Offensive Security Pathway - Level 3 Of 6

Posted By: ELK1nG
Offensive Security Pathway - Level 3 Of 6

Offensive Security Pathway - Level 3 Of 6
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.91 GB | Duration: 6h 0m

Offensive Security Lieutenant (OSL) - Now you are really starting to look like a hacker

What you'll learn

Master essential hacking tools like Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.

Understand why and how to perform vulnerability scanning using tools like OpenVAS, Nessus, and Nmap.

Gain insights into basic exploit development using public vulnerabilities and tools like Metasploit and MSFVenom.

Learn to exploit common vulnerabilities in both Windows and Linux systems and gain a foothold into a system.

Develop skills in password cracking techniques using tools like John the Ripper and Hashcat.

And more…

Requirements

If you have intermediate computer skills or have completed Levels 1 and 2 of this course, you should be well-prepared to proceed!

Description

Level 3 of the Offensive Security program, Offensive Security Lieutenant (OSL), focuses on equipping you with the practical tools and techniques used in real-world hacking scenarios. In this course, you'll master essential hacking tools like Nmap for network scanning, Metasploit for automated exploitation, and Burp Suite for web vulnerability assessments. You'll learn how to perform vulnerability scanning on systems using tools such as OpenVAS and Nessus to identify security weaknesses.You'll dive into the basics of exploit development, leveraging publicly known vulnerabilities and tools like Metasploit and MSFVenom to create working exploits. This chapter also focuses on hacking both Windows and Linux systems, teaching you how to exploit common misconfigurations and vulnerabilities in each environment. In addition, you'll explore the fundamentals of password cracking, employing brute force and dictionary attacks with tools like John the Ripper and Hashcat.Web application vulnerability scanning is also a key focus. Learn how vulnerability scanners work, how to identify vulnerabilities and when to use the different mechanics and tools.Whether you’re an aspiring ethical hacker or a security professional seeking to hone your exploitation skills, this course is designed to provide you with the hands-on experience and knowledge you need to take your offensive security skills to the next level.SyllabusBasic Hacking Tools: Overview of entry-level hacking tools such as Nmap, Metasploit, and Burp Suite for vulnerability assessment and exploitation.Introduction to Vulnerability Scanning: Using tools like OpenVAS, Nessus, or Nmap to identify vulnerabilities in systems.Basic Exploit Development: Overview of creating basic exploits using public vulnerabilities and tools like Metasploit and MSFVenom.Hacking Windows: Exploiting common Windows vulnerabilities and misconfigurations for unauthorized access.Hacking Linux: Exploiting Linux-based systems through common vulnerabilities and configuration flaws.Password Cracking: Overview of password cracking techniques such as brute force, dictionary attacks, and tools like John the Ripper and Hashcat.Vulnerability Scanning: Introduction to vulnerability scanning. Learn about the different techniques and tools.

Overview

Section 1: Introductie

Lecture 1 3.1 Intro

Lecture 2 3.2 Chapter & Hacking Tools Introduction

Lecture 3 3.3 Active DNS Enumeration

Lecture 4 3.4 Nmap

Lecture 5 3.5 NetCat

Lecture 6 3.6 RPC

Lecture 7 3.7 NetBIOS

Lecture 8 3.8 SMB

Lecture 9 3.9 FTP

Lecture 10 3.10 SNMP

Lecture 11 3.11 SMTP

Lecture 12 3.12 LolBins

Lecture 13 3.13 Shells

Lecture 14 3.14 Metasploit and Meterpreter

Lecture 15 3.15 Interactive and Non-Interactive Shells

Lecture 16 3.16 Hacking Windows VS Hacking Linux

Lecture 17 3.17 Password Cracking

Lecture 18 3.18 NTLM & Kerberos

Lecture 19 3.19 Vulnerability Scanning

Lecture 20 3.20 Wrapping Up

Aspiring ethical hackers and penetration testers who want to enhance their technical skills.,IT and cybersecurity professionals seeking practical knowledge of vulnerability scanning and exploit development.,Security enthusiasts with a foundational understanding of offensive security eager to start hands-on exploitation.,Web developers interested in understanding how attackers use vulnerability scanners to identify weaknesses.,Anyone looking to improve their basic hacking knowledge.