
From Recon To Report Writing
With more than ten years of experience in teaching, Windows and Linux system administration, software development and ethical hacking I present to you "Perfoming Professional Web Penetration Tests"
This is one of the few ethical hacking courses available worldwide that covers the planning and execution of sophisticated web penetration tests starting off from reconnaissance up until the writing of the final report.
A spiritual successor to "Learn Web Application Penetration Testing From %00", this course will delve much deeper exploting also:
- system administration elements with Docker
- privilege escalation
- manual exploitation of the hardest vulnerabilities
- the drafting of the final report of a professional penetration test
The course also includes:
- An example of a final report of the penetration testing engagement in PDF format
- More than 1'000 solution of vulnerable virtual machines: foothold and privilege escalation attack vectors of more than 2'000 CVE's are included, in two humongous PDF files.
Curriculum
- 1.1 Course Introduction (1:48)
- 1.2 Docker Installation (6:28)
- 1.3 Kali Linux Installation In VirtualBox (8:25)
- 1.4 Installing LAMP On Bitnami (9:51)
- 1.5 Setting Up Mutillidae On Bitnami (3:41)
- 1.6 Setting Up DVWA On Bitnami (5:03)
- 1.7 Installing The Mr Robot VM From Vulnhub (6:39)
- 1.8 Installing Metasploitable3 (4:21)
- 1.9 Testing Methodology (9:54)
- 5.1 Hacking Mr Robot (Linux): Foothold (17:49)
- 5.2 Privilege Escalation Methodologies On Linux (19:18)
- 5.3 Compiling And Executing Kernel Exploits With gcc (18:31)
- 5.4 Vulnhub Sumo (Linux) Solution (20:47)
- 5.5 Hacking Metasploitable3 (Windows) Manually: Foothold (15:32)
- 5.6 Privilege Escalation Methodologies On Windows (25:10)
FAQ
Can I get a refund if I'm not satisfied?
Teachable has a 14-day satisfaction guarantee from the purchase date of any course, it is also possible to pay for the course in three convenient installments.
I have a question about the courses or a technical issue, how can I contact you?
Send me an email at a.gattabuia [at] primeradsec.com.
Can I take the course on a MacBook with an M1 architecture?
Some exploits may not compile with gcc and you’ll need to build them using a PC with an Intel processor; alternatively you can use the UTM hypervisor on Mac.
You can follow the full course with an M1 or M2 processor but the Metasploitable 3 vulnerable virtual machine running Windows Server 2008 needs to be installed on a device with an Intel architecture as it's very unstable even if emulated.