back

Hands-on Hacking

Refining your hacking practices and methodology14 H 20 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Breach
    • Overview
    • Breach Scanning and Enumeration
    • Breach Web App Enumeration
    • Breach HTTPS and Wireshark
    • Breach HTTPS and Burp Suite
    • Breach Gaining Access
    • Breach Horizontal Privilege Escalation
    • Breach Vertical Privilege Escalation
  • GoldenEye
    • GoldenEye Scanning and Enumeration
    • GoldenEye Web App Enumeration
    • GoldenEye POP3 Enumeration
    • GoldenEye More Web App and POP3 Enumeration
    • GoldenEye Gaining Access
    • GoldenEye Privilege Escalation
  • Bob
    • Bob Scanning and Enumeration
    • Bob Web App Enumeration
    • Bob Gaining Access
    • Bob Privilege Escalation
    • Bob Privilege Escalation Redux
  • Exploit Development
    • Exploit Development Setup
    • Exploit Development Fuzzing
    • Exploit Development Buffer Offset
    • Exploit Development Bad Characters
    • Exploit Development Code Execution Control
    • Exploit Development Gaining Access
  • Misdirection
    • Misdirection Scanning and Enumeration
    • Misdirection Web App Enumeration
    • Misdirection Access and Priv Esc
    • Misdirection Privilege Escalation Redux
  • WinterMute
    • Straylight Scanning and Enumeration
    • Straylight Web App Enumeration
    • Straylight Gaining Access
    • Straylight Privilege Escalation
    • Neuromancer Scanning and Port Forwarding
    • Neuromancer Web App Enumeration
    • Neuromancer Gaining Access
    • Neuromancer Privilege Escalation
  • Windows Systems: Basic
    • Scanning and Enumeration
    • Win10 Access
    • Post-Compromise Enumeration
    • MS-SQL Access
  • FunBox2
    • FunBox2 Scanning and Enumeration
    • FunBox2 Gaining Access
    • FunBox2 Jail Shell Escape
    • FunBox2 Privilege Escalation

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines(VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome.

Start training today

Just you? Check out our personal plans

Premium

$529 per seat/per year

2

Total seats

Standard

$349 per seat/per year

2

Total seats

Get a demo or a start a team trial

This website uses cookies to enhance the user experience. By using this site and service, you agree to the use of cookies as described in the ITProTV Privacy Policy.