![]() The main points that will be covered in this course is enumeration, remote exploitation, buffer overflows, and privilege escalation. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos. Moreover, I've set up a Google drive for you to conveniently download all vulnerable VMs. Detailed instructions on how to set up the labs are included within this course (VMware Player, Kali Linux, Kioptrix, etc.). All of the resources to build the labs are free. This course consists of 100% hands-on technical labs, utilizing industry standard open source technology to hack a variety of intentionally vulnerable operating systems. Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course is not for you. NOTE: This is independent from my other course, Hands-on Pentration Labs 1.0 - they both have original content and you're not required to buy one or the other by itself.
0 Comments
Leave a Reply. |