Advance Penetration Testing

(1 customer review)

Module 01: Introduction to Penetration Testing Lesson 01: What is Advanced Penetration Testing (APT) Lesson 02: Types of Penetration Testing & Areas Lesson 03: Demo Report Understanding Module 02: In-Depth Scanning  Lesson 01 : Scan All Top 20 Ports Module 03: Exploitation  Lesson 01: Basics of Exploitations Module 04: Command Line Fun Lesson […]

SKU: 2
Category:

Description

Module 01: Introduction to Penetration Testing
Lesson 01: What is Advanced Penetration Testing (APT)
Lesson 02: Types of Penetration Testing & Areas
Lesson 03: Demo Report Understanding
Module 02: In-Depth Scanning

Lesson 01 : Scan All Top 20 Ports
Module 03: Exploitation

Lesson 01: Basics of Exploitations
Module 04: Command Line Fun
Lesson 01: Basic of Linux Commands
Lesson 02: Permission Commands
Module 05: Getting Comfortable with Kali Linux

Lesson 01: Introduction to Kali Linux
Module 06: Bash Scripting
Lesson 01: Introduction to Bash Scripting
Lesson 02: Bash Scripting Fundamentals
Lesson 03: Tool Creation – Password Generator
Lesson 04: Functions
Module 07: Practical Tools

Lesson 01: Essential Tools
Module 08: Active Information Gathering
Lesson 01: Domain Name System (DNS) Enumerations
Lesson 02: Automating Lookups
Lesson 03: Domain Name System (DNS) Zone Transfers
Lesson 04: NMAP and Masscan
Lesson 05: Port Enumeration
Module 09: Passive Information Gathering
Lesson 01: Website Recon
Lesson 02: Netcraft, Shodan, Email Harvesting
Lesson 03: Open Source Intelligence (OSINT) Framework
Module 10: Introduction to Buffer OverflowsLesson 01: Introduction of Buffer Over Flow (BOF)
Lesson 02: Basic Data Structure Understanding
Lesson 03: Types of Buffer Over Flow BOF

Module 11: Buffer Overflows

Lesson 01: Capture the Flag (CTF) on Buffer Over Flow (BOF)
Module 12: Fixing Exploits

Lesson 01: Capture the Flag (CTF) on Fixing Exploits
Module 13: Locating Public Exploits
Lesson 01: Find Exploits on Google Hacking Database
Lesson 02: Find Exploits on GitHub
Module 14: Antivirus Evasion
Lesson 01: Introduction to Antivirus Evasion
Lesson 02: Working of Antivirus Evasion
Lesson 03: Obfuscation Techniques
Module 15: File Transfers

Lesson 01: File Transfers Using FTP, Telnet, SSH, PHP, Python
Module 16: Windows Privilege Escalation
Lesson 01: Service Exploits – Insecure Service Permissions
Lesson 02: Service Exploits – Unquoted Service Path
Lesson 03: Service Exploits – Weak Registry Permissions
Lesson 04: Service Exploits – Insecure Service Executables
Lesson 05: Registry – Auto Runs, etc.
Module 17: Linux Privilege Escalation
Lesson 01: Service Exploits
Lesson 02: Weak File Permissions – Readable /etc/shadow
Lesson 03: Weak File Permissions – Writable /etc/shadow
Lesson 04: Weak File Permissions – Writable /etc/passwd
Lesson 05: Sudo – Shell Escape Sequences, etc.
Module 18: Password Attacks

Lesson 01: Password Spraying and Dictionary Attack
Module 19: Port Redirection and Tunneling

Lesson 01: Port Redirection and Tunneling Using Chisel
Module 20: Active Directory Attacks
Lesson 01: Introduction of Active Directory (AD)
Lesson 02: Basics of Active Directory (AD)
Lesson 03: Enumeration of Active Directory (AD)
Module 21: Power Shell Empire
Lesson 01: Introduction of Empire
Lesson 02: Getting Shell Using Empire

Module 11: Buffer Overflows

Lesson 01: Capture the Flag (CTF) on Buffer Over Flow (BOF)
Module 12: Fixing Exploits

Lesson 01: Capture the Flag (CTF) on Fixing Exploits
Module 13: Locating Public Exploits
Lesson 01: Find Exploits on Google Hacking Database
Lesson 02: Find Exploits on GitHub
Module 14: Antivirus Evasion
Lesson 01: Introduction to Antivirus Evasion
Lesson 02: Working of Antivirus Evasion
Lesson 03: Obfuscation Techniques
Module 15: File Transfers

Lesson 01: File Transfers Using FTP, Telnet, SSH, PHP, Python
Module 16: Windows Privilege Escalation
Lesson 01: Service Exploits – Insecure Service Permissions
Lesson 02: Service Exploits – Unquoted Service Path
Lesson 03: Service Exploits – Weak Registry Permissions
Lesson 04: Service Exploits – Insecure Service Executables
Lesson 05: Registry – Auto Runs, etc.
Module 17: Linux Privilege Escalation
Lesson 01: Service Exploits
Lesson 02: Weak File Permissions – Readable /etc/shadow
Lesson 03: Weak File Permissions – Writable /etc/shadow
Lesson 04: Weak File Permissions – Writable /etc/passwd
Lesson 05: Sudo – Shell Escape Sequences, etc.
Module 18: Password Attacks

Lesson 01: Password Spraying and Dictionary Attack
Module 19: Port Redirection and Tunneling

Lesson 01: Port Redirection and Tunneling Using Chisel
Module 20: Active Directory Attacks
Lesson 01: Introduction of Active Directory (AD)
Lesson 02: Basics of Active Directory (AD)
Lesson 03: Enumeration of Active Directory (AD)
Module 21: Power Shell Empire
Lesson 01: Introduction of Empire
Lesson 02: Getting Shell Using Empire

Module 22: Trying Harder: The Labs
Lesson 01: Introduction to Penetration Testing Labs
Lesson 02: Hands-On Practice
Module 23: Penetration Test Breakdown
Lesson 01: Understanding Penetration Test Reports
Lesson 02: Debriefing and Recommendations
Module 24: Report Writing
Lesson 01: Proof of Concept (POC)
Lesson 02: Executive and Management Report
Lesson 03: Technical Report For IT and security Department

1 review for Advance Penetration Testing

  1. Umadevi Mudunuru

Add a review

Your email address will not be published. Required fields are marked *