Welcome to Mobilarian Forum - Official Symbianize.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

NETWORK PENTESTING BY PENTESTER ACADEMY

D 0

dfox4685

Transcendent
Member
Joined
Aug 17, 2021
Messages
5
Reaction score
4
Points
3
Age
40
Location
Pampanga
grants
₲333
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thank you
 
J 0

julyopikar

Transcendent
Member
Joined
Aug 27, 2021
Messages
25
Reaction score
1
Points
3
Age
37
Location
Philippines
grants
₲569
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Thanks for this.
 
  • Like
Reactions: Baban
B 0

Baban

Transcendent
Member
Joined
Aug 27, 2021
Messages
10
Reaction score
2
Points
3
Age
27
Location
San Jose Del Monte Bulacan
grants
₲454
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
Xie-xie shifu(^)
 
J 0

jayrus12345

Transcendent
Member
Access
Joined
Aug 27, 2021
Messages
39
Reaction score
4
Points
8
Age
30
Location
ISABELA
grants
₲761
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
link lods
 
B 0

bilat86

Abecedarian
BANNED
Member
Access
Joined
Jul 12, 2021
Messages
99
Reaction score
4
Points
8
Age
38
Location
Legazpi city
grants
₲437
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
thanks and more power
 
A 0

awsnap

Transcendent
Member
Joined
Sep 9, 2021
Messages
3
Reaction score
0
Points
1
Age
36
Location
Philippines
grants
₲293
4 years of service
like and thanks mga kapatid for this one


A non-exhaustive set of topics covered include:


Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework and AV Evasion
Metasploit Loader 32/64-bit
DLL Hijacking basics
DLL Hijacking and Meterpreter
Privilege Escalation via DLL Hijacking
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
Memory Dumping and Analysis
... ton of other interesting topics

83 Detailed Video Lectures

Direct Google Drive Link:




* Hidden text: cannot be quoted. *
thank you for sharing
 
Top Bottom