Video description
Explore video and laboratory walkthroughs for capture-the-flag exercises that will help strengthen your ethical hacking skills
About This Video
- Create a virtual install of Kali Linux using VirtualBox
- Go from beginner to intermediate level in DerPNStink
- Delve into the Stapler walkthrough
In Detail
This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access.
Starting with an overview of the course, you’ll move on to build your virtual lab environment. Next, you’ll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you’ll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you’ll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade.
By the end of this course, you’ll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently.
Publisher resources
Table of contents
-
Chapter 1 : Course Overview
- Course Overview 00:04:58
- Chapter 2 : Building your Virtual Lab Environment
- Chapter 3 : CTF - Easy Beginner Level - Basic Pentest
- Chapter 4 : CTF - Beginner to Intermediate Level - DeRPnStiNK
- Chapter 5 : CTF - Beginner to Intermediate level - Stapler
- Chapter 6 : CTF - Intermediate Level - Mr.Robot
Product information
- Title: Ethical Hacking - Capture the Flag Walkthroughs - v1
- Author(s):
- Release date: September 2020
- Publisher(s): Packt Publishing
- ISBN: 9781800565029
You might also like
video
From Zero to Ethical Hacker: 10 Weeks to Becoming an Ethical Hacker and Bug Hunter
These videos are companion files meant to be used with the Learning Path: From Zero to …
video
Metasploit Unleashed: Build defense against complex attacks
Add superior end-to-end security to your network using Metasploit About This Video Gain the skills to …
video
The Complete Ethical Hacking Course
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …