Course curriculum

    1. 1.introduction whats new in this section

    2. 2.labs for penetration testing

    3. 3.correct apporach to start pentesting on host

    4. 4.Lab requirement

    5. 5.File Transfer techniques

    6. 6.complete smb enumeration and pentesting

    7. 7.student task

    8. 8.Complete approach to Network pentesting

    9. 9.student task

    10. 10.All about web content discovery

    11. 11.Hands on approach

    12. 12.student task

    13. 13.Mastering WinRM - A Complete Guide to Windows Remote Management in Penetration Testing

    14. 14.Hands on Hacking a complete Network

    15. 15.Gaining Access into network through ms sql

    16. 16.Credential Dumping And Pivoting

    17. 17.Password Spray Attack - Initial Access

    18. 18.Complete Path exploitation (Making our own vulnerable lab and exploiting it)

    19. 19.hands on Real world approach

    20. 20.Hands on real world approach and updates

    1. 1. Introduction to Linux Privilege Escalation and Pentesting

    2. 2. Lab Setup and Requirements

    3. 3. Manual Enumeration Techniques on a Live Linux Machine

    4. 4. Leveraging AI for Pentesting, Live Hunting, and Exploitation on Ubuntu

    5. 5. Discovering Plaintext Credentials on Linux (Manual and Automated Methods)

    6. 6. Identifying and Exploiting Weak File and Directory Permissions

    7. 7. Crontab Exploitation: Complete Guide to Hunting and Abusing Weak Cron Jobs

    8. 8. Exploiting Misconfigured PATH Environment for Privilege Escalation

    9. 9. Abusing Sudo Rights for Privilege Escalation

    10. 10. Live Discovery of LD_LIBRARY_PATH Vulnerabilities

    11. 11. Exploiting LD_LIBRARY Injection for Privilege Escalation

    12. 12. Understanding SUID and Exploiting SUID Binaries in Real-Time

    13. 13. Exploiting Shared Object Injection for Privilege Escalation

    14. 14. Hunting and Exploiting Linux Capabilities for Privilege Escalation

    15. 15. Privilege Escalation via MySQL Misconfigurations

    16. 16. Docker Privilege Escalation: From Container to Host Root Access

    17. 17. Student Challenges, Practice Tasks, and Course Updates

    18. Linux Penetration testing - PPT + Checklist

    19. Lab For Practice

    1. what is red teaming

    2. installation

    3. DOWNLOAD LAB

    1. 1.What is recon

    2. 2.what is domain enumeration

    3. 3.Domain enumeration using amass

    4. 4.Domain enumeration using amass on live websites

    5. 5.Subdomain Bruteforce using Amass

    6. 6.Some important tips of scanning using Amass in Infrastructure

    7. 7.ASN scanning

    8. 8.How to Perform Reverse whois lookup

    1. 1.Sinper for recon

    2. 2.What is Active and passive scanning

    3. 3.How to Perform Active and Passive scanning using sniper

    4. 4.How to Analyze sniper Results

    5. 5.Performing Passive scanning and hunting injection parameter using sniper

    6. 6

    7. 7.Harvester for Recon

    8. 8.Installing Harvester

    9. 9.Using Harvester to hunt sub domains ip ranges and admin panels

    10. 10.Brute domains using Harvester

    11. 11.Dns Loockup using Harvester

    12. 12

    1. 1.Information Gathering Using Recon-ng

    2. 2.Setting up workspace in recon-ng

    3. 3.Installing modules and using it

    4. 4.Deep drive in recon-ng

    5. 5.Importing api keys

    6. 6.shodan in recon-ng

    7. 7.shodan in recon-ng-2

    8. 8.Webinterface of recon-ng

About this course

  • $2,500.00
  • 429 lessons
  • 85.5 hours of video content

Discover your potential, starting today