From the course: Offensive Penetration Testing
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Understanding the hacker mindset
From the course: Offensive Penetration Testing
Understanding the hacker mindset
Module 12: Developing the Hacker Mindset. Understanding the hacker mindset. Our learning objectives are to explain why the term hacker has been misunderstood, understand what it means to think like a hacker, and explain why it is important to "try smarter." So I wear the badge of hacker proudly. I think the news gets it wrong. I think dictionary definitions get it wrong. Hackers were originally people who were just curious about technology and try to figure things out. The term "cracker," though, has been the -- in essence, the bad people who try to break things and cause destruction. So hacker at the very inception of the term was never supposed to be pejorative or negative, it was supposed to be kind of a badge of honor. And you'll see here at MIT, a hacker was someone who was just interested in technology and creative. So that was a positive thing from the inception of the term "hacker." So I'm part of a group called Hacking is not a Crime, and we basically try to spread the word…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Setting up the Kali Linux VM13m 6s
-
(Locked)
Overview of the tools in Kali Linux9m 38s
-
(Locked)
Understanding the command line8m 52s
-
(Locked)
Who, what, when, where, and how of the Linux command line6m 32s
-
(Locked)
Windows command lab6m 43s
-
(Locked)
Command line lab1m 30s
-
(Locked)
Command line lab walkthrough4m 45s
-
-
-
Scanning network protocols4m 53s
-
(Locked)
Scanning with Nmap8m 1s
-
(Locked)
Scanning with MASSCAN6m 53s
-
(Locked)
Scanning with Netcat9m 53s
-
(Locked)
Using Wireshark5m 25s
-
(Locked)
Wireshark and Encrypted Traffic4m 57s
-
(Locked)
Weaponizing Wireshark6m
-
(Locked)
SMB enumeration6m 33s
-
(Locked)
SMB enumeration demo11m 19s
-
(Locked)
NFS enumeration7m
-
(Locked)
SMTP enumeration5m 17s
-
(Locked)
SNMP enumeration5m 42s
-
(Locked)
FTP enumeration3m 53s
-
(Locked)
FTP enumeration demo6m 36s
-
(Locked)
SSH enumeration12m 25s
-
(Locked)
Protocol tips6m 50s
-
(Locked)
Network Protocols Lab1m 17s
-
-
-
Web application enumeration14m 58s
-
(Locked)
Using intercepting proxies: Part 18m 14s
-
(Locked)
Using intercepting proxies: Part 29m 37s
-
(Locked)
SQL injections11m 33s
-
(Locked)
SQL injection authentication bypass5m 55s
-
(Locked)
Cross-Site Scripting (XSS)10m 16s
-
(Locked)
BeEF demo6m 18s
-
(Locked)
File inclusion vulnerabilities8m 53s
-
(Locked)
File inclusion demo5m 25s
-
(Locked)
File upload vulnerabilities5m 47s
-
(Locked)
XXE attacks11m 30s
-
(Locked)
Content management systems8m 38s
-
(Locked)
Content management systems demo8m 24s
-
(Locked)
Web application lab33s
-
(Locked)
Web application lab walkthrough18m 18s
-
-
-
(Locked)
Linux privilege escalation8m 42s
-
(Locked)
Windows privilege escalation10m 15s
-
(Locked)
A word on privilege escalation enumeration scripts5m 38s
-
(Locked)
Privilege escalation lab1m 52s
-
(Locked)
Privilege escalation walkthrough: Windows10m 45s
-
(Locked)
Privilege escalation walkthrough: Linux8m 35s
-
(Locked)
-
-
(Locked)
Introduction to password cracking tools7m 7s
-
(Locked)
Introduction to login brute-forcing tools3m 23s
-
(Locked)
Password brute-forcing web logins9m 51s
-
(Locked)
Password brute-forcing tips11m 59s
-
(Locked)
Brute-force and password-cracking lab45s
-
(Locked)
Brute-force and password-cracking lab walkthrough8m 44s
-
(Locked)