Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
*Special thanks to klauslippo for timestamping
0:00 - Introduction and TCP vs UDP
7:55 - 3-Way Handshake & Wireshark
12:38 - Scanning with Nmap
38:15 - Downloading and Installing Nessus
44:48 - Scanning with Metasploit
51:15 - Scanning with Nessus
1:02:00 - Scanning with Nikto
1:05:00 - Scanning with BurpSuite
Q&A / AMA
1:19:50 - Can you fall asleep drinking a Monster so late?
1:20:56 - Proxy settings
1:21:39 - Reviewing viewer's port scan script
1:21:55 - Do you build or tweak your Kali box or just use it straight from the site?
1:22:23 - Reviewing viewer's port scan script (continued)
1:24…
Watch on YouTube ↗
(saves to browser)
Chapters (42)
Introduction and TCP vs UDP
7:55
3-Way Handshake & Wireshark
12:38
Scanning with Nmap
38:15
Downloading and Installing Nessus
44:48
Scanning with Metasploit
51:15
Scanning with Nessus
1:02:00
Scanning with Nikto
1:05:00
Scanning with BurpSuite
1:19:50
Can you fall asleep drinking a Monster so late?
1:20:56
Proxy settings
1:21:39
Reviewing viewer's port scan script
1:21:55
Do you build or tweak your Kali box or just use it straight from the site?
1:22:23
Reviewing viewer's port scan script (continued)
1:24:36
Running viewer's port scan script
1:26:54
Checking in on Burp scan
1:27:48
Do you use KeepNote?
1:28:59
How many sodas do you drink in a day?
1:29:57
Tesla on bugbounty
1:31:11
Checking in on nmap scans
1:33:43
Will you be covering enumeration in the series?
1:34:14
Where can I find the homeworks?
1:35:20
"You need to put more stuff on your site"
1:37:38
Checking in on nmap scans
1:37:55
Checking in on Burp scan
1:38:43
Why are the majority of the people that work in InfoSec so threatened by peopl
1:39:29
They want a battle? Then they shall have one!
1:42:27
Do you ever fear for your safety, like you're going to discover the wrong thin
1:43:27
Finished portscan
1:44:09
Story of the house-picture
1:45:36
Checking the TCP dump file
1:46:45
Keyboard warriors
1:50:10
Router/network discussion
1:52:45
Hackerboxes
1:53:15
What does your desk setup look like?
1:54:58
Analyzing finished nmap scan
1:56:38
Going full Sherlock mode on port 10999
2:07:34
Advanced Sherlock mode on port 10999
2:13:14
How much HTML do I need to know?
2:13:46
How soon do you upload?
2:14:40
Creating a commodity by teaching pentesting and the glamour of "hacking as a j
2:16:20
Reports
2:17:32
The pentesting mentality and Heath's backup career in music
Playlist
Uploads from The Cyber Mentor · The Cyber Mentor · 32 of 60
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
▶
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
The Cyber Mentor
HackTheBox - Fighter Walkthrough (Re-Up)
The Cyber Mentor
Beginner Linux for Ethical Hackers - Navigating the File System
The Cyber Mentor
Beginner Linux for Ethical Hackers - Users and Privileges
The Cyber Mentor
Beginner Linux for Ethical Hackers - Common Network Commands
The Cyber Mentor
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
The Cyber Mentor
Beginner Linux for Ethical Hackers - Controlling Kali Services
The Cyber Mentor
Beginner Linux for Ethical Hackers - Scripting with Bash
The Cyber Mentor
Beginner Linux for Ethical Hackers - Installing and Updating Tools
The Cyber Mentor
Cracking Linux Password Hashes with Hashcat
The Cyber Mentor
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
The Cyber Mentor
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor
Writing a Pentest Report
The Cyber Mentor
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor
The Complete Linux for Ethical Hackers Course for 2019
The Cyber Mentor
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor
Popping a Shell with SMB Relay and Empire
The Cyber Mentor
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 2 - Lame
The Cyber Mentor
Pentesting for n00bs: Episode 3 - Blue
The Cyber Mentor
Web App Testing: Episode 1 - Enumeration
The Cyber Mentor
Pentesting for n00bs: Episode 4 - Devel
The Cyber Mentor
Pentesting for n00bs: Episode 5 - Jerry
The Cyber Mentor
Web App Testing: Episode 2 - Enumeration, XSS, and UI Bypassing
The Cyber Mentor
Pentesting for n00bs: Episode 6 - Nibbles
The Cyber Mentor
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor
How NOT to Approach a Cybersecurity Mentor
The Cyber Mentor
Web App Testing: Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS
The Cyber Mentor
Pentesting for n00bs: Episode 7 - Optimum (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 8 - Bashed (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 9 - Grandpa
The Cyber Mentor
Top 5 Internal Pentesting Methods
The Cyber Mentor
DeepCamp AI