A Day in the Life of an Ethical Hacker / Penetration Tester {VIDEO}



25 Hour Practice Ethical Hacking Course:
https://www.udemy.com/course/practical-ethical-hacking/?referralCode=4A7D5EE973AFBCAD11C6
90% Discount Code (valid through 2019): THECYBERMENTOR

0:00 – Introduction
0:49 – Day to day overview
2:31 – External / Internal Penetration Testing
6:11 – Web Application Penetration Testing
10:06 – Wireless Penetration Testing
12:13 – Physical/Social Testing
14:41 – SOC / Purple Teaming
16:33 – Report writing and debriefing

❓Info❓
___________________________________________
Hire me: https://tcm-sec.com

🔹The Cyber Mentor Merch🔹
___________________________________________
https://teespring.com/stores/the-cyber-mentor

📱Social Media📱
___________________________________________
Website: https://thecybermentor.com
Twitter: https://twitter.com/thecybermentor
Twitch: https://www.twitch.tv/thecybermentor
Discord: https://discord.gg/REfpPJB
LinkedIn: https://www.linkedin.com/in/heathadams

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
https://www.patreon.com/thecybermentor
Support the stream (one-time): https://streamlabs.com/thecybermentor

READ ALSO:  Ethical Hacking Tutorials in Hindi Class 16 (Part 8) | What is Captcha & Recaptcha Code Explained {VIDEO}

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker’s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: https://amzn.to/31HAmVx
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32″ Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

READ ALSO:  Ethical Hacking Tutorial । Website Information Gathering। Kali Linux/Other । Bangla Tutorial 2019 | Video

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgate Stream Deck: https://amzn.to/2OlchA5

*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

source

24 Comments

  1. I've searched the entire internet. And can not find. Any information on how to exploit a path disclosure from a website. There truly is nothing. Nothing breaking down what a full path disclosure is on a website. What to do with one and how to exploit one.? Why is this. Is it a huge conspiracy or something lol its actually funny there's nothing in English explaining it or a tool that can be used to exploit a path disclosure. Or what one even is. In the first place. Extremely odd.

  2. At the external penetration section you are talking about network pentesting. Does that mean that you are trying to break in or find vulns on wi-fi networks? Or do you mean like a server? Can a server be considered as a network?

    Btw nice and informative video 🙂

  3. Hey, what a great course you have on Udemy. With you working remotely what sort of machine spec do you send your client and what sort of software do you have to call home on? Do you work on the remote machine or do you proxy chain your traffic from your machine to the remote machine?

  4. Hello Brother, I'm willing to purchase your course on Ethical hacking on Udemy.
    For some reason your course looks pricey, can you please apply some discount coupons and give it to me so I can purchase it.

    Thank you in advance
    Sharun

  5. I may have missed it but how important is Wireshark or a packet analyzer to your assessments? I couldn't imagine not firing Wireshark up when doing an internal pentest at least

  6. Working on my CCT and CCNA, also an A+ cert then some python and a degree in Network Administration, I really like the idea of trying to crack stuff… what should I do next education wise

  7. Just found your video and it gave me an insight into my future career once I am done with my master degree in cyber security network operations.

Comments are closed.