Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

NETWORK PENTESTING BY PENTESTER ACADEMY

Alexhost
A 0

Al3xz4ns

Corporal
Member
Access
Joined
Aug 25, 2021
Messages
501
Reaction score
34
Points
28
Age
44
Location
Manila
grants
₲4,751
3 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Go go go
 
K 0

ka2p3r

Transcendent
Member
Joined
Nov 16, 2021
Messages
6
Reaction score
0
Points
1
Age
27
Location
California
grants
₲267
2 years of service
Been reading through your posts, I love the info that you put out. Awesome, and thank you.
 
C 0

cyklone

Transcendent
Member
Joined
Dec 1, 2021
Messages
10
Reaction score
0
Points
1
Age
42
Location
Sweden
grants
₲325
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thank you chief for this courses
 
V 0

V1rust0t@l_027

Transcendent
Member
Joined
Dec 4, 2021
Messages
2
Reaction score
0
Points
1
Age
26
Location
rizal
grants
₲226
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
thanks for sharing
 
D 0

darkreyn

Transcendent
Member
Joined
Dec 4, 2021
Messages
17
Reaction score
2
Points
3
Age
38
Location
philippines
grants
₲479
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
try ko to.salamat
 
Top Bottom