title
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Training | Edureka

description
πŸ”΅ Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN πŸ”΅ Cyber Security Training (Use Code "π˜πŽπ”π“π”ππ„πŸπŸŽ"): https://www.edureka.co/cybersecurity-certification-training This Edureka video on "Penetration Testing" will help you understand all about penetration testing, its methodologies, and tools. Below is the list of topics covered in this session: [0:47] What is Penetration Testing? [3:44] Phases of Penetration Testing [7:32] Penetration Testing Types [12:49] Penetration Testing Tools [14:45] How to perform Penetration Testing on Kali Linux? πŸ”₯CompTIA Security+: https://bit.ly/3nxeVRl Subscribe to our channel to get video updates. Hit the subscribe button above: https://goo.gl/6ohpTV Cyber Security Playlist: https://bit.ly/2N2jlNN Cyber Security Blog Series: https://bit.ly/2AuULkP --------------------------------------------------------------------------------------------- Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka -------------------------------------------------------------------------------------------- #PenetrationTesting #EthicalHacking #CybersecurityTraining #CybersecurityCertification #Edureka About Edureka Cyber Security Training Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access. Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses. ------------------------------------------------ Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings. --------------------------------------------------- Objectives of Edureka Cyber Security Course β€’ This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on β€’ This course focuses mainly on the basics concepts of Cyber Security β€’ In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses β€’ This course will be your first step towards learning Cyber Security -------------------------------------- Who Should go for this Training? Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:- β€’ Networking Professionals β€’Linux Administrators ----------------------------------------------- Got a question on the topic? Please share it in the comment section below and our experts will answer it for you. For Cyber Security Training and Certification, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free) for more information.

detail
{'title': 'Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Training | Edureka', 'heatmap': [{'end': 338.903, 'start': 238.582, 'weight': 0.813}, {'end': 536.031, 'start': 451.774, 'weight': 0.969}, {'end': 631.933, 'start': 600.254, 'weight': 0.749}, {'end': 750.723, 'start': 720.987, 'weight': 0.73}, {'end': 1332.433, 'start': 1274.991, 'weight': 0.98}, {'end': 1473.313, 'start': 1441.377, 'weight': 1}, {'end': 1708.403, 'start': 1656.485, 'weight': 0.769}, {'end': 1781.796, 'start': 1749.681, 'weight': 0.776}], 'summary': 'This tutorial series on penetration testing covers the importance, phases, procedures, tools like nessus and metasploit, setting up virtual machines, nmap port scanning, and exploiting remote hosts and samba versions for cyber security training.', 'chapters': [{'end': 169.025, 'segs': [{'end': 52.28, 'src': 'embed', 'start': 28.508, 'weight': 2, 'content': [{'end': 36.873, 'text': 'then we will get into different phases of penetration testing, moving on, will check out different penetration testing types as well as tools, and,', 'start': 28.508, 'duration': 8.365}, {'end': 42.556, 'text': 'finally, will end this session by exploring a popular penetration testing tool called Metasploit.', 'start': 36.873, 'duration': 5.683}, {'end': 45.137, 'text': 'So I hope agenda was clear to you guys.', 'start': 42.976, 'duration': 2.161}, {'end': 46.618, 'text': "Let's get started then.", 'start': 45.597, 'duration': 1.021}, {'end': 48.599, 'text': 'So what is penetration testing?', 'start': 47.098, 'duration': 1.501}, {'end': 52.28, 'text': 'You can find essence of technology every way today.', 'start': 49.119, 'duration': 3.161}], 'summary': 'This session covers phases, types, and tools of penetration testing, including metasploit, a popular tool.', 'duration': 23.772, 'max_score': 28.508, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q28508.jpg'}, {'end': 103.26, 'src': 'embed', 'start': 75.688, 'weight': 1, 'content': [{'end': 82.343, 'text': 'Cyber criminals generally make use of loopholes present in computer systems, networks and applications to get what they want.', 'start': 75.688, 'duration': 6.655}, {'end': 85.651, 'text': 'These vulnerabilities could be due to multiple reasons.', 'start': 82.91, 'duration': 2.741}, {'end': 93.836, 'text': "Let's take a look at few of them flaws in the design of hardware and software can put business critical data at risk of exposure.", 'start': 86.072, 'duration': 7.764}, {'end': 96.237, 'text': 'If the system is poorly configured,', 'start': 94.276, 'duration': 1.961}, {'end': 103.26, 'text': 'then it can introduce loopholes through which attackers can enter into system and steal the information in matter of seconds,', 'start': 96.237, 'duration': 7.023}], 'summary': 'Cyber criminals exploit system vulnerabilities leading to data exposure and theft.', 'duration': 27.572, 'max_score': 75.688, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q75688.jpg'}, {'end': 159.999, 'src': 'embed', 'start': 135.809, 'weight': 0, 'content': [{'end': 141.791, 'text': 'this can be accomplished through an iterative process known as penetration testing, or simply known as pen test for sure.', 'start': 135.809, 'duration': 5.982}, {'end': 144.552, 'text': 'So penetration testing, in simple terms,', 'start': 142.251, 'duration': 2.301}, {'end': 152.416, 'text': 'is art of finding vulnerabilities and digging deep to find out how much a target can be compromised in case of a legitimate attack.', 'start': 144.552, 'duration': 7.864}, {'end': 153.456, 'text': 'will think of it this way.', 'start': 152.416, 'duration': 1.04}, {'end': 159.999, 'text': "It's like a bank hiring someone to dress as a burglar and try to break into the building and gain access to the world.", 'start': 153.896, 'duration': 6.103}], 'summary': 'Penetration testing is the art of finding vulnerabilities and assessing potential compromise, akin to a bank hiring someone to simulate a break-in.', 'duration': 24.19, 'max_score': 135.809, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q135809.jpg'}], 'start': 11.004, 'title': 'Penetration testing', 'summary': 'Explores the importance of penetration testing in identifying and mitigating cyber vulnerabilities, discussing the rise in cyber risks, methods used by hackers, and the iterative process of penetration testing.', 'chapters': [{'end': 169.025, 'start': 11.004, 'title': 'Penetration testing: unveiling cyber vulnerabilities', 'summary': 'Explores the importance and process of penetration testing, discussing its relevance in identifying and mitigating cyber vulnerabilities, including the rise in cyber risks, methods used by hackers, and the iterative process of penetration testing.', 'duration': 158.021, 'highlights': ['Penetration testing is the process of identifying vulnerabilities in computer systems, networks, and applications before cyber criminals can exploit them, thus helping companies to tighten their security measures.', 'Cyber criminals exploit loopholes in computer systems, networks, and applications, which can be due to flaws in design, poor configuration, unsecured networks, complex architectures, and human errors, leading to security breaches.', 'The session covers topics including the phases of penetration testing, different types of penetration testing, and tools, with a focus on a popular tool called Metasploit.']}], 'duration': 158.021, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q11004.jpg', 'highlights': ['Penetration testing helps companies tighten security measures by identifying vulnerabilities.', 'Cyber criminals exploit loopholes in computer systems, networks, and applications due to various factors, leading to security breaches.', 'The session covers phases, types, and tools of penetration testing, with a focus on Metasploit.']}, {'end': 407.406, 'segs': [{'end': 205.826, 'src': 'embed', 'start': 169.505, 'weight': 0, 'content': [{'end': 179.211, 'text': 'Similarly, the primary purpose of penetration testing is to identify any weak spots or vulnerabilities in systems defenses which attackers could take advantage of.', 'start': 169.505, 'duration': 9.706}, {'end': 186.712, 'text': 'Apart from this, the other reasons for penetration testing include to measure the compliance of organization security policy,', 'start': 179.847, 'duration': 6.865}, {'end': 194.658, 'text': "test the staff's awareness of security issues and determine whether and how the organization would response to security disasters.", 'start': 186.712, 'duration': 7.946}, {'end': 201.603, 'text': "So guys, I hope now you have a basic idea of what penetration testing is, right? Let's move on then now.", 'start': 195.238, 'duration': 6.365}, {'end': 205.826, 'text': "Let's discuss the actual process followed by penetration testers or agencies.", 'start': 201.643, 'duration': 4.183}], 'summary': 'Penetration testing aims to identify vulnerabilities, measure compliance, and test staff awareness.', 'duration': 36.321, 'max_score': 169.505, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q169505.jpg'}, {'end': 338.903, 'src': 'heatmap', 'start': 225.456, 'weight': 2, 'content': [{'end': 231.558, 'text': 'Okay So penetration tester usually begins by gathering as much information about the target as possible.', 'start': 225.456, 'duration': 6.102}, {'end': 238.422, 'text': 'Then he identifies the possible vulnerabilities in the system by scanning after which he launches an attack post-attack.', 'start': 231.899, 'duration': 6.523}, {'end': 241.803, 'text': 'He analyzes each vulnerabilities and the risk involved.', 'start': 238.582, 'duration': 3.221}, {'end': 248.426, 'text': 'Finally a detailed report is submitted to higher authorities summarizing the results of a pen test which was conducted.', 'start': 242.203, 'duration': 6.223}, {'end': 253.472, 'text': "So like I said five important phases now, let's discuss each phase in detail.", 'start': 248.906, 'duration': 4.566}, {'end': 260.581, 'text': 'So the first phase is planning in this phase attacker gathers as much information about the target as possible.', 'start': 253.973, 'duration': 6.608}, {'end': 266.328, 'text': 'The information can be IP address domain details mail servers network topology, etc.', 'start': 260.841, 'duration': 5.487}, {'end': 272.295, 'text': 'So, basically, he also decides on type of systems which are considered to be as Target,', 'start': 266.969, 'duration': 5.326}, {'end': 276.72, 'text': 'type of methods that you should use on a target to attack the system and all that.', 'start': 272.295, 'duration': 4.425}, {'end': 279.403, 'text': 'So this is very important step guys the first step.', 'start': 277.041, 'duration': 2.362}, {'end': 285.07, 'text': 'So here the pen tester or the agency literally plants everything as to what is to be done in the pen testing.', 'start': 279.704, 'duration': 5.366}, {'end': 287.992, 'text': 'Now moving on to next step, which is scanning.', 'start': 285.59, 'duration': 2.402}, {'end': 288.813, 'text': 'in this phase,', 'start': 287.992, 'duration': 0.821}, {'end': 297.079, 'text': 'attacker will interact with the target with aim to identify the loopholes or the weak points which are present in our system or a network or an application.', 'start': 288.813, 'duration': 8.266}, {'end': 303.984, 'text': 'So, basically, this face includes scanning the network with various scanning tools identification of open share drives,', 'start': 297.459, 'duration': 6.525}, {'end': 307.587, 'text': 'open FTP portals and services that are running, and much more.', 'start': 303.984, 'duration': 3.603}, {'end': 313.891, 'text': 'So in case of web application the scanning part can be the dynamic or it could be static and static scanning.', 'start': 308.047, 'duration': 5.844}, {'end': 320.756, 'text': 'The aim is to identify the vulnerable functions libraries and logic which is implemented in case of dynamic analysis.', 'start': 314.192, 'duration': 6.564}, {'end': 324.759, 'text': 'The tester will pass various inputs to application and record the responses.', 'start': 320.856, 'duration': 3.903}, {'end': 328.602, 'text': "So it's more practical way of scanning when compared to static analysis.", 'start': 325.119, 'duration': 3.483}, {'end': 332.4, 'text': 'So now moving on to next phase, which is execution phase.', 'start': 329.378, 'duration': 3.022}, {'end': 335.942, 'text': 'This is crucial step that has to be performed with due care.', 'start': 332.76, 'duration': 3.182}, {'end': 338.903, 'text': 'This is the step where actual damage is done.', 'start': 336.302, 'duration': 2.601}], 'summary': 'Penetration testing involves 5 phases: planning, scanning, and execution to identify vulnerabilities and submit a detailed report.', 'duration': 40.872, 'max_score': 225.456, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q225456.jpg'}, {'end': 351.33, 'src': 'embed', 'start': 288.813, 'weight': 5, 'content': [{'end': 297.079, 'text': 'attacker will interact with the target with aim to identify the loopholes or the weak points which are present in our system or a network or an application.', 'start': 288.813, 'duration': 8.266}, {'end': 303.984, 'text': 'So, basically, this face includes scanning the network with various scanning tools identification of open share drives,', 'start': 297.459, 'duration': 6.525}, {'end': 307.587, 'text': 'open FTP portals and services that are running, and much more.', 'start': 303.984, 'duration': 3.603}, {'end': 313.891, 'text': 'So in case of web application the scanning part can be the dynamic or it could be static and static scanning.', 'start': 308.047, 'duration': 5.844}, {'end': 320.756, 'text': 'The aim is to identify the vulnerable functions libraries and logic which is implemented in case of dynamic analysis.', 'start': 314.192, 'duration': 6.564}, {'end': 324.759, 'text': 'The tester will pass various inputs to application and record the responses.', 'start': 320.856, 'duration': 3.903}, {'end': 328.602, 'text': "So it's more practical way of scanning when compared to static analysis.", 'start': 325.119, 'duration': 3.483}, {'end': 332.4, 'text': 'So now moving on to next phase, which is execution phase.', 'start': 329.378, 'duration': 3.022}, {'end': 335.942, 'text': 'This is crucial step that has to be performed with due care.', 'start': 332.76, 'duration': 3.182}, {'end': 338.903, 'text': 'This is the step where actual damage is done.', 'start': 336.302, 'duration': 2.601}, {'end': 344.506, 'text': 'It requires special skills and techniques to launch an attack on targeted system.', 'start': 339.364, 'duration': 5.142}, {'end': 351.33, 'text': 'using these techniques and attacker will try to get data, compromise the system or launch and DOS attack Etc.', 'start': 344.506, 'duration': 6.824}], 'summary': 'Attacker aims to identify system loopholes, scanning for open drives and services, and executing attacks to compromise the system or launch a dos attack.', 'duration': 62.517, 'max_score': 288.813, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q288813.jpg'}], 'start': 169.505, 'title': 'Penetration testing', 'summary': "Covers the overview of penetration testing, its primary purpose, reasons for conducting it, the five phases of penetration testing, attacker's network scanning techniques, and the execution and analysis phases of penetration testing.", 'chapters': [{'end': 288.813, 'start': 169.505, 'title': 'Penetration testing overview', 'summary': 'Provides an overview of penetration testing, including its primary purpose, reasons for conducting penetration testing, and the five phases of penetration testing, which involve gathering information, identifying vulnerabilities, launching an attack, analyzing risks, and submitting a detailed report.', 'duration': 119.308, 'highlights': ['Penetration testing aims to identify weak spots or vulnerabilities in system defenses that attackers could exploit. Identifying weak spots or vulnerabilities is the primary purpose of penetration testing.', "Reasons for conducting penetration testing include measuring the compliance of organizational security policy, testing staff's awareness of security issues, and determining the organization's response to security disasters. Conducting penetration testing also serves to measure compliance, test staff awareness, and assess the organization's response to security disasters.", 'The five phases of penetration testing are gathering information, identifying vulnerabilities, launching an attack, analyzing risks, and submitting a detailed report. Penetration testing involves five phases: gathering information, identifying vulnerabilities, launching an attack, analyzing risks, and submitting a detailed report.', 'In the planning phase, the attacker gathers information about the target, such as IP address, domain details, mail servers, and network topology, and decides on the type of systems and methods to be used for the attack. The planning phase involves gathering information about the target and deciding on the systems and methods to be used for the attack.', 'The scanning phase involves scanning for vulnerabilities in the system. Scanning for vulnerabilities in the system is an essential phase of penetration testing.']}, {'end': 328.602, 'start': 288.813, 'title': "Attacker's network scanning", 'summary': 'Discusses how attackers interact with targets to identify loopholes, weak points, and vulnerable functions in networks, applications, and web applications, including using scanning tools, identifying open share drives and ftp portals, and dynamic and static scanning for web applications.', 'duration': 39.789, 'highlights': ['The attacker interacts with the target to identify loopholes and weak points in the system or network, including scanning for open share drives, FTP portals, and running services.', 'In web applications, the scanning can be dynamic or static, aiming to identify vulnerable functions, libraries, and logic, with practical scanning involving passing various inputs and recording responses for dynamic analysis.', 'Dynamic scanning in web applications involves passing various inputs to the application and recording the responses, providing a practical way of scanning compared to static analysis.']}, {'end': 407.406, 'start': 329.378, 'title': 'Penetration testing execution and analysis', 'summary': 'Discusses the crucial execution phase of penetration testing, emphasizing the skills and techniques required to launch an attack, followed by the analysis phase involving the collection of evidence and risk categorization for exploited vulnerabilities.', 'duration': 78.028, 'highlights': ['The execution phase is a crucial step in penetration testing, requiring special skills and techniques to launch an attack on a targeted system, aiming to compromise data, systems, or launch DOS attacks.', 'After the penetration test is complete, the analysis phase focuses on collecting evidence of exploited vulnerabilities and categorizing their associated risks, including critical, high, medium, or low effects on the system.', 'Penetration testers may provide useful information and recommendations for improving security levels, as well as categorizing discovered vulnerabilities based on their associated risks, including critical, high, medium, or low impact on the system.']}], 'duration': 237.901, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q169505.jpg', 'highlights': ['Identifying weak spots or vulnerabilities is the primary purpose of penetration testing.', "Conducting penetration testing also serves to measure compliance, test staff awareness, and assess the organization's response to security disasters.", 'Penetration testing involves five phases: gathering information, identifying vulnerabilities, launching an attack, analyzing risks, and submitting a detailed report.', 'The planning phase involves gathering information about the target and deciding on the systems and methods to be used for the attack.', 'Scanning for vulnerabilities in the system is an essential phase of penetration testing.', 'The attacker interacts with the target to identify loopholes and weak points in the system or network, including scanning for open share drives, FTP portals, and running services.', 'Dynamic scanning in web applications involves passing various inputs to the application and recording the responses, providing a practical way of scanning compared to static analysis.', 'The execution phase is a crucial step in penetration testing, requiring special skills and techniques to launch an attack on a targeted system, aiming to compromise data, systems, or launch DOS attacks.', 'After the penetration test is complete, the analysis phase focuses on collecting evidence of exploited vulnerabilities and categorizing their associated risks, including critical, high, medium, or low effects on the system.', 'Penetration testers may provide useful information and recommendations for improving security levels, as well as categorizing discovered vulnerabilities based on their associated risks, including critical, high, medium, or low impact on the system.']}, {'end': 810.224, 'segs': [{'end': 451.294, 'src': 'embed', 'start': 427.057, 'weight': 0, 'content': [{'end': 433.001, 'text': 'that analysis phase and specific vulnerabilities that were discovered and the risk levels, the process.', 'start': 427.057, 'duration': 5.944}, {'end': 437.724, 'text': 'basically, it usually has the summary of entire pen test conducted to be there in the report.', 'start': 433.001, 'duration': 4.723}, {'end': 439.289, 'text': 'So there you go guys.', 'start': 438.308, 'duration': 0.981}, {'end': 445.131, 'text': 'This is usual procedure that all kind of penetration testing agencies follow to perform penetration testing.', 'start': 439.329, 'duration': 5.802}, {'end': 451.294, 'text': 'So like I said these faces usually vary depending on organization and type of penetration test that they are conducting.', 'start': 445.531, 'duration': 5.763}], 'summary': 'Penetration testing reports include analysis, vulnerabilities, and risk levels; procedures vary by organization and test type.', 'duration': 24.237, 'max_score': 427.057, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q427057.jpg'}, {'end': 536.031, 'src': 'heatmap', 'start': 451.774, 'weight': 0.969, 'content': [{'end': 458.357, 'text': 'So there are different types of penetration testing types and you can categorize pen testing based on different strategies.', 'start': 451.774, 'duration': 6.583}, {'end': 460.238, 'text': "Let's begin by the basic ones.", 'start': 458.897, 'duration': 1.341}, {'end': 464.241, 'text': 'So first, to begin with, we have network penetration testing.', 'start': 460.798, 'duration': 3.443}, {'end': 470.207, 'text': 'it usually aims at discovering weaknesses and loopholes which are related to network infrastructure of an organization.', 'start': 464.241, 'duration': 5.966}, {'end': 477.274, 'text': 'It involves firewall configuration bypass testing stateful analysis testing DNS attacks and many others.', 'start': 470.688, 'duration': 6.586}, {'end': 484.399, 'text': 'and some of the most common software packages which are examined in this test include Secure Shell, which is SSH.', 'start': 477.874, 'duration': 6.525}, {'end': 490.924, 'text': 'Then you have SQL Server, MySQL and SMTP protocol, which is simple mail transfer protocol.', 'start': 484.839, 'duration': 6.085}, {'end': 492.445, 'text': 'Then there is file transfer protocol.', 'start': 490.964, 'duration': 1.481}, {'end': 496.748, 'text': 'Basically all the software packages are checked for any loopholes or weak points.', 'start': 492.605, 'duration': 4.143}, {'end': 499.509, 'text': 'and then there is web application penetration testing.', 'start': 497.248, 'duration': 2.261}, {'end': 501.911, 'text': 'So an application penetration testing.', 'start': 499.93, 'duration': 1.981}, {'end': 506.813, 'text': 'you check if there is any loopholes or vulnerabilities which are present in web-based application.', 'start': 501.911, 'duration': 4.902}, {'end': 510.935, 'text': 'usually, the core components of applications such as ActiveX, Silverite,', 'start': 506.813, 'duration': 4.122}, {'end': 516.498, 'text': "Java applets and api's are all examined in this phase or in this type of penetration testing.", 'start': 510.935, 'duration': 5.563}, {'end': 519.214, 'text': 'and then there is wireless penetration testing.', 'start': 517.011, 'duration': 2.203}, {'end': 524.92, 'text': 'So as the name implies this test involves examining all the wireless devices which are used in incorporation.', 'start': 519.534, 'duration': 5.386}, {'end': 528.704, 'text': 'It could be notebooks smartphones laptops, etc.', 'start': 525.46, 'duration': 3.244}, {'end': 536.031, 'text': 'Basically this test spots weak points in terms of wireless access points admin credentials and wireless protocols.', 'start': 529.144, 'duration': 6.887}], 'summary': 'Different types of penetration testing: network, web application, and wireless, aim to identify vulnerabilities in network infrastructure, software packages, and wireless devices.', 'duration': 84.257, 'max_score': 451.774, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q451774.jpg'}, {'end': 490.924, 'src': 'embed', 'start': 464.241, 'weight': 3, 'content': [{'end': 470.207, 'text': 'it usually aims at discovering weaknesses and loopholes which are related to network infrastructure of an organization.', 'start': 464.241, 'duration': 5.966}, {'end': 477.274, 'text': 'It involves firewall configuration bypass testing stateful analysis testing DNS attacks and many others.', 'start': 470.688, 'duration': 6.586}, {'end': 484.399, 'text': 'and some of the most common software packages which are examined in this test include Secure Shell, which is SSH.', 'start': 477.874, 'duration': 6.525}, {'end': 490.924, 'text': 'Then you have SQL Server, MySQL and SMTP protocol, which is simple mail transfer protocol.', 'start': 484.839, 'duration': 6.085}], 'summary': 'Security testing assesses network infrastructure weaknesses, including firewall and software packages like ssh, sql server, mysql, and smtp.', 'duration': 26.683, 'max_score': 464.241, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q464241.jpg'}, {'end': 528.704, 'src': 'embed', 'start': 501.911, 'weight': 4, 'content': [{'end': 506.813, 'text': 'you check if there is any loopholes or vulnerabilities which are present in web-based application.', 'start': 501.911, 'duration': 4.902}, {'end': 510.935, 'text': 'usually, the core components of applications such as ActiveX, Silverite,', 'start': 506.813, 'duration': 4.122}, {'end': 516.498, 'text': "Java applets and api's are all examined in this phase or in this type of penetration testing.", 'start': 510.935, 'duration': 5.563}, {'end': 519.214, 'text': 'and then there is wireless penetration testing.', 'start': 517.011, 'duration': 2.203}, {'end': 524.92, 'text': 'So as the name implies this test involves examining all the wireless devices which are used in incorporation.', 'start': 519.534, 'duration': 5.386}, {'end': 528.704, 'text': 'It could be notebooks smartphones laptops, etc.', 'start': 525.46, 'duration': 3.244}], 'summary': 'Penetration testing examines web-based app vulnerabilities, including core components and wireless devices.', 'duration': 26.793, 'max_score': 501.911, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q501911.jpg'}, {'end': 631.933, 'src': 'embed', 'start': 600.254, 'weight': 1, 'content': [{'end': 603.116, 'text': 'Well, this is one way of categorizing penetration tests.', 'start': 600.254, 'duration': 2.862}, {'end': 609.881, 'text': 'Now, there are two more ways one is based on knowledge of Target second one is based on position of penetration tester.', 'start': 603.777, 'duration': 6.104}, {'end': 616.125, 'text': 'So based on how much information a penetration tester knows we have black box gray box and white box.', 'start': 610.301, 'duration': 5.824}, {'end': 621.569, 'text': "So let's begin by white box when the penetration tester is given complete knowledge of Target.", 'start': 616.646, 'duration': 4.923}, {'end': 623.611, 'text': "It's called white box penetration test.", 'start': 621.81, 'duration': 1.801}, {'end': 631.933, 'text': 'The attacker here usually has knowledge of IP address which are controls in place different kind of components of application code samples, etc.', 'start': 624.131, 'duration': 7.802}], 'summary': 'Penetration tests are categorized by knowledge and position, including white box testing with complete target knowledge.', 'duration': 31.679, 'max_score': 600.254, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q600254.jpg'}, {'end': 631.933, 'src': 'heatmap', 'start': 600.254, 'weight': 0.749, 'content': [{'end': 603.116, 'text': 'Well, this is one way of categorizing penetration tests.', 'start': 600.254, 'duration': 2.862}, {'end': 609.881, 'text': 'Now, there are two more ways one is based on knowledge of Target second one is based on position of penetration tester.', 'start': 603.777, 'duration': 6.104}, {'end': 616.125, 'text': 'So based on how much information a penetration tester knows we have black box gray box and white box.', 'start': 610.301, 'duration': 5.824}, {'end': 621.569, 'text': "So let's begin by white box when the penetration tester is given complete knowledge of Target.", 'start': 616.646, 'duration': 4.923}, {'end': 623.611, 'text': "It's called white box penetration test.", 'start': 621.81, 'duration': 1.801}, {'end': 631.933, 'text': 'The attacker here usually has knowledge of IP address which are controls in place different kind of components of application code samples, etc.', 'start': 624.131, 'duration': 7.802}], 'summary': 'Penetration tests can be categorized as white box, gray box, or black box based on the level of information the tester has about the target.', 'duration': 31.679, 'max_score': 600.254, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q600254.jpg'}, {'end': 750.723, 'src': 'heatmap', 'start': 720.987, 'weight': 0.73, 'content': [{'end': 727.911, 'text': "It's performed by organizations IT team and penetration testing team working together then blind test in blind test.", 'start': 720.987, 'duration': 6.924}, {'end': 733.094, 'text': 'The attacker is given limited information prior to test and finally double blind test.', 'start': 727.931, 'duration': 5.163}, {'end': 737.916, 'text': 'So, as the name indicates, it takes the blind test and carries it a step further.', 'start': 733.474, 'duration': 4.442}, {'end': 744.74, 'text': 'in this type of pen test at maximum, only one or two people with an organization will have knowledge that a penetration test is happening.', 'start': 737.916, 'duration': 6.824}, {'end': 747.161, 'text': "So that's why it's called double blind pen test.", 'start': 745.1, 'duration': 2.061}, {'end': 750.723, 'text': 'Well guys, these are different ways in which you can categorize pen test.', 'start': 747.641, 'duration': 3.082}], 'summary': 'Double blind pen test involves limited information and only 1-2 people aware of the test.', 'duration': 29.736, 'max_score': 720.987, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q720987.jpg'}, {'end': 802.678, 'src': 'embed', 'start': 772.693, 'weight': 2, 'content': [{'end': 773.954, 'text': "First of all, let's discuss.", 'start': 772.693, 'duration': 1.261}, {'end': 775.915, 'text': 'Why do we actually need these tools?', 'start': 774.294, 'duration': 1.621}, {'end': 782.974, 'text': 'Well, obviously they save a lot of time and effort, so tools will identify this loophole so that you can work on the next stage.', 'start': 776.613, 'duration': 6.361}, {'end': 788.895, 'text': 'They are more accurate with their findings, and a penetration tester cannot be an expert in all phases, right?', 'start': 783.354, 'duration': 5.541}, {'end': 793.316, 'text': 'So he can use different kind of tools to perform advanced analysis in each phase.', 'start': 789.215, 'duration': 4.101}, {'end': 798.377, 'text': 'Now these tools can gather a lot of information and they can report it to tester very easily.', 'start': 793.776, 'duration': 4.601}, {'end': 802.678, 'text': 'So this data is usually used by internal teams to create strong architecture.', 'start': 798.717, 'duration': 3.961}], 'summary': 'Security tools save time, enhance accuracy, and enable advanced analysis for strong architecture.', 'duration': 29.985, 'max_score': 772.693, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q772693.jpg'}], 'start': 407.586, 'title': 'Penetration testing procedures and categorization', 'summary': 'Provides insights into typical penetration testing procedures involving detailed reports, types of tests, and targeted vulnerabilities, as well as various categorization methods including white box, black box, and gray box tests, highlighting the importance of tools in saving time and effort.', 'chapters': [{'end': 599.49, 'start': 407.586, 'title': 'Penetration testing procedures', 'summary': 'Discusses the usual procedure followed by penetration testing agencies, including the compilation of detailed reports, types of penetration testing, and the vulnerabilities targeted, varying depending on organization and test type.', 'duration': 191.904, 'highlights': ['The compilation of detailed reports, including recommendations, specific vulnerabilities, and risk levels, is a crucial last step in the penetration testing process.', "Network penetration testing involves discovering weaknesses and loopholes related to an organization's network infrastructure, such as firewall configuration bypass testing and DNS attacks.", 'Web application penetration testing examines core application components like ActiveX, Silverite, Java applets, and APIs for vulnerabilities.', 'Wireless penetration testing focuses on spotting weak points in wireless access points, admin credentials, and wireless protocols used in an organization.', 'Social engineering penetration testing involves attempting to obtain sensitive information by tricking employees, including remote testing via electronic means and physical testing through direct threats or blackmail.']}, {'end': 810.224, 'start': 600.254, 'title': 'Categorizing penetration tests', 'summary': 'Discusses different ways to categorize penetration tests based on the knowledge of the target and the position of the penetration tester, including types such as white box, black box, gray box, external, internal, targeted, blind, and double blind tests, as well as the importance of penetration testing tools in saving time and effort, improving accuracy, and automating manual tasks.', 'duration': 209.97, 'highlights': ['Different Ways of Categorizing Penetration Tests The chapter explains the categorization of penetration tests based on the knowledge of the target and the position of the penetration tester, including types such as white box, black box, gray box, external, internal, targeted, blind, and double blind tests.', 'Importance of Penetration Testing Tools The chapter emphasizes the importance of penetration testing tools in saving time and effort, improving accuracy, and automating manual tasks, as well as their ability to gather and report information to testers easily.']}], 'duration': 402.638, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q407586.jpg', 'highlights': ['The compilation of detailed reports, including recommendations, specific vulnerabilities, and risk levels, is a crucial last step in the penetration testing process.', 'Different Ways of Categorizing Penetration Tests The chapter explains the categorization of penetration tests based on the knowledge of the target and the position of the penetration tester, including types such as white box, black box, gray box, external, internal, targeted, blind, and double blind tests.', 'Importance of Penetration Testing Tools The chapter emphasizes the importance of penetration testing tools in saving time and effort, improving accuracy, and automating manual tasks, as well as their ability to gather and report information to testers easily.', "Network penetration testing involves discovering weaknesses and loopholes related to an organization's network infrastructure, such as firewall configuration bypass testing and DNS attacks.", 'Web application penetration testing examines core application components like ActiveX, Silverite, Java applets, and APIs for vulnerabilities.']}, {'end': 1571.074, 'segs': [{'end': 835.803, 'src': 'embed', 'start': 810.224, 'weight': 1, 'content': [{'end': 817.59, 'text': 'if I have to summarize in single step, this penetration testing tools makes conducting a penetration test easy for a penetration tester.', 'start': 810.224, 'duration': 7.366}, {'end': 822.755, 'text': 'Well, there are a lot of popular penetration testing tools and a lot of them are free and open-source software.', 'start': 817.811, 'duration': 4.944}, {'end': 827.658, 'text': 'Some of the most widely used free or open-source pen testing tools include Nessus.', 'start': 823.215, 'duration': 4.443}, {'end': 830.48, 'text': "It's a network or web application scanner.", 'start': 827.998, 'duration': 2.482}, {'end': 835.803, 'text': 'It can perform different types of scans and help a penetration tester identify vulnerabilities present.', 'start': 830.82, 'duration': 4.983}], 'summary': 'Nessus is a popular penetration testing tool that makes conducting tests easy for testers, offering various types of scans and helping identify vulnerabilities.', 'duration': 25.579, 'max_score': 810.224, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q810224.jpg'}, {'end': 876.968, 'src': 'embed', 'start': 851.235, 'weight': 6, 'content': [{'end': 858.686, 'text': "It's short for network mapper is a port scanner that scan systems and networks for vulnerabilities which are present in open boots,", 'start': 851.235, 'duration': 7.451}, {'end': 863.713, 'text': 'and then there are wireshark, open SSL, John the Ripper, Kane and Abel and many others.', 'start': 858.686, 'duration': 5.027}, {'end': 871.786, 'text': 'So, guys, at this point you must know what penetration testing is different phases involved in performing a penetration test,', 'start': 864.583, 'duration': 7.203}, {'end': 876.968, 'text': 'different types of penetration testing, different categories of penetration test and, finally,', 'start': 871.786, 'duration': 5.182}], 'summary': 'Network mapper is a port scanner used for penetration testing, along with other tools like wireshark, open ssl, john the ripper, and kane and abel.', 'duration': 25.733, 'max_score': 851.235, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q851235.jpg'}, {'end': 940.804, 'src': 'embed', 'start': 917.051, 'weight': 2, 'content': [{'end': 925.655, 'text': 'If you know how to use it a skilled attacker can generate payloads shell codes gain access and perform privileged escalation attacks with this tool.', 'start': 917.051, 'duration': 8.604}, {'end': 928.937, 'text': 'As you can see there are different ways you can access Metasploit.', 'start': 926.215, 'duration': 2.722}, {'end': 930.938, 'text': "There's something called Armitage.", 'start': 929.277, 'duration': 1.661}, {'end': 935.441, 'text': "It's a fantastic Java based graphical user interface for Metasploit framework.", 'start': 931.058, 'duration': 4.383}, {'end': 938.342, 'text': "Then there's MSF console, which we will use today.", 'start': 935.701, 'duration': 2.641}, {'end': 940.804, 'text': "It's a command line way of accessing Metasploit.", 'start': 938.783, 'duration': 2.021}], 'summary': 'Metasploit offers various access methods: armitage, a java-based gui, and msf console, a command-line tool.', 'duration': 23.753, 'max_score': 917.051, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q917051.jpg'}, {'end': 1037.108, 'src': 'embed', 'start': 993.408, 'weight': 0, 'content': [{'end': 998.633, 'text': 'So to perform and web application penetration testing or a penetration testing in general.', 'start': 993.408, 'duration': 5.225}, {'end': 1001.396, 'text': 'We need to set up a penetration testing environment.', 'start': 998.893, 'duration': 2.503}, {'end': 1005.517, 'text': "For that we'll be downloading a virtual machine called Kali Linux.", 'start': 1001.972, 'duration': 3.545}, {'end': 1008.761, 'text': "It's a virtual operating system to perform penetration testing.", 'start': 1005.877, 'duration': 2.884}, {'end': 1010.844, 'text': 'So just search for Kali Linux.', 'start': 1009.202, 'duration': 1.642}, {'end': 1014.669, 'text': "As you can see, it's the official website click on that.", 'start': 1011.945, 'duration': 2.724}, {'end': 1016.342, 'text': 'So, basically,', 'start': 1015.842, 'duration': 0.5}, {'end': 1027.406, 'text': 'this Kali Linux is a virtual operating system which contains different actually 600 plus tools to perform penetration testing and four and six in cyber security or ethical hacking.', 'start': 1016.342, 'duration': 11.064}, {'end': 1032.567, 'text': 'If you want to know more about Kali Linux or how to install it and how to use different tools in Kali Linux.', 'start': 1027.606, 'duration': 4.961}, {'end': 1035.989, 'text': "There's a video by Edureka in the cyber security playlist.", 'start': 1032.848, 'duration': 3.141}, {'end': 1037.108, 'text': 'Please do refer to that.', 'start': 1036.289, 'duration': 0.819}], 'summary': 'Set up a kali linux virtual machine with 600+ tools for penetration testing.', 'duration': 43.7, 'max_score': 993.408, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q993408.jpg'}, {'end': 1261.925, 'src': 'embed', 'start': 1230.695, 'weight': 4, 'content': [{'end': 1237.237, 'text': "So, as you can see, I'm using bridge connection here, which already set up, and click on OK and let me power up metasploitable tools.", 'start': 1230.695, 'duration': 6.542}, {'end': 1239.318, 'text': 'same goes for that as well settings.', 'start': 1237.237, 'duration': 2.081}, {'end': 1245.62, 'text': 'So yeah, so you can see the network connection both the options are set to bridged.', 'start': 1240.939, 'duration': 4.681}, {'end': 1247.601, 'text': "So I'm going to power up this as well.", 'start': 1246.101, 'duration': 1.5}, {'end': 1250.162, 'text': 'While this is powering up.', 'start': 1248.901, 'duration': 1.261}, {'end': 1253.663, 'text': 'Let me show you something in the Kali Linux part if I maximize.', 'start': 1250.202, 'duration': 3.461}, {'end': 1261.925, 'text': "Okay So let's go to terminal here before that as you can see this is Kali Linux homepage.", 'start': 1255.244, 'duration': 6.681}], 'summary': 'Demonstrating bridge connection setup and powering up metasploitable tools in kali linux.', 'duration': 31.23, 'max_score': 1230.695, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1230695.jpg'}, {'end': 1332.433, 'src': 'heatmap', 'start': 1274.991, 'weight': 0.98, 'content': [{'end': 1280.734, 'text': "and yes, so terminal, there's a command call, if config, to know the IP address of your virtual machine.", 'start': 1274.991, 'duration': 5.743}, {'end': 1286.646, 'text': "So if config So as you can see the IP address is this that's 192.168.", 'start': 1280.754, 'duration': 5.892}, {'end': 1288.718, 'text': "1.1 and it's the net mask address.", 'start': 1286.646, 'duration': 2.072}, {'end': 1291.539, 'text': "Now, let's go back to metasploitable2.", 'start': 1289.338, 'duration': 2.201}, {'end': 1293.94, 'text': "It's powered up maximize.", 'start': 1292.64, 'duration': 1.3}, {'end': 1300.224, 'text': "So it's asking for the login as you can see it says login with msfadmin and msfadmin for the password as well.", 'start': 1294.781, 'duration': 5.443}, {'end': 1304.155, 'text': 'So msfadmin Passport is also same.', 'start': 1300.504, 'duration': 3.651}, {'end': 1307.098, 'text': 'So we are into metasploitable.', 'start': 1304.695, 'duration': 2.403}, {'end': 1310.881, 'text': "So, here again, I'm using if config command to know the IP address.", 'start': 1307.698, 'duration': 3.183}, {'end': 1317.928, 'text': "config, as you can see, right now it's connected to Ethernet and it doesn't have an IP address assigned to it for that.", 'start': 1310.881, 'duration': 7.047}, {'end': 1322.732, 'text': "I'm going to change and make sure that it falls in the same subnet as that of Kali Linux.", 'start': 1317.968, 'duration': 4.764}, {'end': 1332.433, 'text': 'So pseudo for the root access if config again, and the IP address the NAT which you want to change here is ATH0 or the network card.', 'start': 1323.252, 'duration': 9.181}], 'summary': "Using 'ifconfig' command to obtain and configure ip addresses for virtual machines.", 'duration': 57.442, 'max_score': 1274.991, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1274991.jpg'}, {'end': 1473.313, 'src': 'heatmap', 'start': 1441.377, 'weight': 1, 'content': [{'end': 1445.279, 'text': "Well, the directory where they're stored is let me just open new tab.", 'start': 1441.377, 'duration': 3.902}, {'end': 1448.38, 'text': "It's CD under user share.", 'start': 1445.939, 'duration': 2.441}, {'end': 1451.006, 'text': 'Let me just type LS here.', 'start': 1449.344, 'duration': 1.662}, {'end': 1458.852, 'text': 'You can see Metasploit framework open that CD just copy it and paste and paste click enter and LS.', 'start': 1451.046, 'duration': 7.806}, {'end': 1461.214, 'text': 'Let me clear the screen LS.', 'start': 1459.393, 'duration': 1.821}, {'end': 1465.978, 'text': 'So we are under Metasploit framework directory under that you have something called modules here.', 'start': 1461.615, 'duration': 4.363}, {'end': 1473.313, 'text': 'So if you go to modules and LS, it lists out all the six modules which we just saw earlier.', 'start': 1466.639, 'duration': 6.674}], 'summary': 'Navigating to metasploit framework directory, 6 modules listed.', 'duration': 31.936, 'max_score': 1441.377, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1441377.jpg'}, {'end': 1510.88, 'src': 'embed', 'start': 1481.974, 'weight': 5, 'content': [{'end': 1487.575, 'text': 'You can take advantage of vulnerabilities which are present in system or any network or any application.', 'start': 1481.974, 'duration': 5.601}, {'end': 1491.516, 'text': 'So to begin with we have something called exploit in the demo part.', 'start': 1488.055, 'duration': 3.461}, {'end': 1497.917, 'text': "We'll see how to make use of this exploit module and get access into our Metasploitable host from Kali Linux.", 'start': 1491.536, 'duration': 6.381}, {'end': 1502.698, 'text': 'CD exploit in LS.', 'start': 1498.497, 'duration': 4.201}, {'end': 1510.88, 'text': 'So this lists out different exploits in terms of operating system as you can see I have Apple iOS here.', 'start': 1504.318, 'duration': 6.562}], 'summary': 'Exploit vulnerabilities to access metasploitable from kali linux', 'duration': 28.906, 'max_score': 1481.974, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1481974.jpg'}], 'start': 810.224, 'title': 'Penetration testing and setting up virtual machines', 'summary': 'Covers popular penetration testing tools such as nessus, metasploit, and nmap, emphasizing their capabilities and the importance of setting up a penetration testing environment with kali linux. it also outlines the process of setting up virtual machines for penetration testing, including downloading necessary software like kali linux and metasploitable 2, configuring network settings, and using metasploit modules for exploiting vulnerabilities.', 'chapters': [{'end': 1073.465, 'start': 810.224, 'title': 'Penetration testing and tools', 'summary': 'Discusses popular penetration testing tools such as nessus, metasploit, and nmap, emphasizing their capabilities and the importance of setting up a penetration testing environment with kali linux.', 'duration': 263.241, 'highlights': ['Nessus is a widely used network or web application scanner that can perform different types of scans to identify vulnerabilities. Nessus is a popular penetration testing tool used as a network or web application scanner to identify vulnerabilities through various types of scans.', 'Metasploit, an exploitation framework, enables skilled attackers to generate payloads, shell codes, gain access, and perform privilege escalation attacks. Metasploit is an exploitation framework that empowers skilled attackers to generate payloads, shell codes, gain access, and execute privilege escalation attacks.', 'nmap, a popular port scanner, is used to scan systems and networks for vulnerabilities, particularly in open ports. nmap, a popular port scanner, is utilized to scan systems and networks for vulnerabilities, especially in open ports.', 'Kali Linux is a virtual operating system with over 600 tools for penetration testing and cybersecurity. Kali Linux is a virtual operating system equipped with over 600 tools for penetration testing and cybersecurity purposes.']}, {'end': 1571.074, 'start': 1073.465, 'title': 'Setting up virtual machines for penetration testing', 'summary': 'Outlines the process of setting up virtual machines for penetration testing, including downloading necessary software like kali linux and metasploitable 2, configuring network settings, and using metasploit modules for exploiting vulnerabilities.', 'duration': 497.609, 'highlights': ['The process of setting up virtual machines for penetration testing is outlined, including downloading Kali Linux and Metasploitable 2. The chapter discusses the process of downloading Kali Linux and Metasploitable 2 for setting up virtual machines for penetration testing.', 'Configuring network settings for virtual machines is explained, emphasizing the use of bridge connection to enable interaction between machines. The importance of configuring network settings, particularly using a bridge connection to allow interaction between virtual machines, is emphasized.', 'The usage of Metasploit modules for exploiting vulnerabilities is demonstrated, including the organization of modules and their purposes. The chapter explains the usage of Metasploit modules for exploiting vulnerabilities, detailing their organization and respective purposes.']}], 'duration': 760.85, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q810224.jpg', 'highlights': ['Kali Linux is a virtual operating system with over 600 tools for penetration testing and cybersecurity.', 'Nessus is a widely used network or web application scanner that can perform different types of scans to identify vulnerabilities.', 'Metasploit, an exploitation framework, enables skilled attackers to generate payloads, shell codes, gain access, and perform privilege escalation attacks.', 'The process of setting up virtual machines for penetration testing is outlined, including downloading Kali Linux and Metasploitable 2.', 'Configuring network settings for virtual machines is explained, emphasizing the use of bridge connection to enable interaction between machines.', 'The usage of Metasploit modules for exploiting vulnerabilities is demonstrated, including the organization of modules and their purposes.', 'Nmap, a popular port scanner, is used to scan systems and networks for vulnerabilities, particularly in open ports.']}, {'end': 1951.035, 'segs': [{'end': 1615.42, 'src': 'embed', 'start': 1591.189, 'weight': 1, 'content': [{'end': 1598.452, 'text': 'So basically it lists out all the options which we have under nmap and at the end it even shows the examples of how to use nmap.', 'start': 1591.189, 'duration': 7.263}, {'end': 1601.013, 'text': 'Well, if you exclude all the commands here,', 'start': 1598.772, 'duration': 2.241}, {'end': 1607.977, 'text': 'the basic thing that you can do is nmap and the IP address or the website whichever you want to scan for as for this demo will be using two options,', 'start': 1601.013, 'duration': 6.964}, {'end': 1609.537, 'text': 'which is, I find we command here.', 'start': 1607.977, 'duration': 1.56}, {'end': 1615.42, 'text': 'You can see it prints the version number and I find smallest which is nothing but used for scanning.', 'start': 1609.557, 'duration': 5.863}], 'summary': 'The transcript explains options and examples for using nmap for scanning ip addresses or websites.', 'duration': 24.231, 'max_score': 1591.189, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1591189.jpg'}, {'end': 1722.367, 'src': 'heatmap', 'start': 1656.485, 'weight': 2, 'content': [{'end': 1662.553, 'text': "It doesn't list much information, but it just lists out the number of clothes which are closed and all the ports which are open.", 'start': 1656.485, 'duration': 6.068}, {'end': 1665.978, 'text': 'as you can see, we have FTP at port number 21, SSH at 22 default ports.', 'start': 1662.553, 'duration': 3.425}, {'end': 1677.163, 'text': 'Then you have net BIOS or Microsoft DS at 139 and 445 port, MySQL at so-and-so, port number and PostgreSQL, and all that now,', 'start': 1667.66, 'duration': 9.503}, {'end': 1683.045, 'text': "if you want to perform an aggressive scanning and map, I've seen, as we like we discussed earlier and IP address.", 'start': 1677.163, 'duration': 5.882}, {'end': 1686.907, 'text': "It's starting but it's going to take a minute.", 'start': 1685.026, 'duration': 1.881}, {'end': 1688.247, 'text': "I'll get back to you once it's done.", 'start': 1686.927, 'duration': 1.32}, {'end': 1692.409, 'text': 'So as you can see the aggressive scanning is done here.', 'start': 1689.807, 'duration': 2.602}, {'end': 1699.696, 'text': 'So, basically what we did is we need to find out the ports and the services which are running on a target system which is metasploitable to.', 'start': 1692.77, 'duration': 6.926}, {'end': 1704.04, 'text': "that's why we use the command call and map and I finesse view options for detail scanning.", 'start': 1699.696, 'duration': 4.344}, {'end': 1708.403, 'text': 'So as you can see it chose the version of each and every service for FTP.', 'start': 1704.42, 'duration': 3.983}, {'end': 1711.204, 'text': 'This is the version and for mysql.', 'start': 1708.463, 'duration': 2.741}, {'end': 1718.106, 'text': "This is the version that's running on our target system, which is metasploitable to then you have Samba watch will be using in this demo the Samba.", 'start': 1711.244, 'duration': 6.862}, {'end': 1722.367, 'text': "It's a free software re-implementation of SMB networking protocol.", 'start': 1718.226, 'duration': 4.141}], 'summary': 'Transcript details port numbers and services on metasploitable system, including ftp, ssh, netbios, mysql, and postgresql.', 'duration': 65.882, 'max_score': 1656.485, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1656485.jpg'}, {'end': 1788.72, 'src': 'heatmap', 'start': 1742.675, 'weight': 0, 'content': [{'end': 1749.601, 'text': 'So if you want to run a Samba server the firewall of the box would need to be open to allow these ports in in this demo.', 'start': 1742.675, 'duration': 6.926}, {'end': 1757.927, 'text': "I'll show you how to find out the version of this Samba, making use of different modules like auxiliaries and exploits, which we just learned earlier.", 'start': 1749.681, 'duration': 8.246}, {'end': 1763.251, 'text': 'apart from that, as you can see, it says, it took about 96.14 seconds to perform the entire scan and all that.', 'start': 1757.927, 'duration': 5.324}, {'end': 1764.672, 'text': 'So let me clear the screen.', 'start': 1763.691, 'duration': 0.981}, {'end': 1774.133, 'text': "Now, I just want to see what are the modules which are listed under Samba so that I'm using search S A M B A and it's going to take a while.", 'start': 1766.349, 'duration': 7.784}, {'end': 1780.076, 'text': "So as you can see, it's search for different modules which are present under Samba.", 'start': 1775.113, 'duration': 4.963}, {'end': 1781.796, 'text': 'We have auxiliary module.', 'start': 1780.476, 'duration': 1.32}, {'end': 1788.72, 'text': 'We have exploit as well, and one post, your, and, as you can see, it also specifies the disclosure rate rank,', 'start': 1781.857, 'duration': 6.863}], 'summary': 'Samba server scan took 96.14 seconds, listing auxiliary modules, exploits, and disclosure rate rank.', 'duration': 46.045, 'max_score': 1742.675, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1742675.jpg'}], 'start': 1571.949, 'title': 'Nmap port scanning and exploiting metasploitable 2', 'summary': 'Introduces nmap, a network mapping tool for scanning systems and networks, explaining basic commands, and covers scanning the host os metasploitable 2 using nmap, with basic scan taking 0.38 seconds and aggressive scanning taking 96.14 seconds, identifying open ports and services like ftp, ssh, samba, and smb, and utilizing auxiliary and exploit modules to detect and exploit the versions of these services.', 'chapters': [{'end': 1635.711, 'start': 1571.949, 'title': 'Nmap port scanning', 'summary': 'Introduces nmap, a network mapping tool that scans systems and networks for vulnerabilities linked to open ports, providing a list of open and closed ports, and explains the basic commands and options for using nmap.', 'duration': 63.762, 'highlights': ['Nmap is a port scanner tool used for scanning systems and networks for vulnerabilities linked to open ports, and it provides a list of open and closed ports.', "The basic command to use Nmap is 'nmap' followed by the IP address or website to be scanned, with options like 'i' and 'SV' providing version information and type of scanning, respectively.", "The 'hyphen SV' command is used for service version detection, probing open ports to determine service or version information."]}, {'end': 1951.035, 'start': 1637.013, 'title': 'Scanning and exploiting metasploitable 2', 'summary': 'Covers scanning the host operating system metasploitable 2 using nmap, with a basic scan taking 0.38 seconds and aggressive scanning taking 96.14 seconds, identifying open ports and services such as ftp, ssh, samba, and smb, and utilizing auxiliary and exploit modules to detect and exploit the versions of these services.', 'duration': 314.022, 'highlights': ['Aggressive scanning took 96.14 seconds, identifying open ports and services like FTP, SSH, Samba, and SMB. Aggressive scanning of the host operating system Metasploitable 2 using Nmap took 96.14 seconds, revealing open ports for FTP, SSH, Samba, and SMB.', 'Basic scan took 0.38 seconds, listing closed and open ports like FTP at port 21, SSH at 22, Samba at ports 139 and 445, MySQL, and PostgreSQL. A basic scan of the host operating system Metasploitable 2 using Nmap took 0.38 seconds, listing closed and open ports such as FTP at port 21, SSH at port 22, Samba at ports 139 and 445, MySQL, and PostgreSQL.', 'Utilizing auxiliary and exploit modules to detect and exploit the versions of services like FTP, MySQL, and Samba. Using auxiliary and exploit modules to detect and exploit the versions of services like FTP, MySQL, and Samba on the target system Metasploitable 2.']}], 'duration': 379.086, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1571949.jpg', 'highlights': ['Aggressive scanning took 96.14 seconds, identifying open ports and services like FTP, SSH, Samba, and SMB.', "The basic command to use Nmap is 'nmap' followed by the IP address or website to be scanned, with options like 'i' and 'SV' providing version information and type of scanning, respectively.", 'Utilizing auxiliary and exploit modules to detect and exploit the versions of services like FTP, MySQL, and Samba.']}, {'end': 2393.575, 'segs': [{'end': 1976.185, 'src': 'embed', 'start': 1951.675, 'weight': 2, 'content': [{'end': 1961.799, 'text': 'So show options as you can see in my remote host is now set to our host target system, which is not exploitable to IP address now use the command run.', 'start': 1951.675, 'duration': 10.124}, {'end': 1967.702, 'text': "So, as you can see, this is the target system and version which we're using.", 'start': 1962.9, 'duration': 4.802}, {'end': 1968.902, 'text': 'is this so?', 'start': 1967.702, 'duration': 1.2}, {'end': 1972.183, 'text': 'now we know how to find the version of the host system?', 'start': 1968.902, 'duration': 3.281}, {'end': 1976.185, 'text': 'as you can see, we have made use of auxiliary module here and found out the version.', 'start': 1972.183, 'duration': 4.002}], 'summary': 'Identified target system version using auxiliary module.', 'duration': 24.51, 'max_score': 1951.675, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1951675.jpg'}, {'end': 2034.444, 'src': 'embed', 'start': 2003.297, 'weight': 3, 'content': [{'end': 2007.967, 'text': 'So yeah, we already gone through all the modules and also let me just jump to search Samba.', 'start': 2003.297, 'duration': 4.67}, {'end': 2012.957, 'text': "As you can see it's already performed the scanning.", 'start': 2011.213, 'duration': 1.744}, {'end': 2017.899, 'text': "So yeah, different modules auxiliary, which we've already gone through to find out the version.", 'start': 2013.698, 'duration': 4.201}, {'end': 2022.821, 'text': "now let's go through the other module, which is exploit, since we are already using the module.", 'start': 2017.899, 'duration': 4.922}, {'end': 2025.001, 'text': "Let's just go for one which is excellent ranking.", 'start': 2022.841, 'duration': 2.16}, {'end': 2027.622, 'text': 'So here which is user map script.', 'start': 2025.461, 'duration': 2.161}, {'end': 2034.444, 'text': 'So as for the description it basically allows us to get access to our target system from the skull Linux.', 'start': 2028.062, 'duration': 6.382}], 'summary': 'Scanning and exploiting samba modules to gain access to the target system from the skull linux.', 'duration': 31.147, 'max_score': 2003.297, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q2003297.jpg'}, {'end': 2106.46, 'src': 'embed', 'start': 2072.856, 'weight': 0, 'content': [{'end': 2074.518, 'text': 'Then you have certain basic options.', 'start': 2072.856, 'duration': 1.662}, {'end': 2078.661, 'text': "Let's just go through description to see what actually this module does.", 'start': 2074.998, 'duration': 3.663}, {'end': 2084.106, 'text': 'So as you can see this module exploits a command execution vulnerability in Samba version.', 'start': 2079.061, 'duration': 5.045}, {'end': 2088.288, 'text': 'The configuration which uses to perform that is username map script.', 'start': 2084.525, 'duration': 3.763}, {'end': 2095.012, 'text': 'So basically but specifying a username containing shell meta characters attackers can execute arbitrary commands.', 'start': 2088.608, 'duration': 6.404}, {'end': 2100.835, 'text': "So basically we don't need any authentication to get into our metasploitable host or the target operating system.", 'start': 2095.472, 'duration': 5.363}, {'end': 2106.46, 'text': "So in simple terms, we're using this module to get access to my display will do from this host operating system.", 'start': 2101.355, 'duration': 5.105}], 'summary': 'Exploiting samba version vulnerability for arbitrary command execution without authentication.', 'duration': 33.604, 'max_score': 2072.856, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q2072856.jpg'}, {'end': 2308.235, 'src': 'embed', 'start': 2277.866, 'weight': 1, 'content': [{'end': 2282.709, 'text': 'So right now it says hacker me which we just created has been added to our target system.', 'start': 2277.866, 'duration': 4.843}, {'end': 2293.487, 'text': "Now let me just open terminal and we'll be using SSH to connect to our host and to login as user username which was hacker me at IP address 192.168..", 'start': 2283.23, 'duration': 10.257}, {'end': 2293.977, 'text': '1.2 and click.', 'start': 2293.487, 'duration': 0.49}, {'end': 2303.933, 'text': "So we are in it's asking for the password which was hacker EM.", 'start': 2300.931, 'duration': 3.002}, {'end': 2305.554, 'text': 'There we go guys.', 'start': 2304.873, 'duration': 0.681}, {'end': 2306.634, 'text': 'We are into system now.', 'start': 2305.594, 'duration': 1.04}, {'end': 2308.235, 'text': 'It says hack me.', 'start': 2307.035, 'duration': 1.2}], 'summary': "Hacker 'me' added to target system, ssh connected successfully, logged in as 'hacker me', and gained access to the system.", 'duration': 30.369, 'max_score': 2277.866, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q2277866.jpg'}, {'end': 2349.745, 'src': 'embed', 'start': 2328.349, 'weight': 4, 'content': [{'end': 2343.2, 'text': 'We learned about different ports which are open in our target system and then we learn different version identification for those ports and then we search for different exploit on those systems and exploited them and gained control of the system which is metasploitable in our case.', 'start': 2328.349, 'duration': 14.851}, {'end': 2344.861, 'text': 'So I try it out.', 'start': 2343.74, 'duration': 1.121}, {'end': 2349.745, 'text': "If you have any doubts post them in the comment session, just don't stick with this exploit.", 'start': 2345.241, 'duration': 4.504}], 'summary': 'Identified open ports, found exploits, and gained control of metasploitable system.', 'duration': 21.396, 'max_score': 2328.349, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q2328349.jpg'}], 'start': 1951.675, 'title': 'Exploiting remote hosts and samba versions', 'summary': 'Demonstrates exploiting remote hosts using metasploit, auxiliary and exploit modules, and exploiting samba versions to gain unauthorized access, providing details on the process, successful system access, and gaining root access.', 'chapters': [{'end': 2025.001, 'start': 1951.675, 'title': 'Remote host exploitation', 'summary': 'Demonstrates the process of finding the version of a remote host using metasploit, utilizing auxiliary and exploit modules, and performing scanning, highlighting the use of commands and modules.', 'duration': 73.326, 'highlights': ['The chapter demonstrates the process of finding the version of a remote host using Metasploit.', 'Auxiliary module is used to find out the version of the host system.', 'Exploit module is used to exploit the vulnerabilities present in the target system.', 'Performing scanning and using different modules like auxiliary and exploit are highlighted.']}, {'end': 2393.575, 'start': 2025.461, 'title': 'Exploiting samba version for system access', 'summary': 'Demonstrates the exploitation of a samba version to gain unauthorized access to the target system, providing details on the module, exploitation process, and successful system access, highlighting the exploitation of a command execution vulnerability in samba version and gaining root access to the target system.', 'duration': 368.114, 'highlights': ['The module exploits a command execution vulnerability in Samba version, allowing arbitrary commands to be executed, enabling unauthorized system access. The module exploits a command execution vulnerability in Samba version, allowing arbitrary commands to be executed, enabling unauthorized system access.', 'Gained root access to the target system, allowing the creation of a new user and successful SSH login, showcasing the unauthorized system access and control. Gained root access to the target system, allowing the creation of a new user and successful SSH login, showcasing the unauthorized system access and control.', 'Scanned the entire system, identified open ports and versions, searched for exploits, and successfully gained control of the system, providing a comprehensive approach to system exploitation. Scanned the entire system, identified open ports and versions, searched for exploits, and successfully gained control of the system, providing a comprehensive approach to system exploitation.']}], 'duration': 441.9, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/CktYFft7K8Q/pics/CktYFft7K8Q1951675.jpg', 'highlights': ['Exploiting Samba version to gain unauthorized system access and execute arbitrary commands.', 'Gained root access, created a new user, and successfully logged in via SSH, showcasing unauthorized system access and control.', 'Demonstrating the process of finding the version of a remote host using Metasploit.', 'Performing scanning and using different modules like auxiliary and exploit are highlighted.', 'Scanned the entire system, identified open ports and versions, searched for exploits, and successfully gained control of the system.']}], 'highlights': ['Penetration testing helps companies tighten security measures by identifying vulnerabilities.', 'Identifying weak spots or vulnerabilities is the primary purpose of penetration testing.', 'The session covers phases, types, and tools of penetration testing, with a focus on Metasploit.', "Conducting penetration testing also serves to measure compliance, test staff awareness, and assess the organization's response to security disasters.", 'Penetration testing involves five phases: gathering information, identifying vulnerabilities, launching an attack, analyzing risks, and submitting a detailed report.', 'The attacker interacts with the target to identify loopholes and weak points in the system or network, including scanning for open share drives, FTP portals, and running services.', 'The compilation of detailed reports, including recommendations, specific vulnerabilities, and risk levels, is a crucial last step in the penetration testing process.', 'Kali Linux is a virtual operating system with over 600 tools for penetration testing and cybersecurity.', 'Nessus is a widely used network or web application scanner that can perform different types of scans to identify vulnerabilities.', 'Metasploit, an exploitation framework, enables skilled attackers to generate payloads, shell codes, gain access, and perform privilege escalation attacks.', 'Aggressive scanning took 96.14 seconds, identifying open ports and services like FTP, SSH, Samba, and SMB.', 'Exploiting Samba version to gain unauthorized system access and execute arbitrary commands.', 'Gained root access, created a new user, and successfully logged in via SSH, showcasing unauthorized system access and control.']}