только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Practical Linux for Pentesting & Bug Bounties

Practical Linux for Pentesting & Bug Bounties

Practical Linux for Pentesting & Bug Bounties
Free Download Practical Linux for Pentesting & Bug Bounties
Last updated 3/2024
Duration: 4h55m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 2.79 GB
Genre: eLearning | Language: English
Practical course to Linux Fundamentals for pentesting & bug bounties


What you'll learn
Linux Fundamentals
Linux vs Windows
Penetration Testing OS
Virtual Box
VMware
Boot Process
Password Management
Package Manager
Linux System Information
Linux Hardware Information
Performance Monitoring
Userinfo and Management
File, Directory and Deletion
Directory Management
Rename, Move and Case Sensitive
Symbolic Links
File Reading
Process and Kill
Linux Permissions and Umask
Linux Network Management
Linux DHCP Server
Linux File System
Linux SAMBA Management
DNS Server Configuration
Hacker Challenge
Bash for Pentesting
Subdomain Enumeration Passive
Subdomain Enumeration Active
Identifying Live Subdomains using Bash
Subdomain Enumeration using wayback
JS Recon using Bash
Requirements
Basic IT Skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory & Internet Connection
Operating System: Windows / OS X / Linux
Description
Welcome to
Linux for Pentesting & Bug Bounties Course
. This course covers fundamentals of Linux and Bash scripting to write your own tools which can be useful for penetration testing and bug bounties. There is no prerequisite of prior linux knowledge and you will be able to install linux, understand fundamentals, write bash scripts for web attacks and mass automation.
This course helps any beginner to intermediate to understand linux fundamentals to make you comfortable with using linux and writing bash scripts tools.
This course will start from
basic fundamentals
of linux like - commands, directory structure, network management, archive management, linux file permissions, performance monitoring, userinfo management, input/output redirection, linux ip tables, virtual hosting and much more.
In addition to
fundamentals of linux,
you will also learn how to write your own tools in bash for
Subdomain Enumeration - Active & Passive, Directory Fuzzers, CORS Automation, XSS Automation, Open Redirect Automation, Wayback using Bash etc.
This course is
highly practical
which helps you learn on exact environment when you start your penetrating testing or bug hunting journey.
This course also includes important
interview questions
and answers related to linux which will be helpful in any
job interviews.
Here's a more detailed breakdown of the course content
In all the sections we will start the
fundamentals of Linux and Writing Bash Scripts to make our own useful tools.
In Introduction to Linux
, we will cover What is Linux, Difference between Windows and Linux, Different Flavours of Linux and Tour to Penetration Testing OS like Kali Linux and Parrot OS.
We will see all the types of XSS attacks on
live websites
which will give you a better understanding of the live environment when you will start your bug hunting journey.
We will also cover Lab Setup for Installation of Linux in Virtual Box and VMware, We will also cover how to setup readymade virtual machine ova files as well which will save your time of installation.
Boot Process -
Windows & Linux Boot Process,
Password Management -
Breaking root password, Setting password for GRUB
Package Managers -
yum, apt, brew, dpkg, rpm, chocolaty, searching for package, installing packages, removing packages, adding repositories, GUI Package managers, how to use git.
Linux Fundamentals -
Linux System Information Commands, Linux Hardware Information Commands, Performance Monitoring Commands, User info and Management Commands, File, Directory and Deletion Commands, Directory Management Commands, Rename,Move and Case Sensitive Commands, Symbolic Links Commands, File Reading Commands, Process and Kill Commands, Background and Foreground Commands, Linux Permissions Fundamentals, Linux Network Management, Linux DHCP Server, What is DNS?, Linux Archive Management Commands, Linux Search and Pattern Commands, Linux SSH Management, Linux SAMBA Management, Linux File System Architecture, Linux IP tables, Web Servers, Virtual Hosts, Bash Scripting Basics, User Inputs, Bash Loops, Customising shell, Using Linux for recon,
Shell Scripting -
We will create scripts/tools for Subdomain Brute force, CORS Automation, URLS to Domain, Waybackurls using Bash, HTTPX/ HTTProbe Tool using Bash, Open Redirect/SSRF and much more.
You will also get additional
BONUS sessions
, in which I m going to share my personal bash scripts for hunting bugs. I have also added
Interview Questions and answers
for linux which will be helpful for those are preparing for
Job Interviews and Internships.
With this course, you get
24/7 support
, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.
Notes
This course is created for educational purposes only.
Testing any website which doesn't have a Responsible Disclosure Policy is unethical and against the law, the author doesn't hold any responsibility.
Who this course is for
Anybody interested in learning Linux, Web application hacking / Penetration testing.
Any Beginner who wants to start using Linux for Penetration Testing
Any Beginner who wants to start with Bash Scripting for Automation of Bug Bounties
Trainer who are willing to start teaching Linux for Pentesting
Any Professional who working in Cyber Security and Pentesting
Ethical Hackers who wants to learn Linux Fundamentals
Beginners in Cyber Security Industry for Analyst Position
SOC person who is working into a corporate environment
Developers who wants to fix vulnerabilities and build secure applications
Homepage
https://www.udemy.com/course/practical-linux-for-pentesting-bug-bounties-hacktify/








No Password - Links are Interchangeable
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.