⭐TBD - Network Security
Security testing methodology, techniques, and tools for networked PC and devices.
This document is still in progress...
Information Gathering
Information Gathering Introduction - Study Guide
Search Engines - Study Guide
Information Gathering
Social Media - Study Guide
Infrastructures - Study Guide
▶️ Whois Lookup
▶️ Information Gathering DNS
▶️ Host Discovery with Fping Hping Nmap
▶️ Maltego
Tools - Study Guide
▶️ Foca Shodan
Scanning
Introduction - Study Guide
▶️ Wireshark Introduction
▶️ Hping Basics
Detect Live Hosts and Port - Study Guide
▶️ Nmap Basics
▶️ Nmap NSE
▶️ Idle Scan Hping Nmap
Service and OS Detection - Study Guide
🧪 Scanning
Firewall IDS Evasion - Study Guide
▶️ Advanced Port Scanning
Enumeration
Enumeration - Study Guide
NetBIOS - Study Guide
▶️ NetBIOS and Null Session
SNMP - Study Guide
▶️ SNMP Enumeration
🧪 NetBIOS Hacking
🧪 SNMP Analysis
Sniffing & MitM Attacks
What is Sniffing - Study Guide
Sniffing in Action - Study Guide
Basics of ARP - Study Guide
Sniffing Tools - Study Guide
▶️ Traffic Sniffing with TCPdump
MiTM Attacks - Study Guide
Attacking Tools - Study Guide
▶️ Man in the Middle
Intercepting SSL Traffic - Study Guide
🧪 Cain and Abel
🧪 Poisoning and Sniffing
🧪 NBT-NS Poisoning and Exploitation with Responder
🧪 ICMP Redirect Attack
Exploitation
Vulnerability Assessment - Study Guide
▶️ Nessus
Low Hanging Fruits - Study Guide
▶️ Authentication Bruteforcing
Exploitation - Study Guide
▶️ Metasploit Basic Usage
▶️ LM NTLM Cracking
▶️ EternalBlue & Metasploit
▶️ Client Side Exploitation
▶️ Remote Exploitation
▶️ Metasploit Usage
▶️ Responder & Multirelay
🧪 VA and Exploitation
🧪 Nessus
🧪 Client-Side Exploitation
🧪 DNS and SMB Relay Attack
⭐ Post Exploitation
Introduction - Study Guide
Privilege Escalation and Maintaining Access - Study Guide
▶️ Privilege Escalation
▶️ Exploiting Unquoted Service Paths
▶️ Maintaining Access
▶️ DLL Hijacking
Pillaging - Study Guide
▶️ ⭐Pillaging
▶️ Bypassing Firewalls and Data Exfiltration with DNS Tunneling
Mapping the Internal Network - Study Guide
▶️ Mapping the Network
⭐ Exploitation Through Pivoting - Study Guide
▶️ ⭐ Exploiting via Pivoting
▶️ Meterpreter SSL Certificate Impersonation and Detection Evasion
▶️ Obtaining Stored Credentials with SessionGopher
🧪 Post-Exploitation
🧪 Blind Penetration Test
🧪 Privilege Escalation
🧪 Privilege Escalation Via Services
🧪 Finding and Exploiting DLL Hijacking Vulnerabilities
🧪 Bypassing AV
🧪 From XSS to Domain Admin
Anonymity
Anonymity - Study Guide
Browsing Anonymously - Study Guide
Tunneling for Anonymity - Study Guide
Social Engineering
What Is It - Study Guide
Types of Social Engineering - Study Guide
Samples of Social Engineering Attacks - Study Guide
Pretexting Samples - Study Guide
Tools - Study Guide
▶️ Social Engineering Linux Targets
Last updated