Penetration Testing
Free

-
Penetration Testing
- Introduction
- Bash Scripting – Extract Sub Domains From Website
- Bash Scripting – Apache Log File Forensic
- Bash Scripting – Find Live Hosts Ping Sweep
- Essential Tools – netcat
- Essential Tools – ncat
- Essential Tools – Wireshark Part 1
- Essential Tools – Wireshark Part 2
- Essential Tools – Tcpdump
- Passive Information Gathering -The Harvester , ReconNG
- Active Information Gathering -Host , DNS Enumeration
- Port Scanning Nmap
- Vulnerability Scanning Openvas
- Exploitation Techniques Using Nmap , Searchsploit and Metasploit Part 1
- Exploitation Techniques Using Nmap , Searchsploit and Metasploit Part 2
- Exploitation Techniques Using Openvas and Metasploit
- Client Side Attacks – Send Malicious Link
- Client Side Attacks – Send Malicious File Malware , Trojan
- Web Attacks – Cross Site Scripting XSS Reflected , Stored
- Web Attacks – File Inclusion Local , Remote
- Web Attacks – SQL Injection – (Information Retrieval)
- Web Attacks – SqlMap – (Automate SQL Injection)
- Web Attacks – SQLI Authentication Bypass – Proxies
- Password Attacks – Word List Generation (Crunch)
- Password Attacks – Online Attacks (Hydra) – (SSH , FTP , MYSQL , HTTP) Brute Force
- Password Attacks – Offline Attacks (Hash Cracking) – (MD5 , Linux Hash)
- Post Exploitation – Privilege Escalation – Kernel Exploit
- Post Exploitation – Privilege Escalation – Files Misconfiguration
- Post Exploitation – Maintaining Access – (Shell , Meterpreter , Backdoor)
- Advanced Exploitation – Buffer Overflow – (Code Review)
- Advanced Exploitation – Buffer Overflow – (Debugger , Registers)
- Advanced Exploitation – Buffer Overflow – (Shellcode)