Pentesting for N00bs - Lame
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Dive into the second episode of a penetration testing tutorial series focused on exploiting a vulnerable machine named "Lame" on Hack The Box. Learn how to conduct an nmap scan, interpret results, enumerate SMB vulnerabilities, exploit the username map script, perform Linux post-exploitation enumeration, and investigate FTP and open ports. Gain practical insights into ethical hacking techniques and tools used by cybersecurity professionals to identify and address system weaknesses.
Syllabus
- Introduction.
- Spinning up HTB's Lame.
- Starting nmap scan / discussing alternative scan ideas.
- Reviewing our scan results.
- Enumerating SMB.
- Exploiting SMB via username map script.
- Linux post exploitation enumeration ideas.
- Enumerating FTP and open ports.
Taught by
The Cyber Mentor
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX