Introduction To The Course - What We Will Be Covering

  • The HackerSploit forum can be accessed here

HackerSploit

Administrator
Staff member
Feb 26, 2020
6
0
1

  1. Section 1 - Essential Terminology
  2. Section 2 - Introduction To Penetration Testing & Penetration Testing Methodologies
  3. Section 3 - Setting Up A Pentesting Lab
  4. Section 4 - Passive Information Gathering (OSINT & Publicly Available Information)
  5. Section 5 - Active Information Gathering
  6. Section 6 - Enumeration
  7. Section 7 - Vulnerability Scanning (Nessus, OpenVAS, Nikto, etc)
  8. Section 8 - Network Penetration Testing (Sniffing, MITM, Wireshark, tcpdump, etc)
  9. Section 9 - Exploitation (Windows & Linux Exploitation, Metasploit & Custom Exploits)
  10. Section 10 - AV Evasion
  11. Section 11 - Post Exploitation
  12. Section 12 - Password Cracking
  13. Section 13 - Web Application Penetration Testing

Course Prerequisites
  • A basic understanding of how to use Linux, as we will be using a Linux based penetration testing distribution.
  • A good understanding of the OSI Model and the TCP/IP stack.
 
Last edited: