Introduction1. Penetration Testing Process 2. Getting Started
Reconnaissance, Enumeration & Attack Planning3. Network Enumeration with Nmap 4. Footprinting 5. Information Gathering - Web Edition 6. Vulnerability Assessment 7. File Transfers 8. Shells & Payloads 9. Using the Metasploit Framework
Exploitation & Lateral Movement10. Password Attacks 11. Attacking Common Services 12. Pivoting, Tunneling, and Port Forwarding 13. Active Directory Enumeration & Attacks
Web Exploitation14. Using Web Proxies 15. Attacking Web Applications with Ffuf 16. Login Brute Forcing 17. SQL Injection Fundamentals 18. SQLMap Essentials 19. Cross-Site Scripting (XSS) 20. File Inclusion 21. File Upload Attacks 22. Command Injections 23. Web Attacks 24. Attacking Common Applications
Post-Exploitation25. Linux Privilege Escalation 26. Windows Privilege Escalation
Reporting & Capstone27. Documentation & Reporting 28. Attacking Enterprise Networks
Introduction |
|---|
| 1. Penetration Testing Process |
| 2. Getting Started |
Reconnaissance, Enumeration & Attack Planning |
|---|
| 3. Network Enumeration with Nmap |
| 4. Footprinting |
| 5. Information Gathering - Web Edition |
| 6. Vulnerability Assessment |
| 7. File Transfers |
| 8. Shells & Payloads |
| 9. Using the Metasploit Framework |
Exploitation & Lateral Movement |
|---|
| 10. Password Attacks |
| 11. Attacking Common Services |
| 12. Pivoting, Tunneling, and Port Forwarding |
| 13. Active Directory Enumeration & Attacks |
Web Exploitation |
|---|
| 14. Using Web Proxies |
| 15. Attacking Web Applications with Ffuf |
| 16. Login Brute Forcing |
| 17. SQL Injection Fundamentals |
| 18. SQLMap Essentials |
| 19. Cross-Site Scripting (XSS) |
| 20. File Inclusion |
| 21. File Upload Attacks |
| 22. Command Injections |
| 23. Web Attacks |
| 24. Attacking Common Applications |
Post-Exploitation |
|---|
| 25. Linux Privilege Escalation |
| 26. Windows Privilege Escalation |
Reporting & Capstone |
|---|
| 27. Documentation & Reporting |
| 28. Attacking Enterprise Networks |