Ethical Hacking – Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world.
You’ll get up to speed with Python, PHP scripting, and more. As you progress, you’ll be guided through each of the capture-the-flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You’ll also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers.