Zero to Hero Pentesting - Enumeration - Kioptrix & Hack The Box
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Welcomes.
- Discussing the lesson plan, Kioptrix, and Hack the Box.
- Using netdiscover to find Kioptrix.
- Scanning with Nessus.
- Scanning with Nmap.
- Reviewing what's found so far.
- Reviewing Nmap scan.
- Enumerating port 80/443.
- Enumerating port 139.
- Enumerating a random HTB machine (OneTwoSeven).
- Giving away a Bash Bunny!.
- User request to review "testssl.sh" tool.
- Do you run Windows as a main OS?.
- Lego Bugattis.
- How old are you, brah?.
- How can I solve HTB and other CTFs?.
- What sort of work did you do day to day on help desk?.
- SANS Holiday Hack challenges.
- Do you find Maltego useful?.
- How do I learn web app?.
- How do blue and red teams interact?.
- User coworker drama.
- Empire vs Metasploit / EternalBlue part 1.
- Automated pentesting?.
- "Hacking" video games.
- CarolinaCon.
- Whats that tattoo?.
- Infinity War/Endgame/GoT discussion.
- CISSP vs Security+.
- EternalBlue part 2 (Troubleshooting a payload).
- Remembering tool flags for interviews.
- Microservices? part 1.
- How Responder works / tactics.
- OSCP registration, pre-reqs, when to purchase, etc..
- Thoughts on MCSA?.
- Microservices part 2.
- Do you plan on taking the AWAE?.
- Thoughts on eLearnSecurity courses?.
- What are some successful study habits?.
- Do you work for a company?.
- Studying revisited.
- What is a MSP?.
- How old were you when you started IT?.
- Would you go back to college in hindsight?.
- Favorite hacker movie?.
Taught by
The Cyber Mentor
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent