* Cantinho Satkeys

Refresh History
  • yaro-82: 1994
    07 de Setembro de 2025, 16:49
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  43e5r6
    07 de Setembro de 2025, 10:52
  • j.s.: tenham um excelente fim de semana  49E09B4F
    06 de Setembro de 2025, 17:07
  • j.s.: dgtgtr a todos  4tj97u<z
    06 de Setembro de 2025, 17:07
  • FELISCUNHA: Boa tarde pessoal  49E09B4F bom fim de semana  htg6454y
    05 de Setembro de 2025, 14:53
  • JPratas: try65hytr A Todos  4tj97u<z classic k7y8j0
    05 de Setembro de 2025, 03:10
  • cereal killa: dgtgtr pessoal  4tj97u<z
    03 de Setembro de 2025, 15:26
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    01 de Setembro de 2025, 11:36
  • j.s.: de regresso a casa  535reqef34
    31 de Agosto de 2025, 20:21
  • j.s.: try65hytr a todos  4tj97u<z
    31 de Agosto de 2025, 20:21
  • FELISCUNHA: ghyt74   49E09B4e bom fim de semana  4tj97u<z
    30 de Agosto de 2025, 11:48
  • henrike: try65hytr     k7y8j0
    29 de Agosto de 2025, 21:52
  • JPratas: try65hytr Pessoal 4tj97u<z 2dgh8i classic k7y8j0
    29 de Agosto de 2025, 03:57
  • cereal killa: dgtgtr pessoal  2dgh8i
    27 de Agosto de 2025, 12:28
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    24 de Agosto de 2025, 11:26
  • janstu10: reed
    24 de Agosto de 2025, 10:52
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    23 de Agosto de 2025, 12:03
  • joca34: cd Vem dançar Kuduro Summer 2025
    22 de Agosto de 2025, 23:07
  • joca34: cd Kizomba Mix 2025
    22 de Agosto de 2025, 23:06
  • JPratas: try65hytr A Todos e Boas Férias 4tj97u<z htg6454y k7y8j0
    22 de Agosto de 2025, 04:22

Autor Tópico: The Complete Ethical Hacking, Pen Testing System Security  (Lida 147 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 124987
  • Karma: +0/-0
The Complete Ethical Hacking, Pen Testing System Security
« em: 23 de Outubro de 2019, 15:23 »

The Complete Ethical Hacking, Pen Testing : System Security
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 967 MB
Duration: 1.5 hours | Genre: eLearning Video | Language: English
Learn how CPU use registers with the memory also how the vulnerability occurs & how to Exploit it then Learn Malware.

What you'll learn

    Step by step of how to build your own virtual hacking environment & penetration testing Lab
    Step by Step of how to download & install the needed tools
    Learn How to use the immunity debugger for system Application debugging
    Understand how the CPU use the registers with the Stack
    Learn & Understand how the buffer overflow occurs
    Learn how to Use a debugger to examine the crash
    Learn Shellcode & how to generate using MSFVenom
    Identifying bad characters
    Targeting the EIP register & Exploit buffer overflow vulnerability
    Learn & Understand the different types of malware
    Learn How to Use NCAT for getting access on a victim's Computer through internal network
    Learn How to Use reverse connection for getting access through external network (from the internet)
    Learn How to Create a persistent backdoor
    Learn How to Use the Metasploit & meterpreter shell for getting access & control on a system
    A detailed pdf documents are available for deep dive information

Requirements

    No Linux, programming or hacking knowledge required
    Nothing else! It's just you, your computer and your ambition to get started

Description

Welcome to our Course "The Complete Ethical Hacking, Pen Testing : System Security"

This course will take you on a journey of learning and understanding the system fundamentals and deep dive in debugging in order to understand how CPU use registers with the memory also how the buffer overflow vulnerability occurs & how to Exploit it. then learn what malware is, how to create backdoor with NCAT and how you can get control over a system.

Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.

We have designed this course to enable those aspiring to enter the information security field. This course is perfect for anybody who is passionate about developing their skills in the field of Ethical Hacking, Penetration Testing, Cyber Security and Information Security. Also perfect for Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.

No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.

Together, we will walk you through the entire learning process step by step.

Who this course is for:

    Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.
    Anyone preparing for CEH, LPT, OSCP, OSCE etc.
       

               
                               
Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction