PENETRATION TESTING

Current Status

Not Enrolled

Price

Closed

Get Started

This course is currently closed

Course Content

Read Me
Read Me
Section 1: Introduction to Pentesting
What is Penetration Testing
Section 2: Creating Lab
Lab Setup for Pentesting
Installing Kali
Installing Metasploitable-v2
Installing Kioptrix 1.0
Installing Kioptrix 1.2
Installing Mr.Robot
Command line basics
Bash Script basics
Section 3: Introduction to Kali Linux
Services
Cherrytree (Notes Keeping)
Ncat
Section 4: Some useful tools
Netcat
Wireshark
Information Gathering-1
Information Gathering-2
Section 5: Information Gathering
Information Gathering-3
Information Gathering-4
theHarvester
Discover tool
Understanding Google Hacking
Google Dorks
Metasploit Scanning
Nmap Scanning
Section 6: Scanning
Nessus Scan
DNS enumeration
HTTP enumeration
Section 7: Enumeration
SMB enumeration
SSH enumeration
SQL exploitation using SQLMAP
Manual SQL Injection
Section 8: Web App Exploits
Local File Inclusion (Part-1)
Local File Inclusion (Part-2)
Remote File Inclusion
CURL file transfer
FTP transfer
Section 9: File Transfer
NC file transfer
PHP file transfer
TFTP file transfer
WGET file transfer
Introduction to Metasploit
MsfVenom
Section 10: Metasploit Basics
Creating Bind Shell
Creating Reverse Shell
Hacking Linux using Metasploit
Hacking Windows using Metasploit
Introduction to Armitage
Section 11: Exploitation
Exploiting Kioptrix 1.0
Exploiting Kioptrix 1.1
Exploiting Mr. Robot
Section 12: Password Attack
Password Attack
Section 13: Privilege Escalation
Kioptrix level 1.1 Privilege Escalation
Mr.Robot Privilege Escalation
Section 14: Buffer Overflow
Buffer Overflow Basics
BoF Requirements
Exploiting Buffer Overflow on SLMAIL
Capstone
Lord of the Root
Raven1
Form for Internship/Project letter
Read Me
Form
This entry was posted in . Bookmark the permalink.