Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Practical Exploitation with Mubix

via YouTube

Overview

This course on Practical Exploitation with Mubix aims to teach learners about pentesting, red team audit logging, and various cyber security techniques. By the end of the course, students will be able to perform tasks such as nabbing hashes without admin access, pentesting with Evil WinRM, changing user passwords, and setting up Metasploitable 3. The course covers a wide range of topics including using Metasploit modules, Metasploit framework setup on different operating systems, and exploring Metasploit directory structure. The teaching method involves practical demonstrations and hands-on exercises. This course is designed for individuals interested in cyber security, penetration testing, and ethical hacking.

Syllabus

Pentest / Red Team Audit Logging.
BloodHoundAD, ProxyChains & DNSChef - Practical Exploitation with Mubix [Cyber Security Education].
Nab Hashes without Admin via Internal Monologue - Practical Exploitation [Cyber Security Education].
Pentesting with Evil WinRM - Practical Exploitation [Cyber Security Education].
Changing Users Passwords - Metasploit Minute [Cyber Security Education].
LDAP Domain Dump - Metasploit Minute [Cyber Security Education].
Devious Fun With Impacket - Metasploit Minute [Cyber Security Education].
RSS Plugin Module - Metasploit Minute [Cyber Security Education].
Web Delivery Update - Metasploit Minute [Cyber Security Education].
Eternal Blue Attack - Metasploit Minute [Cyber Security Education].
How to setup Metasploitable 3 - Metasploit Minute [Cyber Security Education].
Meterpreter Python Extension - Metasploit Minute [Cyber Security Education].
Show Mount - Metasploit Minute [Cyber Security Education].
Get Proxy - Metasploit Minute [Cyber Security Education].
SLEEP! - Metasploit Minute [Cyber Security Education].
Meterpreter Certificate Validation - Metasploit Minute [Cyber Security Education].
Meterpreter Transports - Metasploit Minute [Cyber Security Education].
Meterpreter Timeouts - Metasploit Minute [Cyber Security Education].
The Meterpreter Wishlist - Metasploit Minute [Cyber Security Education].
Hiding Shells: Prepend Migrate - Metasploit Minute [Cyber Security Education].
5 Ways To Get Initial Access - Metasploit Minute [Cyber Security Education].
Moar Persistence - Metasploit Minute [Cyber Security Education].
In Depth Core Commands - Metasploit Minute [Cyber Security Education].
Making Your First POST Module, PART 2 [Cyber Security Education].
Making your first POST Module, PART 1 [Cyber Security Education].
Forking, Branching, and Pulling - Metasploit Minute [Cyber Security Education].
Making Your First AUX Module, Part 2 - Metasploit Minute [Cyber Security Education].
Making Your First AUX Module, Part 1 - Metasploit Minute [Cyber Security Education].
MSF Venom - Metasploit Minute [Cyber Security Education].
IRB Interactive Ruby Shell - Metasploit Minute [Cyber Security Education].
Alternative Payloads - Metasploit Minute [Cyber Security Education].
Using External Tools With Metasploit - Metasploit Minute [Cyber Security Education].
Using Metasploit Capture Modules - Metasploit Minute [Cyber Security Education].
Meterpreter Extensions - Metasploit Minute [Cyber Security Education].
Meterpreter Standard API - Metasploit Minute [Cyber Security Education].
WiFi Pineapple Hopping - Metasploit Minute [Cyber Security Education].
Meterpreter Core Commands - Metasploit Minute [Cyber Security Education].
Hopping Through Restricted FireWalls - Metasploit Minute [Cyber Security Education].
Meterpreter Relays With PHP Hop - Metasploit Minute [Cyber Security Education].
Windows Post Modules - Metasploit Minute [Cyber Security Education].
Armitage and Cobalt Strike - Metasploit Minute [Cyber Security Education].
Pivoting In Metasploit - Metasploit Minute [Cyber Security Education].
Linux Persistance - Metasploit Minute [Cyber Security Education].
Exploitation Using Java RMI Service - Metasploit Minute [Cyber Security Education].
Discovering And Enumerating Targets - Metasploit Minute [Cyber Security Education].
Metasploit Modules - Metasploit Minute [Cyber Security Education].
Resource Files - Metasploit Minute [Cyber Security Education].
Basic MSF Console Commands - Metasploit Minute [Cyber Security Education].
Top 5 Standalone Tools in Metasploit - Metasploit Minute [Cyber Security Education].
Metasploit Framework Github Setup on Mac OSX - Metasploit Minute [Cyber Security Education].
The Metasploit Directory Structure - Metasploit Minute [Cyber Security Education].
Metasploit Framework Github Setup on Kali Linux - Metasploit Minute [Cyber Security Education].
Kali Linux Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
Debian Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
Windows 8 Metasploit Community Edition Setup - Metasploit Minute [Cyber Security Education].
What is Metasploit - Metasploit Minute [Cyber Security Education].

Taught by

Hak5

Reviews

Start your review of Practical Exploitation with Mubix

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.