-
Basic
-
Basics of Penetration Testing
-
Intro to Penetration Testing
- What is Penetration Testing
- Stages of Penetration Testing
-
Perform Information Gathering
- Passive
- Active
- Vulnerability Scanning
- Common web application attacks
-
Kali Linux
- Getting Started with Kali Linux
- Basic Commands
- Essential Tools
-
Standard
-
Standard of Penetration Testing
-
Intro to Penetration Testing
- What is Penetration Testing
- Stages of Penetration Testing
-
Perform Information Gathering
-
Passive
- Internet
- Google dorks
- Shodan
- Maltego
-
Active
- Nmap
-
Vulnerability Scanning
- OpenVAS
- Nessus
-
Capture Traffic
- Wireshark
- tcpdump
- Common web application attacks
-
Kali Linux
- Getting Started with Kali Linux
- Basic Commands
-
Essential Tools
- Nmap
- Aircrack-ng
- John the ripper
- Hydra
- SET
- Burpsuite
- Social Enginnering
-
Premium
-
Standard of Penetration Testing
-
Intro to Penetration Testing
- What is Penetration Testing
-
Stages of Penetration Testing
- Intelligence Gatthering
- Threat modeling
- Vulnarability analysis
- Lab setup
-
Perform Information Gathering
-
Passive
- Internet
- Google dorks
- Shodan
- Maltego
-
Active
- Nmap
-
Vulnerability Scanning
- OpenVAS
- Nessus
-
Capture Traffic
- Wireshark
- tcpdump
- Common web application attacks
-
Kali Linux
- Getting Started with Kali Linux
- Basic Commands
- Scripting in kali linux
-
Essential Tools
- Nmap
- Aircrack-ng
- John the ripper
- Hydra
- SET
- Burpsuite
-
Social Enginnering
- What is social enginnering
- Tools
- Campain for social enginnering
-
Metasploit
- Introduction
- Finding module
- Options
- Shells
- Payloads
- Working with msfvenom'
-
Password attacks
- wordlists
- Offline password attacks
- online password attacks
- Earning Money Through Hacking