K_Penetration Testing Essential Training

00_01 Introduction. 00_02 What_you_should_know. 00_03 Disclaimer. 01_01 What_is_pen_testing. 01_02 The_cyber_kill_chain. 02_01_XR15_An_nmap_refresher. 02_02_XR15_A_netcat_refresher. 02_03_XR15_Capturing_packets_with_tcpdump. 02_04_XR15_Working_with_netstat_and_arp. 02_05_XR15_Scripting_with_Powershell. 02_06_XR15_Extending_Powershell_with_Nishang_Take_2. 03_01_XR15_Refreshing_your_bash_skills. 03_02_XR15_Controlling_the_flow_in_a_script. 03_03_XR15_Using_functions_in_bash. 04_01_XR15_Refreshing_your_python_skills. 04_02_XR15_Using_the_system_functions. 04_03_XR15_Using_networking_functions. 04_04_XR15_Working_with_web_sites. 04_05_XR15_Driving_metasploit_through_python. 04_06_XR15_Accessing_SQLite_databases. 04_07_XR15_Using_scapy_to_work_with_packets. 05_01_XR15_A_Kali_framework_refresher. 05_02_XR15_Fuzzing_with_Spike. 05_03_XR15_Information_gathering_with_Sparta. 05_04_XR15_Adding_the_Trity_tool_to_Kali. 05_05_XR15_A_refresher_on_Metasploit. 05_06_XR15_Exploiting_with_Armitage. 05_07_XR15_Scanning_targets_with_openvas. 06_01 Approaching_web_testing. 06_02_XR15_Testing_Websites_with_BurpSuite. 06_03_XR15_Identifying_web_server_vulnerabilities_with_Nikto. 06_04_XR15_Fingerprinting_web_servers. 07_01 Exploiting_a_target. 07_02 Understanding_code_injection. 07_03_XR15_Understanding_buffer_overflows. 07_04 Finding_exploit_code. 08_01 What_s_next.

Ransomware_ Practical Reverse Engineering

00_01_ Introduction. 00_02 What_you_need_to_know. 00_03 Disclaimer. 01_01 Reverse_engineering_to_understand_malware. 01_02 Malware_and_family_ties. 01_03 Automated_analysis_of_malware_with_IRMA. 01_04 Automated_analysis_of_malware_with_VxStream. 01_05 Advancedsandboxingfirewalls. 02_01 Using_the_autoruns_tool. 02_02 Analysing_network_connections. 02_03 Looking_at_processes. 02_04 Examining_PE_files. 02_05 Hiding_code__a_case_study. 02_06 Disassembling_with_IDA. 02_07 Filepackingtechniques. 03_01 A_first_look_at_WannaCry. 03_02 Peeking_into_WannaCry. 04_01 Whats_Next.

K_Securing Android Apps

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Disclaimer. 01_01_ Introducing_the_Android_OS. 01_02_ Securing_Android. 01_03_ Securing_Android_Apps. 01_04_ Understanding_hardware_security. 01_05_ Trusty_TEE. 01_06_ Samsung_Knox. 02_01_ Creating_Android_apps_using_PhoneGap. 02_02_ Taking_a_first_glimpse_at_Android_Studio. 02_03_ Rapid_Android_development_with_RAD_Studio. 03_01_ Recovering_the_Java_code. 03_02_ Getting_command_line_access. 03_03_ Using_Drozer_to_analyse_applications. 03_04_ Analysing_apps_on_an_Android_phone. 03_05_ Capturing_packets_on_your_mobile_phone. 04_01_ Extending_the_framework_for_mobile_security. 04_02_ Understanding_Android_vulnerabilities. 04_03_ Basic_Android_app_hygiene. 04_04_ Storing_data_in_the_app_sandbox. 04_05_ Using_cryptography. 04_06_ Securing_keys_and_credentials. 04_07_ Adding_tamper_detection. 04_08_ Using_JNI_to_defeat_Java_decompilation. 05_01_ Developing_Android_apps_for_work. 05_02_ Whats_new_in_Android_O. 06_01_ […]

K_Securing the IoT_ Designing and Testing_MalcolmShore

00_01_ Introduction. 00_02_ What_you_need_to_know. 00_03_ Course_Disclaimer. 01_01_ Looking_back_at_the_WeMo_security_issues. 01_02_ Dissecting_the_Dyn_Mirai_attack. 01_03_ Hacking_cars_and_drones. 01_04_ Testing_and_Breaking_ZWave_security. 01_05_ Safety_and_the_insecurity_of_robots. 02_01_ Introducing_IoT_security. 02_02_ Security_compliance_for_IoT. 02_03_ Securing_low_rate_wireless_personal_area_networks. 02_04_ LoRa_security. 02_05_ Building_security_into_IoT_devices. 02_06_ Moving_on_to_a_trusted_execution_environment. 03_01_ A_first_look_at_Marvin_Ta. 03_02_ Adding_sensors_to_Marvin. 03_03_ Adding_encryption_to_Marvin. 03_04_ Running_on_the_Internet_of_Things. 04_01_ Generating_Packets_with_Packeteer. 04_02_ Install_the_cURL_tool. 04_03_ Understanding_the_real_time_messaging_protocol. 05_01_ Testing_the_raw_WiFi_interface. 05_02_ Testing_home_IoT_switches_Orvibo. 05_03_ Understanding_the_home_network_automation_protocol. 05_04_ Testing_home_IoT_switches_WeMo. 05_05_ Testing_the_Netcat_surveillance_camera. 05_06_ Testing_the_Broadlink_Air_Quality_Monitor. 05_07_ […]

K_Ethical Hacking_ Exploits

00_01_ Welcome. 00_02_ Whatyoushouldknow. 00_03_ Disclaimer. 01_01_ Whatareexploits. 01_02_ Introductiontoassembler. 01_03_ Writingyourfirstassemblerprogram. 01_04_ DebuggingCprograms. 01_05_ UsingNasminKali. 01_06_ Extendingfurtherintoassembler. 02_01_ Writingavulnerableassemblerprogram. 02_02_ Takingcontrolflow. 02_03_ Executingcodefromthedatasection. 03_01_ Exploitingwithpython. 03_02_ ExploitingtheFTPclient. 03_03_ Takingafirstlookatstatesponsoredexploits. 04_01_ UsingMetasploit. 04_02_ UsingArmitage. 04_03_ LookingatMetasploitmodules. 04_04_ AddingnewexploitstoMetasploit. 05_01_ Whatsnext.

Ethical Hacking Enumeration

00_01_WX30_introduction. 00_02_XR15_whatyoushouldknow. 01_01_XR15_whatis. 01_02_XR15_understanding. 01_03_XR15_working. 01_04_XR15_netbios. 02_01_XR15_profiling. 02_02_XR15_contexts. 02_03_XR15_working. 02_04_XR15_SMBSAMBA. 03_01_XR15_enumerating. 03_02_XR15_Episode1. 03_03_XR15_episode2. 03_04_XR15_episode3. 03_05_XR15_EnumEp1. 03_06_XR15_EnumEp2. 03_07_XR15_SNMPEnumeration. 03_08_XR15_RPC. 03_09_XR15_UsingWMI. 03_10_XR15_Finger. 04_01_XR15_tracing. 04_02_XR15_shodan. 04_03_XR15_scanning. 05_01_XR15_superscan. 05_02_XR15_netscantools. 05_03_XR15_LDAP. 05_04_XR15_SMTP. 06_01_XR15_outtro.

K_Ethical Hacking_ Mobile Devices and Platforms

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Course_disclaimer. 01_01_ Understanding_and_testing_for_mobile_vulnerabilities. 01_02_ Static_Analysis_of_mobile_applications. 01_03_ Dynamic_analysis_of_mobile_applications. 02_01_ Understanding_the_Android_operating_system. 02_02_ Understanding_the_Android_security_model. 02_03_ Preparing_the_Android_testing_environments. 02_04_ Extracting_and_reading_the_Manifest_file_PART1. 02_05_ Extracting_and_reading_the_source_code. 02_06_ Extracting_Java_source_code_files_with_JAD. 02_07_ Browsing_applications_directly_with_JADX. 02_08_ Getting_command_line_access_with_ADB. 02_09_ Installing_an_emulated_Android_device. 02_10_ Dynamic_analysis_of_Android_applications. 02_11_ Using_Drozer_to_analyse_applications. 02_12_ Setting_up_a_KitKat_VM. 03_01_ Understanding_iOS_applications. 03_02_ Securing_iOS_applications_by_design. 03_03_ Jailbreaking_for_command_line_access_to_iOS_applications. 03_04_ Preparing_to_test_iOS_applications. 03_05_ Extracting_properties_and_class_headers_from_iOS_applications. 03_06_ Disassembling_iOS_executable_code. 03_07_ Advancing_to_dynamic_analysis_of_iOS_applications. 04_01_ Whats_next.

K_Ethical Hacking_ Perimeter Defenses

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Course_disclaimer. 01_01_ Understanding_firewalls. 01_02_ Applying_the_basic_Windows_firewall. 01_03_ Using_advanced_features_in_the_Windows_firewall. 01_04_ Understanding_detection_through_firewall_logs. 01_05_ Understanding_Linux_IPTables. 01_06_ Setting_up_a_Linux_IPTables_firewall. 01_07_ Managing_rules_with_Firewall_Builder. 01_08_ Port_testing. 02_01_ Setting_up_a_CISCO_PIX_firewall. 02_02_ Creating_a_secure_enclave. 03_01_ Installing_GNS3. 03_02_ Obtaining_network_device_images. 03_03_ Setting_up_a_network. 03_04_ Emulating_the_ASA_firewall. 03_05_ Integrating_Kali_into_GNS3. 04_01_ Understanding_web_application_firewalls. 04_02_ Exposing_API_services_through_the_WSO2_Gateway. 04_03_ Understanding_honeypots. 04_04_ Running_the_Cowrie_honeypot. 04_05_ Detecting_intrusions_with_Security_Onion. 05_01_ Whats_next.

K_Ethical Hacking_ Website and Web Application Testing

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Disclaimer. 01_01_ Elements_of_web_applications. 01_02_ Dissecting_the_HTTP_protocol. 01_03_ Moving_on_to_WebSockets. 01_04_ Looking_at_Googles_QUIC_protocol. 01_05_ Understanding_cookies. 01_06_ Introducing_HTML. 01_07_ Visiting_OWASP. 02_01_ Installing_the_HacMe_Casino. 02_02_ Installing_the_WebGoat_server. 02_03_ Installing_and_using_the_Vega_scanner. 02_04_ Intercepting_web_traffic_with_teh_Vega_proxy. 02_05_ Introducing_Burp_Suite. 02_06_ Proxying_with_ZAP. 02_07_ Using_the_OWASP_ Framework. 02_08_ Introducing_Web_Scarab. 03_01_ Fingerprinting_web_servers. 03_02_ Looking_for_credentials_in_HTML_code. 03_03_ Using_Cookie_Digger. 03_04_ Hijacking_sessions_through_cookies. 04_01_ Manipulating_the_URL. 04_02_ Testing_for_SQL_injections. 04_03_ Cross_site_scripting. 04_04_ Injecting_commands_through_the_URL. 05_01_ Cracking_the_bank. […]

K_ Securing the IoT_ Secure Architectures

00_01_WX30_Introduction. 00_02_XR30_What_you_should_know. 01_01_XR30_Designing_an_enterprise_architecture. 01_02_XR30_Architecting_security. 01_03_XR30_Architecting_security_using_attributes. 01_04_XR30_Architecting_security_using_domains. 01_05_XR30_Managing_architected_risk. 02_01_XR30_Emerging_IoT_reference_architecure. 02_02_XR30_Architecting_IoT_security_domains. 02_03_XR30_Deriving_the_endtoend_IoT_risk_posture. 02_04_XR30_Selecting_controls. 02_05_XR30_Using_IoT_services. 03_01_XR30_Reviewing_an_eHealth_IoT_security_architecture. 03_02_XR30_Industrial_IoT_security_architecture. 03_03_XR30_Applying_security_through_an_SDN_architecture. 04_01_XR30_WiFi_and_BLE_security_architecture. 04_02_XR30_SigFox_security_architecture. 04_03_XR30_LoRaWAN_security_architecture. 04_04_XR30_6LoWPAN_security_architecture. 04_05_XR30_NBIoT_security_architecture. 05_01_XR30_IoT_application_services. 05_02_XR30_Cisco_SPIoT_application_service. 05_03_XR30_Microsoft_Azure_IoT_services. 05_04_XR30_Google_Cloud_IoT_application_services. 05_05_XR30_IBM_s_Watson_for_Iot. 05_06_XR30_Amazon_s_AWS_IoT_service. 06_01_XR30_Bringing_it_all_together. 07_01_XR30_What_s_next.