Ethical hacking and pentesting guide
- Description
- Curriculum
- FAQ
- Reviews
SUDO
I can not promise this course will find you bugs. I can promise i will leave you with a solid methodology that’s netted me a few nice extra monthly salaries. This method is not guaranteed to work for you. You will need to adept. You will need to work.
If any course promises you that they WILL find you bugs, run as fast as you can.
WHOAMI
My name is uncle rat and i am here to help you take the next step. I am not here to hold your hand, i am here to push you over the edge. You’ve been practicing on pratice platforms for long enough now, don’t you think? It’s time.
I will provide you with a solid methodology to build upon. I don’t want you to follow in my footsteps, i want you write your own legend. This is after all the place where legends are born.
Every chapter has at least a video file with slides to download and where applicable a full text PDF with extra information. All extra’s like cheat sheets are seperatly downloadeable for your comfort.
– The XSS Rat
CAT ‘goals.txt’
I can hack, but i can only hack one target at a time. My passion is teaching so why not hit two birds with one stone?
I created this course because i strongly believe that if i hack 1 target i am just me but if i train 1000 hackers, we are an army.
This is my goal, i want to make the internet a safer place but i can’t do it alone.
Who this course is for:
-
Beginner bug bounty hunters who are looking for a solid methodology and mindset
-
Experienced pen-testers looking to get into bug bounties
-
Companies training their cybersecurity staff to withstand even the toughest of logic attacks
The course Contains :
-
The basics of networking, the web, and hacking
-
OSCP based enumeration techniques and an attack plan for foothold and priv esc
-
API testing
-
Mobile testing
-
Web application testing
-
And much more…
-
2introductionText lesson
-
3intro videoVideo lesson
-
4What is "Ethical" hacking"Text lesson
-
5How to engage a targetText lesson
-
6How to engage a target.mp4Video lesson
-
7@Ch1R0n1n: What it means to be an Ethical Hacker.pdfText lesson
-
8@Ch1R0n1n: What it means to be an Ethical Hacker.pptxText lesson
-
9@Ch1R0n1n: What is an Ethical Hacker.mp4Video lesson
-
10Assignment: Describe the deliverables of a pentest in your own wordsText lesson
-
11QUIZ: How ethical are you?Quiz
-
12Assignment: Let's fuzz hackxpert.comText lesson
-
13Web fundamentals VideoVideo lesson
-
14Web fundamentalsText lesson
-
15Networking fundamentalsText lesson
-
16Assignment: NetworkingText lesson
-
17Transferring files.mp4Video lesson
-
18Realistic assignment: Fuzz our pentesting assignementText lesson
-
19Downloading filesText lesson
-
20FuzzingText lesson
-
21Quiz: 00x02 FundamentalsQuiz
-
35Getting a footholdVideo lesson
-
36Directory Busting Video PartVideo lesson
-
37Directory Busting PPTXText lesson
-
38Directory Brute forcing by Uncle rat PDFText lesson
-
39Working with ExploitsVideo lesson
-
40Working with Exploits.pptxText lesson
-
41SMB enumText lesson
-
42SMB Enumeration.mp4Video lesson
-
43SMB Enumeration slidesText lesson
-
44SNMP enumText lesson
-
45NFS enumText lesson
-
46Telnet enumText lesson
-
47SSH enumText lesson
-
48FTP EnumText lesson
-
49FTP EnumVideo lesson
-
50FTP EnumerationText lesson
-
51Assignment: - FootholdText lesson
-
52Quiz: 0x05 EnumQuiz
-
53Linux priv-escVideo lesson
-
54Linux priv esc PPTXText lesson
-
55Linux priv esc ArticleText lesson
-
56Linux priv esc Ex 1Video lesson
-
57Linux priv esc Ex 2Video lesson
-
58Windows Priv EscVideo lesson
-
59Windows priv esc ArticleText lesson
-
60Quiz: Privilege escalation [Linux]Quiz
-
61Assignment: Linux priv escText lesson
-
68IntroVideo lesson
-
69Dashboard + live and passive scansVideo lesson
-
70Target tabVideo lesson
-
71Proxy tabVideo lesson
-
72IntruderVideo lesson
-
73Repeater.Video lesson
-
74SequencerVideo lesson
-
75Decoder.Video lesson
-
76ComparerVideo lesson
-
7710 Market place (Plugins)Video lesson
-
78Burp Suite ExtenderText lesson
-
79Burp collaboratorText lesson
-
80Burp AuthorizeText lesson
-
81Burp Match and replaceText lesson
-
82Burp Suite Content discoveryText lesson
-
83Burp suite Top 5 Proffesional extensionsText lesson
-
84Testing mobile applications with burp suiteText lesson
-
85Burp suite How to use burp to look for SQLiText lesson
-
86Quiz : BurpsuiteQuiz

External Links May Contain Affiliate Links read more