Big Data

  • Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

Community Reputation

25 Excellent

About Big Data

  • Rank

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Description ـــــــــــــــــــــــــ Most enterprise networks today are managed using Windows Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Active Directory Pretesting is designed to provide security professionals to understand, analyze and practice threats and attacks in a modern Active Directory environment. The course is beginner friendly and comes with a walkthrough videos course and all documents with all the commands executed in the videos. The course is based on our years of experience of breaking Windows and AD environments and research. When it comes to AD security, there is a large gap of knowledge which security professionals and administrators struggle to fill. Over the years, I have taken numerous world trainings on AD security and always found that there is a lack of quality material and specially, a lack of good walkthrough and explanation. The course simulate real world attack and defense scenarios and we start with a non-admin user account in the domain and we work our way up to enterprise admin. The focus is on exploiting the variety of overlooked domain features and not just software vulnerabilities. We cover topics like AD enumeration, tools to use, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket, Silver ticket and more), ACL issues, SQL server trusts, and bypasses of defenses. Attacking and Hacking Active Directory With Kali Linux Full Course - Read Team Hacking Pentesting What you’ll learn ـــــــــــــــــــــــــــــــــــــ How to Use Metasploit to Exploit Active Directory How to Use Empire to Exploit Active Directory How to Use Evil-WinRM to Exploit Active Directory How to Use CrackMapExec to Exploit Active Directory How to Exploit Active Directory From Windows How to Do Active Directory Enumeration How to do Lateral Movement Active Directory Post Exploitation Active Directory Domain Privilege Escalation Active Directory Persistence Attacks How to use Kali Linux to hack Active Directory How to use nmap to Enumerate Servers How to exploit EternalBlue Are there any course requirements or prerequisites? ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ How Active Directory Work Windows Server Experience Who this course is for: ـــــــــــــــــــــــــــــــــــــــــــــــــ Students who would love to become an Active Directory Pentesting Expert Students who would love to learn how to Attack Active Directory Students who would love a Job as a Red Team Windows - Privilege Escalation and Local Enumeartion Cheat Sheet [hide] [Hidden Content]]
  2. Description We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability. This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability. Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities. What you’ll learn Web Application Pentesting Completing 20 exercise of Mutillidae Vulnerable Web Application OWASP top 10 2017 Mitigations for each vulnerability Secure code for mitigation Are there any course requirements or prerequisites? This course is for beginners Basic knowledge of OWASP top 10 Basics of using Burp Suite and Proxy Burpsuite and Browser Setup Who this course is for: Beginner ethical hacking students Students who want to learn Web Application Pentesting Students who want to perform exercises on Mutillidae Vulnerable Application Students who want to learn about the Mitigations of each vulnerability in OWASP top 10 2017 [Hidden Content]
  3. WiFi Hacking using Evil Twin Attacks and Captive Portals Description In this course I will show you how to create the most common and effective evil twin attacks using captive portals. You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials. All the attacks in this course are highly practical and straight to the point. By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios. What you’ll learn Set Up an Access Point with a Captive Portal. Create a Fake Captive Portal and use it to Steal Login Information. Customizing the Captive Portal Page. How to Sniff and Inject Packets into a Wireless Network. Use Wireshark Filters to Inspect Packets. Perform an Evil Twin Attack with Airgeddon. Stealing Social Media Accounts using a Captive Portal. How to use Dns Spoofing and BeEF using WiFi Pumpkin. Stealing Login Credentials from a WPA Enterprise Network. Detect and Secure Your System from Evil Twin Attacks. Are there any course requirements or prerequisites? Computer with at least one wireless card to act as an access point. Desire to learn. Who this course is for: For everyone who wants to learn Wi-Fi Hacking using Evil Twin Attacks. [Hidden Content]
  4. Big Data

    Free Lifetime Windows RDP Method

    do you have any method to bypass the time limited
  5. Big Data

    site block my ip when i use dirb

    not work and i am use nord vpn in host and vm
  6. Big Data

    site block my ip when i use dirb

    hi when i use dirb to scan hidden directory in some website the website block my ip i now this couse i try to change ip with some vpn and site back online but i block it again is any way to bypass this block and scan the site ????
  7. Big Data

    Can my ISP tracking me

    hi all 1- Can my service provider track me even i use VPN like Nord VPN ?? 2- can they track My activities what i am I do like site i Visiting or what i downloading ?? 3- is they have some soft or hard ware to decrypt my track and decrypt my connection ?? 4- i am using nord vpn with obfuscated server is this enough ?? 5- can i use nord vpn with tor tor browser ?? 6- is the tails system Enough to Privacy can i use it as main system and can i use it to download torrent ??
  8. hi all Is there any way to delete data anyone try to access it I thought that no matter how hard you tried to encrypt the data, it could be Extract i asked Is there any way to delete data anyone try to access it and how
  9. Big Data

    security mac filter hacking ??

    i am still in a information gathering about this system and they use some of firewall like fortinet and i discover some vulnerability in this system Until now so i will report every thing i discovered and Suggest solution
  10. Big Data

    security mac filter hacking ??

    i already read this notes you add when i call but I want to make sure there is no solution to this will read about Cisco ISE or Microsoft NAP. thank you for caring
  11. Big Data

    security mac filter hacking ??

    the network\\ i mean i have a small network with 5 computer one of this five is the server and all connected to same network on a workgroup and the Dhcp is on / wifi is off now to connect to my network you need to plug in wired this wired manged by ip & mac filter now to more security to my network i activate filter list with mac filter hacker can plug in wired and spoof mac filter to access my network and start scan it to pentest my question is how can i protect network against mac spoofing ?? go it
  12. Big Data

    security mac filter hacking ??

    i mean how can i protect network against mac spoofing ?? i read some notes there is no solution is this true ??
  13. Big Data

    security mac filter hacking ??

    hi all we know all about mac filter and how is it security user in network and hacker can hack this security method by changing or spoof mac filter The question here is how to protect network even hacker bypass mac filter ???