1 What's Backbox and Why it's used in penetration testing (248.73 MB) 1 Running a Full Penetration Test Against a Live Machine (293.44 MB) 1 Kali Linux vs Backbox Which to pick (138.3 MB) 1 Learn how to download and install Backbox on VMware (72.59 MB) 1 Info Gathering With nmap P2 (228.28 MB) 2 Gathering emails, subdomains and hosts using TheHarvester (129.64 MB) 3 Performing Reconnaissance with Recon-ng (224.24 MB) 4 Enumerate CMSs with WhatWeb (125.92 MB) 1 Scanning Web Applications With Nikto (103.7 MB) 2 Using Wapiti to Conduct Full Vulnerability Assessment (91.92 MB) 3 Using ZAP to Conduct Full Vulnerability Assessment (238.11 MB) 1 Understanding Exploitation (75.94 MB) 2 How To Search For And Use Public Exploits (277.61 MB) 3 Exploiting WordPress-Based Web Applications (165.59 MB) 4 Exploiting Joomla-Based Web Applications (185.85 MB) 5 Exploitation With Metasploit (338.95 MB) 6 Using SQLmap to exploit the popular SQL Injection Vulnerability (166.46 MB) 1 Understanding Social Engineering (85.74 MB) 2 Social Engineering with SET (86.71 MB) 1 Understanding Sniffing and MITM Attacks (93.98 MB) 2 Performing MITM and Sniffing Attacks With Dsniff and Ettercap (260.34 MB) 1 Understanding Wireless Attacks (49.8 MB) 2 Conducting a Wireless Network Attack with Aircrack-ng and Wifite (83.84 MB)