Finding and Exploiting Hidden Vulnerabilities

Finding and Exploiting Hidden Vulnerabilities
Finding and Exploiting Hidden Vulnerabilities
English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 2h 31m | 764 MB

Knowing Pentesting better. Dive into the world of Advanced Network Penetration Testing

When learning about penetration testing, vulnerability assessments play an important role, followed by exploiting the vulnerabilities identified. Finally, everything needs to be documented properly to present to the client. This course focuses on all these elements of the VAPT activity.

Courses focused on teaching Vulnerability Assessment and Penetration Testing sometimes miss out on essential elements such as documentation. Keeping this in mind, the course module has been developed to help you understand the process of VAPT step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas.

After finding the vulnerabilities, the next step for a pentester is to try to exploit those vulnerabilities to show the consequences, and nothing is better for this than Metasploit Framework. This being said you’ll also learn about many key features of Metasploit Framework and use it to exploit the vulnerabilities on the target device/machine.

Finally, you’ll understand why you need to document everything done during the activity. By the end of this course, you’ll have a good understanding of the approach to follow when doing VAPT for any client.

What You Will Learn

  • Explore well-known tools such as Nessus and OpenVas to perform vulnerability assessments
  • See how to export the scan results and analyze them
  • Get familiar with Metasploit Framework and its modules such as Exploits and Payloads
  • Import Nessus results in Metasploit and perform targeted exploitation
  • Dive deep into Metasploit modules to perform various types of scans
  • Create custom backdoors using Msfvenom and Encoders
  • Exploit the target using well-known applications such as MS Office documents and PDF documents
  • Document the findings of the VAPT activity to prepare an impressive report
Table of Contents

01 The Course Overview
02 Installing Nessus Vulnerability Scanner
03 Using Nessus
04 Exporting Nessus Output
05 Installing OpenVas
06 Using OpenVas
07 Setting up Metasploit
08 Understanding Payloads and Exploits
09 Importing Nessus Results
10 Scanning with Metasploit
11 Metasploit Interfaces
12 Using Meterpreter
13 Creating Custom Backdoors for Different Platforms
14 Msfvenom
15 Encoders
16 Exploiting MS Office and PDF Documents
17 Social Engineering Toolkit
18 Recap of Scope
19 Information Gathered
20 Vulnerabilities Identified
21 Exploitable Vulnerabilities
22 Documentation