Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Penetration Testing With Kali Linux
Introduction
Course Structure (1:59)
Installation & Configuration
Installing Kali ,Virtual Box & Windows VM (6:56)
Configuring Kali Linux ,Vulnerable VMs & Discovery of IP,Services & Port using NMAP (10:38)
LAB 1-3
Installation & Configuration of Vulnerable VM (0:45)
LAB -1 VTCSEC-EASY (17:18)
LAB 2- SMB exploitation (27:01)
LAB-3-Exploitation of SQL Injection and root the VM (12:49)
LAB 4-6
Installation & Configuration (0:45)
LAB 4 - Sickos1.2 Exploitation Part-1 (19:10)
LAB 4 - SickOS 1.2 Exploitation Part-2 (18:07)
Lab 5- WordPress Plugin Exploitation-1 (13:33)
Lab 5 -WordPress Plugin Exploitation-2 (5:26)
LAB -6 -vulnos2 -Part-1 Exploitation (25:35)
LAB -6 - Vulnos2_Part2_Intermediate (7:50)
Feedback & Comments
Teach online with
LAB -6 - Vulnos2_Part2_Intermediate
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock