Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)

Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)
English | Size: 217.2 MB
Category: Programming | HACKING | Security

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)
English | Size: 625.90 MB
Category: Tutorial

Welcome to my wifi cracking course, in this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. At the end of the course you will learn how to configure wireless networks to protect it from these attacks. [Read more…]

SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES

SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES
English | Size: 4.46 GB
Category: Security

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization’s defenses and expose it to significant damage. Few security professionals have the skillset to discover, let alone even understand at a fundamental level, why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems. [Read more…]

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing
English | Size: 0.99GB
Category: Tutorial

In this Ethical Hacking – Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. [Read more…]

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017
English | Size: 1.08 GB
Category: CBTs

Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of browsing machines that visited Web sites altered by attackers. In this intermediate to advanced level class, you’ll learn the art of exploiting Web applications so you can find flaws in your enterprise’s Web apps before the bad guys do. Through detailed, hands-on exercises and training from a seasoned professional, you will be taught the four-step process for Web application penetration testing. You will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. You will utilize cross-site scripting attacks to dominate a target infrastructure in our unique hands-on laboratory environment. And you will explore various other Web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen. You will learn the tools and methods of the attacker, so that you can be a powerful defender. [Read more…]

Offensive-Security-PWK-Penetration Testing with Kali tar gz

Offensive-Security-PWK-Penetration Testing with Kali tar gz
English | Size: 657.89 MB
Category: Tutorial

Security Trainning – PTK 2014
360 Pages + videos

0. $!Penetration!Testing:!What!You!Should!Know
1. $!Getting!Comfortable!with!Kali!Linux!.
2. $!The!Essential!Tools!
3. $!Passive!Information!Gathering!
4. $!Active!Information!Gathering!
5. $!Vulnerability!Scanning
6. $!Buffer!Overflows!…
7. $!Win32!Buffer!Overflow!Exploitation! [Read more…]

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO
English | Size: 495.22 MB
Category: CBTs

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: A Penetration Tester?s Guide to Social Engineering, Stephen Haunts and Lars Klint are going to delve into the shadowy world of social engineering. Learn about information gathering pre-texting, and manipulation. By the end of this course you?ll know a wide range of techniques that you can use to protect yourself and your company from a social engineering attack [Read more…]

Penetration Testing Essential Training Malcolm Shore LYNDA

Penetration Testing Essential Training | Malcolm Shore | LYNDA
English | Size: 401.15 MB
Category: Tutorial

You’ve secured your systems, you’ve trained your users, and you’ve fortified your network. Think you’re ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. [Read more…]

Pluralsight – Penetration Testing in Action

Pluralsight – Penetration Testing in Action
English | Size: 177.87 MB
Category: CBTs

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you’ll learn about penetration testing in action. First, you’ll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you’ll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. [Read more…]

Pluralsight – Penetration Testing The Big Picture

Pluralsight – Penetration Testing The Big Picture
English | Size: 180.49 MB
Category: Tutorial

Penetration testing is a highly sought after consulting service and a needed information security professional skill set. This course defines penetration testing and highlights its role in the context of a security management program.
[Read more…]