- Do you build or tweak your Kali box or just use it straight from the site?
13
- Reviewing viewer's port scan script (continued)
14
- Running viewer's port scan script
15
- Checking in on Burp scan
16
- Do you use KeepNote?
17
- How many sodas do you drink in a day?
18
- Tesla on bugbounty
19
- Checking in on nmap scans
20
- Will you be covering enumeration in the series?
21
- Where can I find the homeworks?
22
- "You need to put more stuff on your site"
23
- Checking in on nmap scans
24
- Checking in on Burp scan
25
- Why are the majority of the people that work in InfoSec so threatened by people who they perceive could be more skilled than they are?
26
- They want a battle? Then they shall have one!
27
- Do you ever fear for your safety, like you're going to discover the wrong thing and have retribution taken against you?
28
- Finished portscan
29
- Story of the house-picture
30
- Checking the TCP dump file
31
- Keyboard warriors
32
- Router/network discussion
33
- Hackerboxes
34
- What does your desk setup look like?
35
- Analyzing finished nmap scan
36
- Going full Sherlock mode on port 10999
37
- Advanced Sherlock mode on port 10999
38
- How much HTML do I need to know?
39
- How soon do you upload?
40
- Creating a commodity by teaching pentesting and the glamour of "hacking as a job"
41
- Reports
42
- The pentesting mentality and Heath's backup career in music
43
- What percentage of your job is pentesting and what percentage is writing reports?
44
- Have you seen any newbies that impressed you? What kind of skill level did they have? + Hiring tips
45
- "The struggle with this field is that you always feel stupid"
46
- Comparing yourself to Twitter and Twitch All-Stars, Personal goals
47
- Is online college suitable for these degrees? ROI and Opportunity Costs
48
- Is there a way to get an internship for a Computer Science if I'm not really good at programming?
49
- What's the funniest thing you've found in pentesting? + Password cracking stories
50
- What do you think about WGU?
51
- Military Cyber training, Air Force vs Army
52
- Recommendations to learn bug bounties
53
- Army Cyber program
54
- CBD, Melatonin, Weed and sleep
55
- Checking in on Burp scan
56
- Do companies hire people to [?] others to infiltrate the servers?
57
- The line between "just looking" and pentesting without permission
58
- New GoT Episode (No Spoilers)
59
- What LED case fans do you use? + PC case discussion
Description:
Dive into an extensive 3-hour video tutorial on penetration testing tools and techniques. Learn about TCP vs UDP, the 3-Way Handshake, and how to use Wireshark for network analysis. Master scanning techniques with popular tools like Nmap, Nessus, Metasploit, Nikto, and BurpSuite. Explore real-world scenarios, analyze port scans, and understand the intricacies of cybersecurity. Gain insights on career development, industry trends, and ethical considerations in penetration testing. Engage with a Q&A session covering topics from technical queries to personal experiences in the field, providing a comprehensive look at the world of ethical hacking and information security.
Zero to Hero Pentesting - Scanning Tools and Tactics