Recruitment of participants Infrastructure & Network Bug Bounty and Penetration Testing

Discussion in 'Reverse Engineering' started by Dron, 2 April 2024.

Stage:
Recruitment of participants
Price:
100.00 USD
Participants':
0 of 10
Organizer:
Dron
0%
Settlement fee for participation:
11 USD
  • (The main list is still empty)

    (Writing to the backup list is prohibited)

  1. Dron

    Dron Well-Known Member
    Staff Member Organizer

    Joined:
    14 September 2019
    Messages:
    2,930
    Likes Received:
    181
    Trophy Points:
    63
    Gender:
    Male
    Location:
    USA
    Infrastructure & Network Bug Bounty and Penetration Testing

    Learn how to hack networks and web applications like black hat hackers and learn how to secure them from these hackers.



    In order to protect yourself from hackers, you must think as one. In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. You will learn hacking tools, methodologies, and techniques. This is a both practical and theoretical step-by-step course.

    This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install the needed software to practice penetration testing on your own machine. In the section, “Introduction to Ethical Hacking, Footprinting and Reconnaissance”, you will learn how to gather information about your target server, you will learn how to discover the DNS server used, open ports and services, unpublished directories, and sensitive files. This information is very important as it increases the chances of being able to successfully gain access to the target website. In the Section, “Scanning Networks, Enumeration and Vulnerabilities and System Hacking”, you will learn how to discover and exploit a large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learn what is the vulnerability, then you will learn how to exploit this vulnerability. Then you will learn how to capture encrypted and unencrypted data, passwords, and such (HTTP, telnet, HTTPS, etc) Moving further in this course, you will understand how to use Metasploit to exploit numerous vulnerabilities and create backdoors. Lastly, you will get into Trojans, Backdoors, Viruses and Worms, Cryptography, Penetration testing on Wireless Networks, and Penetration Testing.

    By the end of the course, you will be able to hack a network or a web application.

    Disclaimer: This course is created only for educational purposes and all the attacks are launched in an isolated lab environment.

    What You Will Learn

    • Understand and perform the basic steps in order to perform a penetration testing of an infrastructure or other computers in the network
    • Be able to gather information about your target
    • You will learn how to find open ports your target
    • You will learn how to find vulnerabilities in your target infrastructure
    • You will learn how to exploit Windows and Linux Systems
    • Understand and perform attacks using Metasploit
    • Understand the penetration testing process
    Prerequisites
    • Basic IT skills
    • Basic knowledge of Linux and/or Windows
    • Understand basic computer networking
    Content

    Chapter 1: Introduction to Ethical Hacking. Footprinting and Reconnaissance
    Chapter 2: Scanning Networks, Enumeration, and Discovering Vulnerabilities
    Chapter 3: System Hacking and Vulnerability Exploitation
    Chapter 4: Basics of Sniffing
    Chapter 5: Metasploit
    Chapter 6: Trojans, Viruses, Backdoors, and Worms
    Chapter 7: Cryptography
    Chapter 8: Penetration Testing on Wireless Networks
    Chapter 9: Penetration Testing Overview. Final Words

    Instructor

    [​IMG]
    Gabriel Avramescu

    Gabriel Avramescu is a Senior Information Security Consultant and an IT Trainer with certifications like OSWE (Offensive Security Web Expert), CREST Registered Penetration Tester (CRT), ECIH (EC-Council Incident Handling), Ec-Council ICS-SCADA Cybersecurity, OSCE (Offensive Security Certified Expert), OSWP (Offensive Security Wireless Professional), OSCP (Offensive Security Certified Professional), CHFI (Computer Hacking Forensic Investigator), ISO 270001 Lead Auditor, ECSA (EC-Council Security Analyst), CEH (Certified Ethical Hacker), CCNA and CCNA Security, CCNP Routing and CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, and Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.