Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked How to Hack The Box To Your OSCP (The Extra Boxes)


itsMe

Recommended Posts

This is the hidden content, please

Go Beyond Root: Pop The Box and Build Real Detections

Description
Are you ready to feel the fun of KNOWING how to hack?
In this course you will learn how to build a modern hacking lab.
You'll learn how to master the latest tools and attacker tradecraft for compromise victim environments.
You'll finally feel the pleasure and freedom of knowing what you're talking about.
I had a BLAST creating this course for you guys and I'm so excited to share all the awesome with you.

In this course you will learn:

    ping (for recon)
    nmap
    rustscan
    whatweb + Wappalyzer
    Burp Browser (why you should say NO to FoxyProxy!)
    feroxbuster
    kerbrute
    ldp
    ldapsearch
    crackmapexec
    smbclient
    How to install Impact from scratch (because you know... it always breaks)
    getTGT
    GetUserSPNs
    What the heck a SPN is anyway! You'll learn that - finally
    hashcat
    Silver Tickets
    ticketer
    How to manually convert passwords into NTLM hashes
    SQL Commands
    How to build a reverse shell in Powershell
    rlwrap
    netcat
    iconv
    xxd
    base64
    PEAS-ng (winPEAS)
    Powershell Remoting
    evil-winrm
    Reverse Engineering .NET Binaries
    Wireshark
    Insecure Deserialization
    ysoserial
    JuicyPotatoNG
    Persistence Mechanisms
    Beyond Root: Threat Hunting the Attack
    Beyond Root: Mitigations

Seriously! This is the best course I've ever made on hacking. It's the combination of all my experience jam packed into one tiddy little course.

You'll also get:

    Hacking links and resources
    Complete commands to copy and paste directly into your terminal!

So what are you waiting for?
Why are you still reading?
Enroll now and change your life.
Let's go!

Who this course is for:

    New SOC Analysts
    New Penetration Testers
    New Red Teamers
    New Blue Team Defenders
    Help Desk Analysts (wanting to get into cyber)
    Network Admins, Sys Admins and Network Engineers (wanting to get into cyber)
    Cybersecurity Managers (who want to know how the bad guy compromise environments)

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.