1 00:00:00,210 --> 00:00:07,080 ‫Hello and welcome to exploitation and post exploitation course in this course, you're going to learn 2 00:00:07,890 --> 00:00:11,020 ‫exploitation terminologies such as vulnerability. 3 00:00:11,070 --> 00:00:12,540 ‫Exploit and payload. 4 00:00:12,990 --> 00:00:14,460 ‫Exploiting databases. 5 00:00:15,060 --> 00:00:16,950 ‫Tools to exploit vulnerabilities. 6 00:00:17,370 --> 00:00:21,720 ‫Metasploit as an exploitation and post exploitation tool. 7 00:00:22,440 --> 00:00:26,640 ‫Past the hash method to compromise a Windows system with no vulnerability. 8 00:00:27,390 --> 00:00:30,060 ‫Post exploitation using Metasploit Framework. 9 00:00:30,720 --> 00:00:32,490 ‫How to crack password hashes. 10 00:00:32,820 --> 00:00:36,900 ‫As well as how to collect sensitive data from end user systems. 11 00:00:37,230 --> 00:00:38,490 ‫And if you don't think that's enough. 12 00:00:38,790 --> 00:00:40,770 ‫There are all kinds of details you're going to pick up. 13 00:00:41,160 --> 00:00:41,930 ‫So hang in there. 14 00:00:41,940 --> 00:00:42,960 ‫There's a lot to learn.