Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

NETWORK PENTESTING BY PENTESTER ACADEMY

Alexhost
K 0

kblz808

Transcendent
BANNED
Member
Access
Joined
Feb 4, 2022
Messages
30
Reaction score
0
Points
6
Age
24
Location
addis ababa
grants
₲391
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Tnx bru
 
J 0

jacklloyd

Transcendent
Member
Access
Joined
Aug 2, 2021
Messages
38
Reaction score
1
Points
6
Age
25
Location
Bulacan
grants
₲610
3 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thank you po dito.
 
R 0

repojnaj

Corporal
Member
Access
Joined
Jan 17, 2022
Messages
643
Reaction score
145
Points
43
Age
38
Location
Quezon city
grants
₲2,670
2 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Salamat po
 
Top Bottom