In the eyes of the media and general public, hacking and coding are the same thing.

Those of us in the technology field know that’s not true. Even the terms “hacker” and “hacking” have multiple meanings to us.

But should hackers know how to code? It seems to me that at some point, one must know at least a scripting language to do any hacking. However, is that really true?

The importance of programming for hackers or cyber security experts is a very common question, YouTuber zSecurity  shares his opinion on the matter.

caitlinV3 explains how she passed the Security+ exam in under two weeks.

Everyone’s study prep and technical background will be different, so I realize some can study for 1 day and pass the test and others will need a few months. This is what worked for me in studying for the SYO-501 Security+ Certification from Comptia.

This is the Beginners Edition of Sagar’s License To Pentest Program and it’s unofficial preparation material for EC-Council LPT Master Exam.

Download All Lab Files:
Must Read LPT vs OSCP Comparison:

Course created by Sagar Bansal.

Content index:

***Session 1***
⌨️ (3:00) Custom Lab Files For The Course
⌨️ (4:10) How Enterprise Security Works
⌨️ (6:45) Enterprise Networking Explained
⌨️ (11:52) Setup The Enterprise Level Pentest Lab
⌨️ (19:30) Hacking The Beta Server In DMZ Area
⌨️ (22:04) Reconnaissance Explained
⌨️ (24:20) Using WhatWeb To Study Technology Profile
⌨️ (29:40) Using WPScan For Hacking/Pen-Testing WordPres
⌨️ (53:40) Using Cewl To Create A Custom Password WordList
⌨️ (1:01:35) Transmutation Of Passwords With A Python Script
⌨️ (1:09:22) Boom! We Cracked The Password
⌨️ (1:22:47) Common Student Questions – FAQs
⌨️ (1:15:44) Recap – Lab Setup On Student PC – Live

*** Session 2***
⌨️ (1:34:00) Metasploit Framework Explained
⌨️ (1:58:00) Search, Rank & Check To Find What You Need
⌨️ (2:00:58) Use, Info & Show Options To Tune The Exploit
⌨️ (2:06:19) Boom! We Got The Reverse Shell
⌨️ (2:13:00) Multi Handler Explained
⌨️ (2:19:22) Creating Payloads Using MSFvenom
⌨️ (2:25:13) Manual Exploitation Of WordPress
⌨️ (2:40:20) Common Student Questions – FAQs

***Session 3***
⌨️ (2:54:00) Setup For Routing & Pivoting
⌨️ (3:00:22) Ping Sweep While Routing The Traffic
⌨️ (3:05:40) Adding A Manual Route To Another Network
⌨️ (3:08:04) Scanning On Other Network Ranges Via The Route
⌨️ (3:20:10) SMB Enumeration On Windows Machine
⌨️ (3:28:00) Exploiting Windows Machine Over The Pivot
⌨️ (3:37:34) Boom! We Hacked The Windows Machines Too
⌨️ (3:40:30) Beauty Of Meterpreter Payload
⌨️ (3:45:30) Persistence Post Exploitation Module
⌨️ (3:51:30) Auto Route Post Exploitation Module
⌨️ (3:54:18) Common Student Questions – FAQs

***Session 4***
⌨️ (3:59:50) Setup For Advance Routing & Pivoting
⌨️ (4:10:39) Portforwarding Over A Pivot
⌨️ (4:17:44) Nmap Through Portforwarding
⌨️ (4:21:50) Pivoting Through Socks4 Proxy Server
⌨️ (4:22:00) Proxchains To Use Other Tools Over Pivot
⌨️ (4:34:24) Exploiting Media Server
⌨️ (4:43:32) Boom! Dummy Shell Uploaded

***Session 5***
⌨️ (4:45:20) Setting Pivoted Environment With New Class
⌨️ (4:49:29) Metasploit Version Of ClipBucket Exploit
⌨️ (5:02:30) My Partial Access Method With Respect To Limited Time
⌨️ (5:11:13) Common Student Questions – FAQs

Note: Reverse port forward is not a beginner concept so it will be taught in a more advanced course later.

***Session 6***
⌨️ (5:16:34) Web Hacking Learning Resources
⌨️ (5:20:00) Setup SBVA – My OSCP Inspired Web App
⌨️ (5:28:48) Manual SQL Injection In Detail – OSCP Level
⌨️ (6:04:12) Automated SQL Injection – LPT Level

***Session 7***
⌨️ (6:15:36) Directory Bursting With DirBuster
⌨️ (6:27:48`) Directory Bursting With Dirb
⌨️ (6:31:00) Pen Testing Web Server With Nikto
⌨️ (6:41:42) NMap Scripting Engine For Remaining Auxiliaries
⌨️ (6:44:24) My Experience On OpenVas In The LPT Exam
⌨️ (6:51:26) HTTP Methods Using NSE
⌨️ (6:58:10) Common Student Questions – FAQs

***Session 8***
⌨️ (6:59:06) KnowledgeBase Server Lab Explained
⌨️ (7:02:00) LPT Methodology For Scanning
⌨️ (7:09:40) Real Project We Did – Inside Look
⌨️ (7:12:14) Maintain A Target Database Manually
⌨️ (7:18:24) Dividing Work For A Team In Real Project
⌨️ (7:24:10) Managing Professional Test In MetaSploit Framework
⌨️ (7:33:54) Vulnerability Assessment
⌨️ (7:37:52) Tuning An Exploit
⌨️ (7:40:56) Boom! We Got The Command Shell
⌨️ (7:42:04) Upgrading From A Command Shell To Meterpreter Shell
⌨️ (7:45:28) Public Vs Commercial Exploits In Professional Test

***Session 9***
⌨️ (7:50:22) Million Dollar Advice For Pentesting Students
⌨️ (7:59:10) Privilege Escalation – Resources To Learn
⌨️ (8:01:41) Privilege Escalation Using Manual Exploits
⌨️ (8:32:30) Privilege Escalation Using MetaSploit Framework

At the recent DEFCONConference, Nina Kollars explains her experience buying Nespresso coffee capsules.

In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly–if not criminally–wrong as a result of my purchase.

This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby–stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity.