• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

pentester academy

  1. protectaccount

    IT & Software Pentester Academy - VoIP Traffic Analysis

    Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physical ports to carry VoIP traffic. Hence, it is important to understand VoIP traffic, security...
  2. protectaccount

    IT & Software Pentester Academy - Wi-Fi Monitoring for Red-Blue Teams

    This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and...
  3. protectaccount

    IT & Software Pentester Academy - Scripting Wi-Fi Pentesting Tools in Python

    In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets. This course is ideal for students who are aware of the basics of Wi-Fi Security and Python Scripting. You...
  4. protectaccount

    IT & Software Pentester Academy - Pentesting with Metasploit

    This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration...
  5. protectaccount

    IT & Software Pentester Academy – Abusing SQL Server Trusts in a Windows Domain

    MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a treasure trove for attackers. It gets integrated with in an active directory environment very well, which makes it an attractive...
  6. protectaccount

    IT & Software Pentester Academy – WMI Attacks and Defense

    Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it is of equal use for attackers as it is for defenders. It is very helpful to understand WMI and its...
  7. protectaccount

    IT & Software Pentester Academy – Hacker Project SMS Controlled Pentest Bot

    In this Hacker Project we will learn how to create an SMS controlled Pentesting Bot! This bot will be able to run nmap scans on your command from anywhere in the world smile Key concepts you will learn: Raspberry Pi 3 and Raspbian installation Basics Working with the Raspberry Pi in...
  8. protectaccount

    IT & Software Pentester Academy – Offensive Internet of Things IoT Exploitation

    01-Introduction to IoT Security 02-Mapping Attack surface and previous vulnerabilities 03-Firmware analysis – Identifying hardcoded secrets 04-Emulating firmware binary 05-Backdooring a firmware – 1 09-Using Burp for IoT Web app security 10-Exploiting Command Injection – Part 1 12-CSRF and...
  9. protectaccount

    IT & Software Reconnaissance for Red Blue Teams | Pentester Academy

    Reconnaissance the first and probably most important step of pentesting and red-blue teaming exercises. A well done recon can help prioritize which systems to go behind first and to dedicate more time and resources. In recent times, there has been a lot of technological progress in fields in web...
Top Bottom