Course curriculum

    1. 1.introduction whats new in this section

    2. 2.labs for penetration testing

    3. 3.correct apporach to start pentesting on host

    4. 4.Lab requirement

    5. 5.File Transfer techniques

    6. 6.complete smb enumeration and pentesting

    7. 7.student task

    8. 8.Complete approach to Network pentesting

    9. 9.student task

    10. 10.All about web content discovery

    11. 11.Hands on approach

    12. 12.student task

    13. 13.Mastering WinRM - A Complete Guide to Windows Remote Management in Penetration Testing

    14. 14.Hands on Hacking a complete Network

    15. 15.Gaining Access into network through ms sql

    16. 16.Credential Dumping And Pivoting

    17. 17.Password Spray Attack - Initial Access

    18. 18.Complete Path exploitation (Making our own vulnerable lab and exploiting it)

    19. 19.hands on Real world approach

    20. 20.Hands on real world approach and updates

    1. what is red teaming

    2. installation

    3. DOWNLOAD LAB

    1. 1.What is recon

    2. 2.what is domain enumeration

    3. 3.Domain enumeration using amass

    4. 4.Domain enumeration using amass on live websites

    5. 5.Subdomain Bruteforce using Amass

    6. 6.Some important tips of scanning using Amass in Infrastructure

    7. 7.ASN scanning

    8. 8.How to Perform Reverse whois lookup

    1. 1.Sinper for recon

    2. 2.What is Active and passive scanning

    3. 3.How to Perform Active and Passive scanning using sniper

    4. 4.How to Analyze sniper Results

    5. 5.Performing Passive scanning and hunting injection parameter using sniper

    6. 6

    7. 7.Harvester for Recon

    8. 8.Installing Harvester

    9. 9.Using Harvester to hunt sub domains ip ranges and admin panels

    10. 10.Brute domains using Harvester

    11. 11.Dns Loockup using Harvester

    12. 12

    1. 1.Information Gathering Using Recon-ng

    2. 2.Setting up workspace in recon-ng

    3. 3.Installing modules and using it

    4. 4.Deep drive in recon-ng

    5. 5.Importing api keys

    6. 6.shodan in recon-ng

    7. 7.shodan in recon-ng-2

    8. 8.Webinterface of recon-ng

    1. 1.Recon using Maltego

    2. 2.Gathering complete information of organization

    3. 3.Hunting Leaked Credentials

    4. 4.Live Hunting Leaked credentials of real organizations

About this course

  • $1,500.00
  • 410 lessons
  • 76.5 hours of video content

Discover your potential, starting today