TOIT Training

Penetration Testing Linux - Exploit

Penetration Testing Linux - Exploit
  • Overview
  • Curriculum
  • Reviews

 

In this online, instructor led training course students will get a hands-on feel for penetration testing. The instructor goes through many of the tools available through demonstrations allowing you to better understand how exploits work and what exploits you and others can utilize. This course will be useful for any students who are wanting to do penetration testing in the real world.

  • 7 Sections
  • 37 Lessons
  • 2h Duration
Expand All

What is MITRE

1 Lesson
  • Drive-by compromise

What is it?

4 Lessons
  • Watering hole attacks
  • SETookit – Clone websites
  • Malicious advertisements
  • SSLStrip

Exploit public-facing application

14 Lessons
  • Use of software, data, or commands to take advantages of weaknesses
  • Buffer overflows
  • FuzzDB
  • Web exploits
  • Enumeration – Nikto
  • Enumeration – OWASP ZAP
  • Enumeration – Burp
  • WPSploit
  • FIMap
  • Kadabra
  • Liffy
  • SQL injection
  • SQLmap
  • SQLninja

Hardware additions

14 Lessons
  • Computer accessories, computers, or networking hardware may be introduced into a system as a vector to gain exexution
  • Wifi Pineapple
  • MiTM
  • Responder
  • DNSChef
  • MiTMProxy
  • Morpheus
  • SSH MiTM
  • Ettercap
  • Bettercap
  • MiTM wireless
  • Aircrack-ng
  • Wifiti
  • MANA Toolkit

Replication through removable media

2 Lessons
  • Rubber ducky
  • Spearfishing attachment

Unicorn

1 Lesson
  • Spearfishing Link

GoPhish, Phishing Frenzy, SET

1 Lesson
  • Domain monitoring

0

0 Ratings
5 Star 0%
4 Star 0%
3 Star 0%
2 Star 0%
1 Star 0%

Reviews

Free

Start Course

Retake Course

Are you sure you want to retake the course? This action will permanently delete all your progress in this course.

Course Includes

  • Introduction to MITRE
  • Watering hole attacks
  • SSL Strip
  • Buffer overflows
  • Web exploits
  • SQL injection
  • MiTM
  • Spearphishing

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Penetration Testing Linux - Exploit
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)