Course curriculum
-
1
Chapter 0: Read before start
-
Introduction to the Course
-
Importance of the Course
-
-
2
Lab Container
-
Go To Lab
-
-
3
Live Class WSTG-NTP
-
Live Class - Muhammad Husnain
-
-
4
SNMP Pentesting
-
SNMP Pentesting
-
-
5
Information Gathering With Recon-NG
-
Introduction to Recon-NG
-
Deep Dive into Recon-NG
-
Recon-ng Marketplace and Modules
-
Recon-ng Modules
-
Recon-NG Keys
-
Generate Report in Recon-NG
-
-
6
Scan SubNet With Masscan & Discove Open Ports
-
Scan Subnet With Masscan
-
-
7
OS Fingerprinting With Nmap
-
OS-Fingerprinting With Nmap
-
-
8
Nmap Scripting Engine
-
Nmap Scripting Engine
-
-
9
Netcat
-
Credentials
-
Port Scanning Using Netcat
-
Use Netcat to Move Files From One System to Another System
-
Banner Grabbing Using Netcat
-
Netcat Reverse Shell
-
-
10
Nessus Vulnerability Scanner
-
Use Nessus to Perform Scan and Find Vulnerabilities on Various Systems
-
Generate a Reports after Perform a Scan
-
-
11
Metasploit
-
Introduction to Metasploit
-
Scan Target and Find Exploit Using Metasploit
-
Exploit Windows Server 2003 With Metasploit
-
Exploit RCE on Windows XP With Metasploit
-
Exploit RCE on Windows Server 2008 With Metasploit
-
Metasploit Post Exploitation
-
-
12
Empire-Framework
-
Credentials
-
Introduction to Empire Framwork
-
Target Exploitation With Empire-Framework
-
Privesc
-
Mimikatz
-
Collection
-
Situational Awareness
-
Persistence
-
-
13
Crack With Hydra
-
Beak Multiple Service Passwords With Hydra
-
-
14
Hash Cracking With JTR & HashCat
-
Dump Hashes and Crack With JTR
-
Crack Hashes With Hashcat
-
-
15
Active Directory & Bloodhound
-
Installation of BloodHound
-
SCP-SSH SharpHound
-
AD(Active Directory) Collection With
-
Analyzing Gathered Data With BloodHound Per-Bulit Queries
-
BloodHound Data
-