back

Hands-on Hacking

Refining your hacking practices and methodology14 H 20 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Breach
    • Overview
    • Breach Scanning and Enumeration
    • Breach Web App Enumeration
    • Breach HTTPS and Wireshark
    • Breach HTTPS and Burp Suite
    • Breach Gaining Access
    • Breach Horizontal Privilege Escalation
    • Breach Vertical Privilege Escalation
  • GoldenEye
    • GoldenEye Scanning and Enumeration
    • GoldenEye Web App Enumeration
    • GoldenEye POP3 Enumeration
    • GoldenEye More Web App and POP3 Enumeration
    • GoldenEye Gaining Access
    • GoldenEye Privilege Escalation
  • Bob
    • Bob Scanning and Enumeration
    • Bob Web App Enumeration
    • Bob Gaining Access
    • Bob Privilege Escalation
    • Bob Privilege Escalation Redux
  • Exploit Development
    • Exploit Development Setup
    • Exploit Development Fuzzing
    • Exploit Development Buffer Offset
    • Exploit Development Bad Characters
    • Exploit Development Code Execution Control
    • Exploit Development Gaining Access
  • Misdirection
    • Misdirection Scanning and Enumeration
    • Misdirection Web App Enumeration
    • Misdirection Access and Priv Esc
    • Misdirection Privilege Escalation Redux
  • WinterMute
    • Straylight Scanning and Enumeration
    • Straylight Web App Enumeration
    • Straylight Gaining Access
    • Straylight Privilege Escalation
    • Neuromancer Scanning and Port Forwarding
    • Neuromancer Web App Enumeration
    • Neuromancer Gaining Access
    • Neuromancer Privilege Escalation
  • Windows Systems: Basic
    • Scanning and Enumeration
    • Win10 Access
    • Post-Compromise Enumeration
    • MS-SQL Access
  • FunBox2
    • FunBox2 Scanning and Enumeration
    • FunBox2 Gaining Access
    • FunBox2 Jail Shell Escape
    • FunBox2 Privilege Escalation

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines(VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome.

You're watching IT ProTV. [MUSIC] >> Welcome to the hands on hacking series brought to you by IT proTV. I will be your host and subject matter expert for this series. My name is Daniel Lowrie, and I've been in IT for a little bit now a little over 20 years. I can't believe it and I've worked as systems administrator. I've worked as a network administrator and I recently here in the last few years of my career, I've really gotten involved with security and it's been a passion of mine. So I really looking forward to working with you on this series. And I wanna start with, the course goals. Why am I doing this? What's the purpose of this course? Well, what I wanna do is help you gain some practical experience and methodology into working with hacking, right. Ethical hacking specifically. So that you can prepare for things like practical hands on exams, such as the OSCP, or the CEH practical exam that they have. A lot of companies are coming up with these practical type of examinations for certification. So having some real experience with doing that thing should be really helpful. So that's why I wanted to put this together for you. Now I wanna do wanna speak as well as to what's in it for you. What are we gonna do? What are we gonna get over, right? Well, we're gonna go over to building a solid hacking methodology. We're not so much gonna focus on tools as we are a method of hacking. That's gonna be the most important thing to take away from this series, as well as pick up some skills maybe, right. Maybe you'll see a thing or two that you've never seen before, could help add to your skill set, right and then you'll also be able to apply your current skills to what we're gonna be doing, right. So you're gonna see how you can take things that you know how to do maybe an injection attack or something to that effect and see an unknown environment, how you would apply that, how would you even know that would be something that you would wanna do. So that's the whole purpose of this kinda give you some practical experience with skills you already have pick up maybe new skill set or two here and there, as well as building that methodology. So that you can consistently work your way through something like a penetration test or an exam that's practical in that vein. Now, I do wanna talk about why I'm excited, actually I wanted to start with that but it seemed like putting the cart before the horse. I'm super excited about doing this because, hacking is fun. It is a passion of mine. I really enjoy doing it. I've been doing it for the last few years now. And there's, it's a thrill and exhilaration a sense of pride that comes from taking some things that you've learned, applying it in a situation that you're completely unknown to you. And overcoming the obstacles and being able to gain access into computers and show looking for those vulnerabilities so that in the end, at the end of the day, you're able to give that information to someone who's able to say, hey, we can fix that and we make the world a more secure place. And I get to share with you good folks out there I get to share whatever knowledge I have with you. The community at large when it comes to security is really giving and really sharing. So I wanna be a part of that I wanna give back to you out there. So if you're studying for an exam or you just wanna gain some more practical knowledge that you've been through a few things like pen test plus or CEH and you want to say can I actually do these things in the real world? What does that look like? Well, that's what this series is meant to help you out with, so that you can work through that stuff. And then I leave it to you, you go out there and you continue on with your hacking experience and gain more. So that's what this is all about. Hopefully you gain a lot of knowledge out of this a lot of experience. You'll hone your craft into something that is as sharp as a razor's edge. So that you can pass exams, gain work and knowledge in that area and give back to the community as well. So we look forward to seeing you in our upcoming episodes. >> Thank you for watching IT pro TV. [MUSIC]

Start training today

Just you? Check out our personal plans

Premium

$529 per seat/per year

2

Total seats

Standard

$349 per seat/per year

2

Total seats

Credit card required

This is for your account.
This is for your account.
We will contact you with this phone number about your trial.
We will contact you with this email about your trial.
What is the name of your company?
In which country is your company located?

Step 1 of 2

Get a demo or a start a team trial