Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

NETWORK PENTESTING BY PENTESTER ACADEMY

Alexhost
K 0

KAITOPH

Transcendent
Member
Joined
Dec 5, 2021
Messages
7
Reaction score
0
Points
1
Age
22
Location
PH
grants
₲235
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Galing po
 
A 0

AverageP

Abecedarian
BANNED
Member
Access
Joined
Jan 17, 2022
Messages
78
Reaction score
1
Points
8
Location
JP
grants
₲470
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thanks po
 
S 0

sydbermas

Transcendent
Member
Joined
Jan 20, 2022
Messages
2
Reaction score
0
Points
1
Age
26
Location
Batangas
grants
₲199
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thanks bro
 
A 0

Avatar88

Abecedarian
BANNED
Member
Access
Joined
Nov 17, 2021
Messages
132
Reaction score
2
Points
18
Age
35
Location
Giporlos Eastern Samar
grants
₲1,425
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
PAsilip po ts
 
Top Bottom