Hands-on Hacking
Refining your hacking practices and methodology14 H 20 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Breach
- Overview
- Breach Scanning and Enumeration
- Breach Web App Enumeration
- Breach HTTPS and Wireshark
- Breach HTTPS and Burp Suite
- Breach Gaining Access
- Breach Horizontal Privilege Escalation
- Breach Vertical Privilege Escalation
- GoldenEye
- GoldenEye Scanning and Enumeration
- GoldenEye Web App Enumeration
- GoldenEye POP3 Enumeration
- GoldenEye More Web App and POP3 Enumeration
- GoldenEye Gaining Access
- GoldenEye Privilege Escalation
- Bob
- Bob Scanning and Enumeration
- Bob Web App Enumeration
- Bob Gaining Access
- Bob Privilege Escalation
- Bob Privilege Escalation Redux
- Exploit Development
- Exploit Development Setup
- Exploit Development Fuzzing
- Exploit Development Buffer Offset
- Exploit Development Bad Characters
- Exploit Development Code Execution Control
- Exploit Development Gaining Access
- Misdirection
- Misdirection Scanning and Enumeration
- Misdirection Web App Enumeration
- Misdirection Access and Priv Esc
- Misdirection Privilege Escalation Redux
- WinterMute
- Straylight Scanning and Enumeration
- Straylight Web App Enumeration
- Straylight Gaining Access
- Straylight Privilege Escalation
- Neuromancer Scanning and Port Forwarding
- Neuromancer Web App Enumeration
- Neuromancer Gaining Access
- Neuromancer Privilege Escalation
- Windows Systems: Basic
- Scanning and Enumeration
- Win10 Access
- Post-Compromise Enumeration
- MS-SQL Access
- FunBox2
- FunBox2 Scanning and Enumeration
- FunBox2 Gaining Access
- FunBox2 Jail Shell Escape
- FunBox2 Privilege Escalation
Overview
4 M



- Episode Description
- Transcript
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines(VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome.