Select Page

BECOME AN ETHICAL HACKER

Get 400+ pages of Offensive Cybersecurity instruction aimed at the beginner.

Chapter 4

 

In chapter 3, Recon the Network we explored the running services of the ethical hacking lab network. In this chapter we will attack those same services, using a variety of attack techniques that exploit the vulnerabilities we installed. The goal is access. To control the target we need access to it, and that means valid usernames and passwords. In this chapter we will discover our first set of user credentials and use them to access the targets in the lab network.

Here is a brief summary of this chapter:

  • Using a technique called ASREPRoasting, we will see how you can get a Kerberos response encrypted with the password for an account with the feature, ‘require Kerberos preauthentication’ disabled.

Overview & Preview

15 Chapters

552 Pages

Become An Ethical Hacker is the introduction to ethical hacking every beginner needs to read. This is the book you need if you are studying for the OSCP or eJPT exams! In this book, you will learn how to set up a free professional penetration testing lab. You will then learn how to attack the vulnerable machines in the lab in order to learn the basics of ethical hacking.

About the author:
The Ethical Hacking Guru is an experienced ethical hacker with nearly a decade of experience. The Guru believes in providing affordable professional-grade Cybersecurity training to individuals to get them the knowledge to break into the field of ethical hacking.

Learn how to:

  • Recon the network using the latest enumeration techniques.
  • Program with C#, Go, and Python.
  • Crack password hashes to reveal passwords.
  • SMB Relaying
  • Use Covenant, PowerShell Empire, and Metasploit to dominate the network.

Learn the foundational concepts of ethical hacking to get started in a new career as a Penetration Tester or a Cybersecurity professional.

These concepts will be taught in the course of exploiting the Ethical Hacking Lab network.

  • Code Analysis
  • Exploiting Linux misconfigurations
  • How to use Metasploit
  • Working with Control and Command Frameworks (C2)
  • Bypassing Antivirus
  • Pivoting and Moving Laterally
  • Web App Hacking
  • Windows Privilege Escalation Techniques
  • Linux Privilege Escalation Techniques

Sample Pages

Become An Ethical Hacker takes you through setting up a lab and exploiting it. Wish I had this sooner!

John D.

Get it Now!

Upgrade your life in 2022 and become an Ethical Hacker today.

SIGN UP FOR EMAIL LIST FOR UPDATES.

Get a Free Ebook!

error: