Oreilly - Ethical Hacking - Networks and Websites
by Sunil Gupta | Publisher: Apress | Release Date: November 2018 | ISBN: 9781484243411
Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites.What You Will LearnExploit your network and perform penetration tests Footprint and scan networks and websites for vulnerabilitiesBe aware of key vulnerabilities to watch out for within your network and websiteWho This Video Is ForNetwork security experts, web security specialists, application security experts, penetration testers, and ethical hackers
- Introduction 00:01:24
- Network Pentesting Lab Setup 00:03:37
- Installing Virtual Machines 00:03:37
- Operating Systems 00:05:01
- Network Footprinting and Scanning 00:01:15
- What is Network Footprinting? 00:01:15
- IP Scanner 00:05:23
- Port Scanning 00:04:49
- Installing Network Vulnerability Scanner 00:04:43
- Using the Network Vulnerability Scanner 00:06:41
- Network Exploitation Techniques 00:01:07
- About Network Exploitation 00:01:07
- Penetration Testing 00:10:05
- Website Footprinting and Scanning 00:02:50
- Website Footprinting Techniques 00:02:50
- Web Vulnerability Scanner 00:09:31
- Website Exploitation Techniques 00:02:27
- Website Vulnerabilities 00:02:27
- Injection Attacks on Websites 00:10:03