This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access.
Starting with an overview of the course, you’ll move on to build your virtual lab environment. Next, you’ll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you’ll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you’ll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade.
By the end of this course, you’ll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently.
The resources are placed here: https://github.com/PacktPublishing/Ethical-Hacking---Capture-the-Flag-W…
Become a highly skilled pentester with superior hacking skills
Discover basic tools and techniques used in vulnerability assessment and exploitation
Get to grips with the process and life cycle of pentesting
Understand the hacking methodology
Develop the capability to enhance pentest networks