Offensive Security Pathway - Level 3 Of 6
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.91 GB | Duration: 6h 0m
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.91 GB | Duration: 6h 0m
Offensive Security Lieutenant (OSL) - Now you are really starting to look like a hacker
What you'll learn
Master essential hacking tools like Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.
Understand why and how to perform vulnerability scanning using tools like OpenVAS, Nessus, and Nmap.
Gain insights into basic exploit development using public vulnerabilities and tools like Metasploit and MSFVenom.
Learn to exploit common vulnerabilities in both Windows and Linux systems and gain a foothold into a system.
Develop skills in password cracking techniques using tools like John the Ripper and Hashcat.
And more…
Requirements
If you have intermediate computer skills or have completed Levels 1 and 2 of this course, you should be well-prepared to proceed!
Description
Level 3 of the Offensive Security program, Offensive Security Lieutenant (OSL), focuses on equipping you with the practical tools and techniques used in real-world hacking scenarios. In this course, you'll master essential hacking tools like Nmap for network scanning, Metasploit for automated exploitation, and Burp Suite for web vulnerability assessments. You'll learn how to perform vulnerability scanning on systems using tools such as OpenVAS and Nessus to identify security weaknesses.You'll dive into the basics of exploit development, leveraging publicly known vulnerabilities and tools like Metasploit and MSFVenom to create working exploits. This chapter also focuses on hacking both Windows and Linux systems, teaching you how to exploit common misconfigurations and vulnerabilities in each environment. In addition, you'll explore the fundamentals of password cracking, employing brute force and dictionary attacks with tools like John the Ripper and Hashcat.Web application vulnerability scanning is also a key focus. Learn how vulnerability scanners work, how to identify vulnerabilities and when to use the different mechanics and tools.Whether you’re an aspiring ethical hacker or a security professional seeking to hone your exploitation skills, this course is designed to provide you with the hands-on experience and knowledge you need to take your offensive security skills to the next level.SyllabusBasic Hacking Tools: Overview of entry-level hacking tools such as Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.Introduction to Vulnerability Scanning: Using tools like OpenVAS, Nessus, or Nmap to identify vulnerabilities in systems.Basic Exploit Development: Overview of creating basic exploits using public vulnerabilities and tools like Metasploit and MSFVenom.Hacking Windows: Exploiting common Windows vulnerabilities and misconfigurations for unauthorized access.Hacking Linux: Exploiting Linux-based systems through common vulnerabilities and configuration flaws.Password Cracking: Overview of password cracking techniques such as brute force, dictionary attacks, and tools like John the Ripper and Hashcat.Vulnerability Scanning: Introduction to vulnerability scanning. Learn about the different techniques and tools.
Overview
Section 1: Introductie
Lecture 1 3.1 Intro
Lecture 2 3.2 Chapter & Hacking Tools Introduction
Lecture 3 3.3 Active DNS Enumeration
Lecture 4 3.4 Nmap
Lecture 5 3.5 NetCat
Lecture 6 3.6 RPC
Lecture 7 3.7 NetBIOS
Lecture 8 3.8 SMB
Lecture 9 3.9 FTP
Lecture 10 3.10 SNMP
Lecture 11 3.11 SMTP
Lecture 12 3.12 LolBins
Lecture 13 3.13 Shells
Lecture 14 3.14 Metasploit and Meterpreter
Lecture 15 3.15 Interactive and Non-Interactive Shells
Lecture 16 3.16 Hacking Windows VS Hacking Linux
Lecture 17 3.17 Password Cracking
Lecture 18 3.18 NTLM & Kerberos
Lecture 19 3.19 Vulnerability Scanning
Lecture 20 3.20 Wrapping Up
Aspiring ethical hackers and penetration testers who want to enhance their technical skills.,IT and cybersecurity professionals seeking practical knowledge of vulnerability scanning and exploit development.,Security enthusiasts with a foundational understanding of offensive security eager to start hands-on exploitation.,Web developers interested in understanding how attackers use vulnerability scanners to identify weaknesses.,Anyone looking to improve their basic hacking knowledge.