Limit this search to....

Some Tutorials in Certified Ethical Hacking
Contributor(s): Alassouli, Hidaia Mahmood (Author)
ISBN: 1984048597     ISBN-13: 9781984048592
Publisher: Createspace Independent Publishing Platform
OUR PRICE:   $28.50  
Product Type: Paperback
Published: January 2018
Qty:
Additional Information
BISAC Categories:
- Computers | Computer Science
Physical Information: 0.17" H x 6" W x 9" (0.27 lbs) 84 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The objective of this work is to provide some quick tutorials in certified ethical hacking. The work includes the following tutorials: 1.Tutorial 1: Setting Up Penetrating Tutorial in Linux. 2.Tutorial 2: Setting Up Penetrating Tutorial in Windows. 3.Tutorial 3: OS Command Injection: 4.Tutorial 4: Basic SQL Injection Commands. 5.Tutorial 5: Manual SQL injection using order by and union select technique. 6.Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection. 7.Tutorial 7: Uploading Shell in the Site having LFI. 8.Tutorial 8: Advanced Way for Uploading Shell 9.Tutorial 9: Uploading shell Using Sqli Command. 10.Tutorial 10: Uploading Shell Using SQLmap 11.Tutorial 11: Post Based SQL Injection 12.Tutorial 12: Cracking the Hashes Using Hashcat. 13.Tutorial 13: Hacking windows 7 and 8 through Metasploite 14.Tutorial 14: Tutorial on Cross Site Scripting 15.Tutorial 15: Hacking Android Mobile Using Metasploit 16.Tutorial 16: Man of the middle attack: 17.Tutorial 17: Using SQLmap for SQL injection 18.Tutorial 18: Hide Your Ip 19.Tutorial 19: Uploading Shell and Payloads Using SQLmap 20.Tutorial 20: Using Sql Shell in SQLmap 21.Tutorial 21: Blind SQL Injection 22.Tutorial 22: Jack Hridoy SQL Injection Solution 23.Tutorial 23: Using Hydra to Get the Password\ 24.Tutorial 24: Finding the phpmyadmin page using websploit. Tutorial 25: How to root the server using back connect 25.Tutorial 25: How to root the server using back connect 26.Tutorial 26: HTML Injection 27.Tutorial 27: Tutuorial in manual Sql Injection 28.Tutorial 28: Venom psh-cmd-exe payload 29.Tutorial 29: Cross site Request Forgery (CSRF) 30.Tutorial 30: Disable Victim Computer 31.Tutorial 31: Exploit any firefox by xpi_bootstrapped addon 32.Tutorial 32: Hack android mobile with metasploit 33.Tutorial 33: PHP Code Injection to Meterpreter Session 34.Tutorial 34: Basic google operators 35.Tutorial 35: Hacking Credit Cards with google 36.Tutorial 36: Finding Vulnerable Websites in Google 37.Tutorial 37: Using the httrack to download website 38.Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper 39.Tutorial 39: Using burp suite to brute force password: Note: a lot of tutorials taken from the Pentesting with spirit Youtube web site https: //www.youtube.com/channel/UC_bzikURwRp3Vdbl3VL959Q Author: Dr. Hidaia alassouli Email: hidaia_alassouli@hotmail.com