Oreilly - Cybersecurity Attacks (Red Team Activity) - 9781788478878
Oreilly - Cybersecurity Attacks (Red Team Activity)
by Sergii Nesterenkos | Publisher: Packt Publishing | Release Date: February 2018 | ISBN: 9781788478878


Learn about the different kinds of cyber attacks and how they can be executedAbout This VideoA comprehensive and easy-to-use guide to help you get a deep understanding of the most common cyber attacks in the quickest wayIt includes a wide range of hacker techniques and shows them in detailIt uncovers a lot of professional secrets that hackers don't want you to knowIn DetailThere is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we'll discover the third vector of attacks: humans.Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today.By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them
  1. Chapter 1 : Building Our Lab
    • The Course Overview 00:06:42
    • What is Kali Linux and Why We Should Use it 00:03:29
    • Installing Kali Linux on Virtual Machine 00:06:19
    • Getting Acquainted with Kali Linux Easy Way 00:09:09
    • Getting Acquainted with Terminal Commands 00:07:52
    • Tune Up Python 00:03:58
    • Installing Metasploitable 2 on Virtual Machine 00:07:39
  2. Chapter 2 : Attacking a Network
    • Network Attack Vectors 00:02:59
    • Hidden Scanning Ports with Nmap 00:08:53
    • Scanning the Network with OpenVas 00:07:40
    • Intercepting Traffic with Wireshark 00:05:30
    • Types of man-in-the-middle Attack 00:05:20
    • Taking Control Over Target Browser with BeEf 00:11:09
    • Creating Reverse Shell with Metasploit 00:09:29
    • Leaving a Backdoor in the Target Machine 00:04:37
    • Advanced-Level Hacking - Scanning Hosts with Python Script 00:06:18
  3. Chapter 3 : Website and Web-Application Attacks
    • Exploring Target with Browser 00:06:08
    • Scanning Web-Application with OWASP ZAP 00:05:30
    • Breaking Database with SQL Injection 00:03:01
    • Manual Testing for SQL Injection 00:08:11
    • Executing SQL Injection with SQLmap 00:05:20
    • Proxy Attack with Burp Suite 00:08:09
    • Executing a Session Hijacking 00:06:05
    • Infecting Website with Stored XSS 00:06:13
    • Executing Reflected XSS 00:04:26
    • Using Python Script to Find Vulnerabilities 00:04:55
  4. Chapter 4 : Hacking the Human in a Cyber Crime Attack
    • Social Engineering Techniques 00:03:37
    • Making a Phishing Email with SET 00:06:12
    • Creating a Malicious File with SET 00:05:12
    • Creating and Delivering Malicious USB Card 00:03:53
    • Learning Spear-Phishing Methods for VIP 00:05:39
    • Gathering Emails and Phone Numbers with Maltego 00:06:32
    • Looking for Secrets in Social Media with Online Tools 00:06:17
    • Playing on Human Emotions and Weaknesses to Get the Information 00:05:46
    • How to Hack Without Getting in Touch with a Target 00:07:22
  5. Oreilly - Cybersecurity Attacks (Red Team Activity)


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss