Tag: Penetration

Mastering Kali Linux for Advanced Penetration Testing


Free Download Vijay Kumar Velu, "Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th Edition"
English | 2022 | ISBN: 1801819777 | EPUB | pages: 572 | 118.4 mb
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniques

(more…)

Linkedin – Complete Guide to Penetration Testing


Free Download Linkedin – Complete Guide to Penetration Testing
Released: 09/2024
Duration: 7h 11m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 939 MB
Level: Intermediate | Genre: eLearning | Language: English
In this comprehensive course, cybersecurity expert Malcolm Shore provides training in the three key areas of scripting-bash, Python, Powershell-and highlights the use of Kali Linux. Explore the use of basic tools for enumeration, vulnerability detection, and file transfer. Go over testing the different environments that a pen tester will encounter, such as web, cloud, active directory, and wireless. Learn about password brute force and cracking techniques, code injection through SQL, and the use of web and command shells. Discover how the key tools that come with Kali can be used to run exploits and how exploits work. Plus, go over the basics of malware reverse engineering and analysis.

(more…)

PowerShell for Penetration Testing Explore the capabilities of PowerShell for pentesters across multiple platforms


Free Download PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms by Dr Andrew Blyth, Campbell Murray
English | May 24, 2024 | ISBN: 1835082459 | 298 pages | EPUB | 3.90 Mb
A practical guide to vulnerability assessment and mitigation with PowerShell Key FeaturesLeverage PowerShell’s unique capabilities at every stage of the Cyber Kill Chain, maximizing your effectivenessPerform network enumeration techniques and exploit weaknesses with PowerShell’s built-in and custom toolsLearn how to conduct penetration testing on Microsoft Azure and AWS environmentsPurchase of the print or Kindle book includes a free PDF eBookBook Description

(more…)