* Cantinho Satkeys

Refresh History
  • cereal killa:
    19 de Abril de 2025, 21:17
  • j.s.: tenham uma Santa e Feliz Páscoa  49E09B4F 49E09B4F 49E09B4F
    19 de Abril de 2025, 18:19
  • j.s.:
    19 de Abril de 2025, 18:19
  • j.s.: dgtgtr a todos  4tj97u<z 4tj97u<z
    19 de Abril de 2025, 18:15
  • FELISCUNHA: Uma santa sexta feira para todo o auditório  4tj97u<z
    18 de Abril de 2025, 11:12
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    18 de Abril de 2025, 03:28
  • cereal killa: try65hytr malta  classic 2dgh8i
    14 de Abril de 2025, 23:14
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    13 de Abril de 2025, 11:45
  • j.s.: e um bom domingo de Ramos  43e5r6 43e5r6
    11 de Abril de 2025, 21:02
  • j.s.: tenham um excelente fim de semana  49E09B4F
    11 de Abril de 2025, 21:01
  • j.s.: try65hytr a todos  4tj97u<z
    11 de Abril de 2025, 21:00
  • JPratas: try65hytr  y5r6t Pessoal  classic k7y8j0
    11 de Abril de 2025, 04:15
  • JPratas: dgtgtr A Todos  4tj97u<z classic k7y8j0
    10 de Abril de 2025, 18:29
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    09 de Abril de 2025, 11:59
  • cereal killa: try65hytr pessoal  2dgh8i
    08 de Abril de 2025, 23:21
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  43e5r6
    06 de Abril de 2025, 11:13
  • cccdh: Ola para todos!
    04 de Abril de 2025, 23:41
  • j.s.: tenham um excelente fim de semana  49E09B4F
    04 de Abril de 2025, 21:10
  • j.s.: try65hytr a todos  4tj97u<z
    04 de Abril de 2025, 21:10
  • FELISCUNHA: dgtgtr pessoal  49E09B4F  bom fim de semana  4tj97u<z
    04 de Abril de 2025, 14:29

Autor Tópico: The Complete Ethical Hacking, Pen Testing System Security  (Lida 116 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 118965
  • Karma: +0/-0
The Complete Ethical Hacking, Pen Testing System Security
« em: 23 de Outubro de 2019, 15:23 »

The Complete Ethical Hacking, Pen Testing : System Security
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 967 MB
Duration: 1.5 hours | Genre: eLearning Video | Language: English
Learn how CPU use registers with the memory also how the vulnerability occurs & how to Exploit it then Learn Malware.

What you'll learn

    Step by step of how to build your own virtual hacking environment & penetration testing Lab
    Step by Step of how to download & install the needed tools
    Learn How to use the immunity debugger for system Application debugging
    Understand how the CPU use the registers with the Stack
    Learn & Understand how the buffer overflow occurs
    Learn how to Use a debugger to examine the crash
    Learn Shellcode & how to generate using MSFVenom
    Identifying bad characters
    Targeting the EIP register & Exploit buffer overflow vulnerability
    Learn & Understand the different types of malware
    Learn How to Use NCAT for getting access on a victim's Computer through internal network
    Learn How to Use reverse connection for getting access through external network (from the internet)
    Learn How to Create a persistent backdoor
    Learn How to Use the Metasploit & meterpreter shell for getting access & control on a system
    A detailed pdf documents are available for deep dive information

Requirements

    No Linux, programming or hacking knowledge required
    Nothing else! It's just you, your computer and your ambition to get started

Description

Welcome to our Course "The Complete Ethical Hacking, Pen Testing : System Security"

This course will take you on a journey of learning and understanding the system fundamentals and deep dive in debugging in order to understand how CPU use registers with the memory also how the buffer overflow vulnerability occurs & how to Exploit it. then learn what malware is, how to create backdoor with NCAT and how you can get control over a system.

Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.

We have designed this course to enable those aspiring to enter the information security field. This course is perfect for anybody who is passionate about developing their skills in the field of Ethical Hacking, Penetration Testing, Cyber Security and Information Security. Also perfect for Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.

No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.

Together, we will walk you through the entire learning process step by step.

Who this course is for:

    Anyone Planning to be Ethical Hacker, Penetration Tester, Reverse Engineer, Malware Analyst, Security consultants, etc.
    Anyone preparing for CEH, LPT, OSCP, OSCE etc.
       

               
                               
Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction