Book Image

Ethical Hacking - Capture the Flag Walkthroughs - v2 [Video]

By : Cliff Krahenbill
4 (1)
Book Image

Ethical Hacking - Capture the Flag Walkthroughs - v2 [Video]

4 (1)
By: Cliff Krahenbill

Overview of this book

Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world. You know that all hackers use no specific step-by-step methodology, a typical hacking process comprises of few steps and in this course, you will apply these steps which are footprinting, scanning, enumeration, system hacking, escalation of privilege, covering tracks, and planting backdoors with the help of real-world examples. You will get up to speed with Python, PHP scripting, and more. As you progress, you will be guided through each of the Capture-The-Flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You will also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers. By the end of this course, you will have gained a solid understanding of ethical hacking and how to use the essential pentesting tools in the real world. All the resource files are available at the GitHub repository at: https://github.com/PacktPublishing/Ethical-Hacking---Capture-the-Flag-Walkthroughs---v2-
Table of Contents (6 chapters)
Chapter 6
CTF Walkthrough – SickOS 1.1
Content Locked
Section 1
Lab Preparation
This video demonstrates how to prepare your Virtual Box lab environment for the CTF exercise.