Zero to Hero Pentesting - Scanning Tools and Tactics

Zero to Hero Pentesting - Scanning Tools and Tactics

The Cyber Mentor via YouTube Direct link

- Why are the majority of the people that work in InfoSec so threatened by people who they perceive could be more skilled than they are?

25 of 59

25 of 59

- Why are the majority of the people that work in InfoSec so threatened by people who they perceive could be more skilled than they are?

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Zero to Hero Pentesting - Scanning Tools and Tactics

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction and TCP vs UDP
  2. 2 - 3-Way Handshake & Wireshark
  3. 3 - Scanning with Nmap
  4. 4 - Downloading and Installing Nessus
  5. 5 - Scanning with Metasploit
  6. 6 - Scanning with Nessus
  7. 7 - Scanning with Nikto
  8. 8 - Scanning with BurpSuite
  9. 9 - Can you fall asleep drinking a Monster so late?
  10. 10 - Proxy settings
  11. 11 - Reviewing viewer's port scan script
  12. 12 - Do you build or tweak your Kali box or just use it straight from the site?
  13. 13 - Reviewing viewer's port scan script (continued)
  14. 14 - Running viewer's port scan script
  15. 15 - Checking in on Burp scan
  16. 16 - Do you use KeepNote?
  17. 17 - How many sodas do you drink in a day?
  18. 18 - Tesla on bugbounty
  19. 19 - Checking in on nmap scans
  20. 20 - Will you be covering enumeration in the series?
  21. 21 - Where can I find the homeworks?
  22. 22 - "You need to put more stuff on your site"
  23. 23 - Checking in on nmap scans
  24. 24 - Checking in on Burp scan
  25. 25 - Why are the majority of the people that work in InfoSec so threatened by people who they perceive could be more skilled than they are?
  26. 26 - They want a battle? Then they shall have one!
  27. 27 - Do you ever fear for your safety, like you're going to discover the wrong thing and have retribution taken against you?
  28. 28 - Finished portscan
  29. 29 - Story of the house-picture
  30. 30 - Checking the TCP dump file
  31. 31 - Keyboard warriors
  32. 32 - Router/network discussion
  33. 33 - Hackerboxes
  34. 34 - What does your desk setup look like?
  35. 35 - Analyzing finished nmap scan
  36. 36 - Going full Sherlock mode on port 10999
  37. 37 - Advanced Sherlock mode on port 10999
  38. 38 - How much HTML do I need to know?
  39. 39 - How soon do you upload?
  40. 40 - Creating a commodity by teaching pentesting and the glamour of "hacking as a job"
  41. 41 - Reports
  42. 42 - The pentesting mentality and Heath's backup career in music
  43. 43 - What percentage of your job is pentesting and what percentage is writing reports?
  44. 44 - Have you seen any newbies that impressed you? What kind of skill level did they have? + Hiring tips
  45. 45 - "The struggle with this field is that you always feel stupid"
  46. 46 - Comparing yourself to Twitter and Twitch All-Stars, Personal goals
  47. 47 - Is online college suitable for these degrees? ROI and Opportunity Costs
  48. 48 - Is there a way to get an internship for a Computer Science if I'm not really good at programming?
  49. 49 - What's the funniest thing you've found in pentesting? + Password cracking stories
  50. 50 - What do you think about WGU?
  51. 51 - Military Cyber training, Air Force vs Army
  52. 52 - Recommendations to learn bug bounties
  53. 53 - Army Cyber program
  54. 54 - CBD, Melatonin, Weed and sleep
  55. 55 - Checking in on Burp scan
  56. 56 - Do companies hire people to [?] others to infiltrate the servers?
  57. 57 - The line between "just looking" and pentesting without permission
  58. 58 - New GoT Episode (No Spoilers)
  59. 59 - What LED case fans do you use? + PC case discussion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.