Autoplay
Autocomplete
Speed
Previous Lecture
Complete and Continue
Practical Hands On Offensive Penetration Testing - Beginner To Advance Ethical Hacking OSCP Prep
Course Structure
Course Structure & Introduction - How to take best out of this course (4:43)
Installation & Configurination - Kali Linux & Vulnerable VMs
Installation & Configuration (6:56)
Beginner - Reconnaissance - Harvesting Domain and IP Details
Active & Passive Domain Enumeration - Collecting IP details (13:02)
Beginner - Command Injection Exploitation
Command Execution - Bypass security and gain reverse shell (11:56)
Beginner - Local File Inclusion & Remote File Inclusion
Local File Inclusion - Getting Sensitive files from a server (14:34)
Local File Inclusion- Gaing a shell from remote server (7:06)
Remote File Inclusion - Bypass control and gain reverse shell (4:15)
Remote File Inclusion Part - Exploit server remotely and gain reverse shell (10:23)
Beginner - Exploiting File Upload Vulnerability
File Upload - Bypass File restriction - Upload Backdoor -Gain Reverse Shell (21:51)
File Upload - Bypass File Restriction - Ulpoad backoor-Gain reverse shell -Level 2 (11:02)
New Lecture
Beginner - Exploiting XSS Vulnerability
XSS Exploitation - Stealing Victim Credentials (8:36)
XSS Exploitation - Defacing Websites - Stealing Credentails of All Website Users (16:57)
XSS Exploitaton - Stealing Session Cookie -Running Automated scan using ZAP & Burp Suite (9:35)
xss_Exploittation
java script keylogger
xss payload for stealing cookie
Beginner - SQL Injection
SQL Injection - Navigating in Database & Basic Concepts (5:58)
SQL Injection - Exploiting using SQLMap -Dumping Databse - Dumping Tables- User credentials (14:52)
Intermediate - Installation,Configuration & Execution of VA Scan using OpenVAS
Installation of OpenVAS (6:35)
Configuring & Running VA Scan using OpenVAS (7:29)
Intermediate - Veil Framework - BEEF Framework - Maltego
Veil Installation (4:26)
Exploitation using BEEF Framework (20:11)
Intermediate - Learning Metasploit - Exploiting Linux Machines & Escalating Privilege to Root
Metasploit - Exploiting Samba Vulnerability (18:19)
Metasploit - Exploiting IRCd vulnerability (8:03)
Metasploit - Privilege Escalation by exploiting distcc service (25:05)
Linux Privilege Escalation (25:05)
Intermediate - Empire Powershell -Exploiting Windows 10
EMPIRE Powershell-Exploitation Windows 10-Level 1 (16:47)
EMPIRE Poweshell - Exploitation Windows 10 Level 2 (11:49)
EMPIRE Poweshell Exploitation Windows 10 Level-3 (18:04)
Intermediate - Exploit Development - Buffer Overflow
Exploit Development -Buffer Overflow
Intermediate - AD Attack
Attacking & Defending Active Directory -Building AD Lab-1 (3:09)
Attacking & Defending Active Directory -Building AD Lab -2 (4:16)
Attacking & Defending Active Directory - Setting UP Domain Controller (8:45)
Attacking & Defending Active Directory - Setting Up Domain User (7:30)
Attacking & Defending Active Directory - Setting UP Domain User -2 (4:35)
Attacking & Defending Active Directory -Setting Up Domain User-3 (1:02)
Attacking & Defending Active Directory -Setting Up User Domain User-4 (11:12)
Attacking & Defending Active Directory -Joining User System in Domain (8:43)
Attacking & Defending Active Directory - Exploiting LLMNR-NTBIOS Vulnerability (12:45)
Advance - Exploiting Vulnerable Machines and Gaining root access
Exploiting VM 1 Dp (26:10)
Exploiting VM 2 Bp (20:17)
Exploiting VM 3 WW (22:33)
Exploiting VM 4 Djj (42:32)
Exploiting VM 5 SK (28:12)
Exploiting VM 6 MLt (49:33)
Exploiting VM 7 PN (50:52)
Feedback & Comments
Beginner -New
Feedback and Comments
Attacking & Defending Active Directory -Setting Up Domain User-3
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock