Packt – Metasploit Penetration Testing Recipes

Packt – Metasploit Penetration Testing Recipes
English | Size:
Category: HACKING | Linux | Security

Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework [Read more…]

SANS 560 – Network Penetration Testing and Ethical Hacking 2017 PDF only

SANS 560 – Network Penetration Testing and Ethical Hacking 2017 PDF only
English | Size: 97.56 MB
Category: Tutorial

As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560, the flagship SANS course for penetration testing, fully arms you to address this duty head-on. [Read more…]

Packt – Kali Linux Advanced Wireless Penetration Testing

Packt – Kali Linux Advanced Wireless Penetration Testing-XQZT
English | Size: 1.12 GB
Category: Wireless

Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
Kali Linux is a Debian-based Linux distribution designed primarily for Penetration Testing and Digital Forensics. It gives access to a large collection of security-related tools for professional security testing.
[Read more…]

Packt – Kali Linux Advanced Wireless Penetration Testing

Packt – Kali Linux Advanced Wireless Penetration Testing-XQZT
English | Size: 1.12 GB
Category: Wireless

Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
Kali Linux is a Debian-based Linux distribution designed primarily for Penetration Testing and Digital Forensics. It gives access to a large collection of security-related tools for professional security testing.
[Read more…]

SANS 660-Advanced Penetration Testing Exploit Writing And Ethical Hacking 2011-2014

SANS 660-Advanced Penetration Testing Exploit Writing And Ethical Hacking-2011-2014
English | Size: 3.35 GB
Category: HACKING | Security

SANS.660-Advanced.Penetration.Testing.Exploit.Writing.And.Ethical.Hacking
Year: 2011-2014
SEC660 starts off by introducing advanced penetration concepts and providing an overview to prepare students for what lies ahead. The focus of day one is on network attacks, an area often left untouched by testers. Topics include accessing, manipulating, and exploiting the network. Attacks are performed against NAC, VLANs, OSPF, 802.1X, CDP, IPv6, VOIP, SSL, ARP, SNMP, and others. Day two starts with a technical module on performing penetration testing against various cryptographic implementations, then turns to PowerShell and post exploitation, escaping Linux restricted environments and Windows restricted desktop environments. Day three jumps into an introduction of Python for penetration testing, Scapy for packet crafting, product security testing, network and application fuzzing, and code coverage techniques. Days four and five are spent exploiting programs on the Linux and Windows operating systems. You will learn to identify privileged programs, redirect the execution of code, reverse-engineer programs to locate vulnerable code, obtain code execution for administrative shell access, and defeat modern operating system controls such as ASLR, canaries, and DEP using ROP and other techniques. Local and remote exploits as well as client-side exploitation techniques are covered. The final course day is devoted to numerous penetration testing challenges that require students to solve complex problems and capture flags. [Read more…]

Linkedin – Learning Android App Penetration Testing

Linkedin – Learning Android App Penetration Testing-SHEPHERDS
English | Size: 254.51 MB
Category: CBTs

Android applications are exposed to a variety of security risks that threaten the integrity of your apps and the safety of your end users. In this course, join instructor Prashant Pandey as he shares a structured, comprehensive approach for testing Android apps to uncover some of the most common of these vulnerabilities, demonstrating how to leverage key pen testing tools and frameworks along the way. Prashant starts with the basics, covering the essential aspects of Android pen testing. He then delves into four major tools and frameworks-MobSF, Burp Suite, Android Debug Bridge (adb), and drozer-each catering to one specific aspect of Android app security. Learn how to approach network communication security, static and dynamic application testing, platform integration testing, and more. [Read more…]

Udemy – Penetration Testing From Scratch – Ethical Hacking Course

Udemy – Penetration Testing From Scratch – Ethical Hacking Course
English | Size: 1.72 GB
Category: E-learning | HACKING | Linux | Security

Discover How Things Work In Industry Environment… Gain the ability to perform a full penetration test from scratch with Industry Standard Methodology and Make Professional Grade Reports.

Companies are looking for people who know how to work, they don’t care if you hold 10 certifications but no knowledge. They are not here to invest in you so that you can learn, What they care about is the WORK! [Read more…]

Pluralsight – Penetration Testing of Identity Authentication and Authorization Mechanism-XQZT

Pluralsight – Penetration Testing of Identity Authentication and Authorization Mechanism-XQZT
English | Size: 133.80 MB
Category: Tutorial


Learn how you can perform web application penetration testing on a website’s Identity Management, Authentication and Authorization mechanism and help organizations view their security posture before a malicious hacker exploits them. [Read more…]

Pluralsight – Penetration Testing Life Cycle Explained

Pluralsight – Penetration Testing Life Cycle Explained
English | Size: 264.54 MB
Category: Tutorial


Are you worried about vulnerabilities facing your business, network, or home? In this course, Penetration Testing Life Cycle Explained, you’ll develop an understanding of the ins and outs of penetration testing. First, you’ll begin by learning a basic overview of the life cycle of penetration testing from getting the documentation ready, to the legal aspects. Next, you’ll explore the specific different phases of penetration testing, including planning, discovery, and enumeration. Finally, you’ll learn valuable tools and resources to aid in being a successful and correct penetration tester. By the end of this course, you’ll have the necessary knowledge to embark on a deeper dive into penetration testing. [Read more…]

PluralSight – Penetration Testing with the Metasploit Framework

PluralSight – Penetration Testing with the Metasploit Framework
English | Size: 281.67 MB
Category: Programming | Cloud-Comp | E-learning | HACKING | Security | Wireless | others


Penetration Testing with the Metasploit Framework
by Gus Khawaja
For professional penetration testers who want to take their skills to the next level using the Metasploit framework. This is a hands-on course that will show you in a different angle the penetration testing workflow and how to apply it in practice. [Read more…]