Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Post Exploitation Hacking

via Cybrary

Description

In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.

Tags

Syllabus

  • Section 1
    • Post Exploitation Hacking Introduction
    • Basics of Networking Mac & IP Addressing
    • Basics of Networking - Tcp; Udp; Icmp
    • Basics of Networking - Headers
    • Introduction Information Gathering
  • Section 2
    • Linux Host Information Gathering (part 1) Ifconfig
    • Linux Host Information Gathering (part 2) netstat
    • Linux Host Information Gathering (part 3) Nsswitch.conf.info
    • Linux Tools Lab (part 1) Ifconfig, Arp, Netstat
    • Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch
    • Linux Scanning Lab
    • Linux Network Information Gathering Lecture (part 1)
    • Linux Network Information Gathering Lecture (part 2)
    • Linux Sniffing
    • Windows Host Tools (part 1)
    • Windows Host Information Gathering Lecture
    • Windows Host Tools (part 2)
    • Windows Network Tools Lab
    • Windows Network Information Gathering Lecture (part 1)
    • Windows Network Information Gathering Lecture (part 2)
    • Windows Network Information Gathering Lecture (part 3)
  • Section 3
    • Introduction Part 3 Persistence & Backdooring
    • Tftp Use Lab
    • Enabling Rdp Windows Lab
    • Rdp Lecture
    • Ncat Backdoor Lecture
    • Windows Ncat Backdoor Lab
    • New User Backdoor Lecture
    • Windows New User Backdoor Lab
    • Batch Schtasks At (part 1)
    • Batch Schtasks At (part 2) Windows Scheduling
    • Linux Bash History - Touch - Lab
  • Section 4
    • Linux Bash History - Covering Tracks
    • Password Cracking Concepts
    • Windows Logs, Timestamps, & Passwords Lecture
    • Windows Clearing Event Logs
    • Windows Passwords
    • Conclusion

Online Course


Post Exploitation Hacking

via Cybrary
Affiliate notice

In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.

  • Section 1
    • Post Exploitation Hacking Introduction
    • Basics of Networking Mac & IP Addressing
    • Basics of Networking - Tcp; Udp; Icmp
    • Basics of Networking - Headers
    • Introduction Information Gathering
  • Section 2
    • Linux Host Information Gathering (part 1) Ifconfig
    • Linux Host Information Gathering (part 2) netstat
    • Linux Host Information Gathering (part 3) Nsswitch.conf.info
    • Linux Tools Lab (part 1) Ifconfig, Arp, Netstat
    • Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch
    • Linux Scanning Lab
    • Linux Network Information Gathering Lecture (part 1)
    • Linux Network Information Gathering Lecture (part 2)
    • Linux Sniffing
    • Windows Host Tools (part 1)
    • Windows Host Information Gathering Lecture
    • Windows Host Tools (part 2)
    • Windows Network Tools Lab
    • Windows Network Information Gathering Lecture (part 1)
    • Windows Network Information Gathering Lecture (part 2)
    • Windows Network Information Gathering Lecture (part 3)
  • Section 3
    • Introduction Part 3 Persistence & Backdooring
    • Tftp Use Lab
    • Enabling Rdp Windows Lab
    • Rdp Lecture
    • Ncat Backdoor Lecture
    • Windows Ncat Backdoor Lab
    • New User Backdoor Lecture
    • Windows New User Backdoor Lab
    • Batch Schtasks At (part 1)
    • Batch Schtasks At (part 2) Windows Scheduling
    • Linux Bash History - Touch - Lab
  • Section 4
    • Linux Bash History - Covering Tracks
    • Password Cracking Concepts
    • Windows Logs, Timestamps, & Passwords Lecture
    • Windows Clearing Event Logs
    • Windows Passwords
    • Conclusion