Explore advanced penetration testing tools and techniques used to find vulnerabilities, sniff network traffic, deal with cryptography, and crack passwords in this 14-video course. Learners will discover common techniques used to find weaknesses in both Linux and Windows-based systems. Key concepts covered here include finding vulnerability by using scanners and other techniques; how to capture and analyze network traffic with Wireshark; and learning about wireless security technologies, such as WEP, WPA/2/3, and their vulnerabilities. Continue by learning about cryptography and its four goals; learning to differentiate between symmetric and asymmetric cryptography; and learning how to choose a password cracking technique. Next, learn to differentiate between malware types and recognize the consequences of using targeted malware; learn to differentiate between scanning and enumeration; and learn the benefits of using Python to build scripts and deliver exploits. Then perform Linux privilege escalation with a penetration tester; perform Windows privilege escalation to exploit a Windows system by using the AlwaysInstallElevated technique; and use PowerShell to perform pen testing tasks such as reporting on all USB devices installed.
describe how to find a vulnerability using scanners and other techniques
capture and analyze network traffic using Wireshark
recognize wireless security technologies such as WEP, WPA/2/3, and the vulnerabilities they have that could be exploited
describe cryptography and its four goals
differentiate between symmetric and asymmetric cryptography
recognize how to choose a password cracking technique
differentiate between malware types and recognize some of the consequences of using targeted malware
differentiate between scanning and enumeration
recognize the benefits of using Python to build scripts and deliver exploits
perform Linux privilege escalation via writeable /etc/passwd file
perform Windows privilege escalation to exploit a Windows system using the AlwaysInstallElevated technique
use PowerShell to perform pen testing tasks such as reporting on all USB devices installed, killing processes, and using PSDrive to view objects in WindowsÂ