CTF
CTF

Moreover, I've set up a Google drive for you to conveniently download all vulnerable VMs. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

The main points that will be covered in this course is enumeration, remote exploitation, buffer overflows, and privilege escalation. These labs will show you how to interpret results from tools such as Nmap, Dirb, and enum4linux, and use them effectively to compromise vulnerable systems. Please note that these labs contain spoilers, and it is a good idea to attempt to compromise the vulnerable systems on your own prior to getting the answers from the walk through that's provided.

What you’ll learn

  • Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, etc.
  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro
  • Build buffer overflows manually

Are there any course requirements or prerequisites?

  • Basic Linux knowledge
  • Basic networking knowledge
  • Kali Linux
  • Desktop or Laptop with a minimum of 2GB RAM (8GB+ preferable)
  • VirtualBox
  • Windows 7 or 10 host OS preferred (tested)