux utilities and custom ZSH plugins in this 40-minute video tutorial. Discover techniques for automating your methodology, including setting up ZSH with specialized plugins for pentesting, Nmap scanning, web searching, and utilizing the Quiver plugin. Explore environment variables, web server configuration, and practical applications of these tools to enhance your cybersecurity skillset.
Syllabus
Intro
Preferences
ZShell
Environment Variables
Web Server
Nmap Plugin
Web Search Plugin
DuckDuckGo
Quiver
Using Quiver
Taught by
HackerSploit
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent