Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physical ports to carry VoIP traffic. Hence, it is important to understand VoIP traffic, security...
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and...
In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets.
This course is ideal for students who are aware of the basics of Wi-Fi Security and Python Scripting. You...
This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
Metasploit Basics and Framework Organization
Server and Client Side Exploitation
Meterpreter – Extensions and Scripting
Database Integration...
MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a treasure trove for attackers. It gets integrated with in an active directory environment very well, which makes it an attractive...
Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it is of equal use for attackers as it is for defenders. It is very helpful to understand WMI and its...
In this Hacker Project we will learn how to create an SMS controlled Pentesting Bot! This bot will be able to run nmap scans on your command from anywhere in the world smile
Key concepts you will learn:
Raspberry Pi 3 and Raspbian installation Basics
Working with the Raspberry Pi in...
Reconnaissance the first and probably most important step of pentesting and red-blue teaming exercises. A well done recon can help prioritize which systems to go behind first and to dedicate more time and resources. In recent times, there has been a lot of technological progress in fields in web...