Course Content
Read Me
Read Me
You don't currently have access to this content
Section 1: Introduction to Pentesting
What is Penetration Testing
You don't currently have access to this content
Section 2: Creating Lab
Lab Setup for Pentesting
You don't currently have access to this content
Installing Kali
You don't currently have access to this content
Installing Metasploitable-v2
You don't currently have access to this content
Installing Kioptrix 1.0
You don't currently have access to this content
Installing Kioptrix 1.2
You don't currently have access to this content
Installing Mr.Robot
You don't currently have access to this content
Command line basics
You don't currently have access to this content
Bash Script basics
You don't currently have access to this content
Section 3: Introduction to Kali Linux
Services
You don't currently have access to this content
Cherrytree (Notes Keeping)
You don't currently have access to this content
Ncat
You don't currently have access to this content
Section 4: Some useful tools
Netcat
You don't currently have access to this content
Wireshark
You don't currently have access to this content
Information Gathering-1
You don't currently have access to this content
Information Gathering-2
You don't currently have access to this content
Section 5: Information Gathering
Information Gathering-3
You don't currently have access to this content
Information Gathering-4
You don't currently have access to this content
theHarvester
You don't currently have access to this content
Discover tool
You don't currently have access to this content
Understanding Google Hacking
You don't currently have access to this content
Google Dorks
You don't currently have access to this content
Metasploit Scanning
You don't currently have access to this content
Nmap Scanning
You don't currently have access to this content
Section 6: Scanning
Nessus Scan
You don't currently have access to this content
DNS enumeration
You don't currently have access to this content
HTTP enumeration
You don't currently have access to this content
Section 7: Enumeration
SMB enumeration
You don't currently have access to this content
SSH enumeration
You don't currently have access to this content
SQL exploitation using SQLMAP
You don't currently have access to this content
Manual SQL Injection
You don't currently have access to this content
Section 8: Web App Exploits
Local File Inclusion (Part-1)
You don't currently have access to this content
Local File Inclusion (Part-2)
You don't currently have access to this content
Remote File Inclusion
You don't currently have access to this content
CURL file transfer
You don't currently have access to this content
FTP transfer
You don't currently have access to this content
Section 9: File Transfer
NC file transfer
You don't currently have access to this content
PHP file transfer
You don't currently have access to this content
TFTP file transfer
You don't currently have access to this content
WGET file transfer
You don't currently have access to this content
Introduction to Metasploit
You don't currently have access to this content
MsfVenom
You don't currently have access to this content
Section 10: Metasploit Basics
Creating Bind Shell
You don't currently have access to this content
Creating Reverse Shell
You don't currently have access to this content
Hacking Linux using Metasploit
You don't currently have access to this content
Hacking Windows using Metasploit
You don't currently have access to this content
Introduction to Armitage
You don't currently have access to this content
Section 11: Exploitation
Exploiting Kioptrix 1.0
You don't currently have access to this content
Exploiting Kioptrix 1.1
You don't currently have access to this content
Exploiting Mr. Robot
You don't currently have access to this content
Section 12: Password Attack
Password Attack
You don't currently have access to this content
Section 13: Privilege Escalation
Kioptrix level 1.1 Privilege Escalation
You don't currently have access to this content
Mr.Robot Privilege Escalation
You don't currently have access to this content
Section 14: Buffer Overflow
Buffer Overflow Basics
You don't currently have access to this content
BoF Requirements
You don't currently have access to this content
Exploiting Buffer Overflow on SLMAIL
You don't currently have access to this content
Capstone
Lord of the Root
You don't currently have access to this content
Raven1
You don't currently have access to this content
Form for Internship/Project letter
Read Me
You don't currently have access to this content
Form
You don't currently have access to this content
