Tutorialspoint

#May Motivation Use code MAY10 for extra 10% off

Ethical Hacking - Capture the Flag Walkthroughs - v3

person icon Cliff Krahenbill

4.6

Ethical Hacking - Capture the Flag Walkthroughs - v3

Entry level Walkthroughs for Capture the Flag exercises that will help strengthen your pentesting skills.

updated on icon Updated on May, 2024

language icon Language - English

person icon Cliff Krahenbill

English [CC]

category icon IT & Software,Network & Security,Ethical Hacking

Lectures -13

Resources -5

Duration -1 hours

4.6

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together, showing students how to perform an actual pentest and gain root access.  More importantly, students learn how to conduct a pentest using the hacker's methodology. 

We learned to walk before we could run and technology and pentesting are no different. This course is designed to introduce students to skills similar to what hackers use in real-life situations and obtain a greater understanding of how vulnerabilities are exploited.

Although all hackers use no specific step-by-step methodology, a typical hacking process comprises of the following steps:

  1. Footprinting – the process of using passive methods of gaining information about the target system before performing the attack. 

  2. Scanning – the process of taking information obtained from the footprinting phase to target the attack more precisely. Some of the methods used in this phase are port scans, ping sweeps, operating systems detection, observation of facilities used by the target, etc.

  3. Enumeration – the process of extracting more detailed information about the information obtained during the scanning phase to determine its usefulness. Some of the methods used in this step are user accounts enumeration, SNMP enumeration, UNIX/Linux enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, etc.

  4. System hacking is planning and executing the attack based on the information obtained in the previous phases. In this phase, the attacker performs the actual hacking process using hacking tools.

  5. Escalation of privilege – the process of obtaining privileges that are granted to higher privileged accounts than the attacker broke into originally. This step aims to move from a low-level account (such as a guest account) all the way up to an administrator.

  6. Covering tracks – the process of removing any evidence of the attacker’s presence in a system. The attacker purges log files and removes other evidence needed for the system owner to determine that an attack occurred.

  7. Planting backdoors – the process of securing unauthorized remote access to a computer, so the attacker can access the system later without being detected. Backdoors are usually computer programs that give an attacker remote access to a targeted computer system. Entry-level Walkthroughs for Capture the Flag exercises that will help strengthen your pentesting skills.

Students step through each of the Capture the Flags (CTF) walkthroughs looking for clues to help guide. The clues will help the pentester find and exploit the target to gain root access. Each CTF demonstrates the techniques and hacking methodology used by pentesters and hackers. 

Students having completed my Ethical Hacking Courses Parts 1 and 2  can now put to use what they have learned in the Capture the Flag series. You've seen the tools, heard all the war stories, now learn ethical hacking like you've wanted to. 

Don't cheat yourself! Check out the free preview of the first module of the course. Students have lifetime access, and more CTF exercises will be added over time. 

Goals

What will you learn in this course:

  • A much higher skill level as a pentester or a hacker.
  • Learn basic tools and techniques in vulnerability assessment and exploitation
  • Foot printing, scanning, enumeration, exploitations and privilege escalation
  • Better understanding of pentesting tools and their uses.

Prerequisites

What are the prerequisites for this course?

  • 4 GB of RAM (8 GB preferred).
  • Hardware and software capable of handling virtualization.
  • A good understanding of networking.
  • Entry level knowledge of pentesting or hacking.
  • Comfortable using the Linux command line interface (CLI).
  • Comfortable learning bits of programming code such as Python and PHP.
  • Comfortable creating virtual machines.
  • Comfortable with the English language.
Ethical Hacking - Capture the Flag Walkthroughs - v3

Curriculum

Check out the detailed breakdown of what’s inside the course

Course Overview
1 Lectures
  • play icon Course Overview 04:22 04:22
Virtual Lab Environment
1 Lectures
Tutorialspoint
Capture the Flag - EVM: 1
4 Lectures
Tutorialspoint
Capture the Flag - INFOSEC: Prep OSCP
3 Lectures
Tutorialspoint
Capture the Flag - SQL Injection to Shell Walkthrough
3 Lectures
Tutorialspoint

Instructor Details

Cliff Krahenbill

Cliff Krahenbill

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515