Introduction
1. Penetration Testing Process 2. Getting Started
Reconnaissance, Enumeration & Attack Planning
3. Network Enumeration with Nmap 4. Footprinting 5. Information Gathering - Web Edition 6. Vulnerability Assessment 7. File Transfers 8. Shells & Payloads 9. Using the Metasploit Framework
Exploitation & Lateral Movement
10. Password Attacks 11. Attacking Common Services 12. Pivoting, Tunneling, and Port Forwarding 13. Active Directory Enumeration & Attacks
Web Exploitation
14. Using Web Proxies 15. Attacking Web Applications with Ffuf 16. Login Brute Forcing 17. SQL Injection Fundamentals 18. SQLMap Essentials 19. Cross-Site Scripting (XSS) 20. File Inclusion 21. File Upload Attacks 22. Command Injections 23. Web Attacks 24. Attacking Common Applications
Post-Exploitation
25. Linux Privilege Escalation 26. Windows Privilege Escalation
Reporting & Capstone
27. Documentation & Reporting 28. Attacking Enterprise Networks
Introduction |
---|
1. Penetration Testing Process |
2. Getting Started |
Reconnaissance, Enumeration & Attack Planning |
---|
3. Network Enumeration with Nmap |
4. Footprinting |
5. Information Gathering - Web Edition |
6. Vulnerability Assessment |
7. File Transfers |
8. Shells & Payloads |
9. Using the Metasploit Framework |
Exploitation & Lateral Movement |
---|
10. Password Attacks |
11. Attacking Common Services |
12. Pivoting, Tunneling, and Port Forwarding |
13. Active Directory Enumeration & Attacks |
Web Exploitation |
---|
14. Using Web Proxies |
15. Attacking Web Applications with Ffuf |
16. Login Brute Forcing |
17. SQL Injection Fundamentals |
18. SQLMap Essentials |
19. Cross-Site Scripting (XSS) |
20. File Inclusion |
21. File Upload Attacks |
22. Command Injections |
23. Web Attacks |
24. Attacking Common Applications |
Post-Exploitation |
---|
25. Linux Privilege Escalation |
26. Windows Privilege Escalation |
Reporting & Capstone |
---|
27. Documentation & Reporting |
28. Attacking Enterprise Networks |