• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

pentester academy

  1. protectaccount

    IT & Software Powershell for Pentesters | Pentester Academy

    The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to use and write tools in PowerShell which is installed by default of all modern Windows operating...
  2. protectaccount

    IT & Software Data Science and Machine Learning for Infosec | Pentester Academy

    The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, it is important as Pentesters and Security Researchers to understand how to make and break this...
  3. protectaccount

    IT & Software Attacking and Defending Active Directory | Pentester Academy

    The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and...
  4. protectaccount

    IT & Software Pentester Academy - VoIP Traffic Analysis

    Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physical ports to carry VoIP traffic. Hence, it is important to understand VoIP traffic, security...
  5. protectaccount

    IT & Software Pentester Academy - Wi-Fi Monitoring for Red-Blue Teams

    This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and...
  6. protectaccount

    IT & Software Pentester Academy - Scripting Wi-Fi Pentesting Tools in Python

    In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets. This course is ideal for students who are aware of the basics of Wi-Fi Security and Python Scripting. You...
  7. protectaccount

    IT & Software Pentester Academy - Pentesting with Metasploit

    This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration...
  8. protectaccount

    IT & Software Pentester Academy – Abusing SQL Server Trusts in a Windows Domain

    MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a treasure trove for attackers. It gets integrated with in an active directory environment very well, which makes it an attractive...
  9. protectaccount

    IT & Software Pentester Academy – WMI Attacks and Defense

    Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it is of equal use for attackers as it is for defenders. It is very helpful to understand WMI and its...
  10. protectaccount

    IT & Software Pentester Academy – Hacker Project SMS Controlled Pentest Bot

    In this Hacker Project we will learn how to create an SMS controlled Pentesting Bot! This bot will be able to run nmap scans on your command from anywhere in the world smile Key concepts you will learn: Raspberry Pi 3 and Raspbian installation Basics Working with the Raspberry Pi in...
  11. protectaccount

    IT & Software Pentester Academy – Offensive Internet of Things IoT Exploitation

    01-Introduction to IoT Security 02-Mapping Attack surface and previous vulnerabilities 03-Firmware analysis – Identifying hardcoded secrets 04-Emulating firmware binary 05-Backdooring a firmware – 1 09-Using Burp for IoT Web app security 10-Exploiting Command Injection – Part 1 12-CSRF and...
  12. protectaccount

    IT & Software Reconnaissance for Red Blue Teams | Pentester Academy

    Reconnaissance the first and probably most important step of pentesting and red-blue teaming exercises. A well done recon can help prioritize which systems to go behind first and to dedicate more time and resources. In recent times, there has been a lot of technological progress in fields in web...
Top Bottom