Pentesting Tools

Watch Pentesting Tools

  • 2015
  • 1 Season

In this series of videos, Sean and Mike talk about penetration testing. They describe how to go about setting up a penetration testing lab environment. They demonstrate several reconnaissance tools, like Ghost Phisher, Sparta and BeEF. They also spend some time discussing footprinting.

Filter by Source
No sources available
Do you have Hulu?
What are you waiting for?
Nice! Browse Hulu with Yidio.
Ad Info - This show may not be available on Hulu
Seasons
NMAP Tips & Tricks Part 2
10. NMAP Tips & Tricks Part 2
 
In this video, Sean and Mike conclude their discussion on using some functions of NMAP.
NMAP Tips & Tricks
9. NMAP Tips & Tricks
 
In this video, Sean and Mike take a look at using NMAP and how to best utilize it in aiding the new penetration tester.
Footprinting Tools
8. Footprinting Tools
 
In this video, Sean and Mike demonstrate footprinting techniques. They use DNSMap, masscan and automater to gather information about possible targets.
Web Application Scanners
7. Web Application Scanners
 
In this video, Sean and Mike discuss scanning for web application vulnerabilities. They demonstrate urlSnarf and grabber to perform web site reconnaissance. They also demonstrate WebSlayer and OWASP DirBuster, tools that do reconnaissance and attacks.
BeEF
6. BeEF
 
In this video, Sean and Mike demonstrate BeEF, the Browser Exploitation Framework. BeEF allows you to hook a web browser, and use that as a way to launch further attacks.
Sparta
5. Sparta
 
In this video, Sean and Mike demonstrate SPARTA, designed to help the penetration tester in the scanning and enumeration phase. It gives you point-and-click access to several tools in Kali Linux.
Ghost Phisher
4. Ghost Phisher
 
In this video, Sean and Mike demonstrate Ghost Phisher. Ghost Phisher is an auditing / attack tool that allows you to emulate access points, and deploy networking servers for networking, penetration testing and phishing attacks.
Reconnaissance
3. Reconnaissance
 
In this video, Sean and Mike demonstate reconnaissance tools. They use URLCrazy to look for typo squatting and URL hijacking. They use Searchsploit to search for vulnerabilities in the local exploit database on Kali Linux.
Pentest Lab Setup Part 2
2. Pentest Lab Setup Part 2
 
In this video, Sean and Mike discuss setting up a penetration testing lab. They talk about the limitations of the virtual lab environment. They show several vendor websites where the hardware can be purchased.
Pentest Lab Setup
1. Pentest Lab Setup
 
In this video, Sean and Mike discuss setting up a penetration testing lab. They talk about the advantage of virtualization and the different platforms available.
Description
  • Premiere Date
    January 1, 2015