Pen Testing Process |
6 |
x |
Getting Started |
8 |
x |
Network Enumeration with Nmap |
7 |
x |
Footprinting |
14 |
x |
Information Gathering Web Edition |
7 |
x |
Vulnerability Assesment |
2 |
x |
File transfers |
3 |
|
Shells & Payloads |
14 |
|
Using the Metasploit Framework |
5 |
|
Password Attacks |
8 |
|
Attacking Common Services |
8 |
|
Pivoting Tunneling and port forwarding |
14 |
|
Active Directory Enumeration and Attacks |
49 |
|
Using Web Proxies |
8 |
|
Attacking Web applications with Ffuf |
5 |
|
Login Brute Forcing |
6 |
|
SQL Injection Fundamentals |
8 |
|
SQLMap Essentials |
8 |
|
Cross-site Scriptings |
6 |
|
File Inclusion |
8 |
|
File Upload attacks |
8 |
|
Command Injection |
6 |
|
Web Attacks |
14 |
|
Attacking Common Applications |
28 |
|
Linux Privilege Escalation |
8 |
|
Windows Privilege escalation |
28 |
|
Attacking Enterprise Networks |
14 |
|
|
300 |
|