⭐TBD - Network Security

Security testing methodology, techniques, and tools for networked PC and devices.

This document is still in progress...

Information Gathering

Information Gathering Introduction - Study Guide

Search Engines - Study Guide

Information Gathering

Social Media - Study Guide

Infrastructures - Study Guide

▶️ Whois Lookup

▶️ Information Gathering DNS

▶️ Host Discovery with Fping Hping Nmap

▶️ Maltego

Tools - Study Guide

▶️ Foca Shodan

Scanning

Introduction - Study Guide

▶️ Wireshark Introduction

▶️ Hping Basics

Detect Live Hosts and Port - Study Guide

▶️ Nmap Basics

▶️ Nmap NSE

▶️ Idle Scan Hping Nmap

Service and OS Detection - Study Guide

🧪 Scanning

Firewall IDS Evasion - Study Guide

▶️ Advanced Port Scanning

Enumeration

Enumeration - Study Guide

NetBIOS - Study Guide

▶️ NetBIOS and Null Session

SNMP - Study Guide

▶️ SNMP Enumeration

🧪 NetBIOS Hacking

🧪 SNMP Analysis

Sniffing & MitM Attacks

What is Sniffing - Study Guide

Sniffing in Action - Study Guide

Basics of ARP - Study Guide

Sniffing Tools - Study Guide

▶️ Traffic Sniffing with TCPdump

MiTM Attacks - Study Guide

Attacking Tools - Study Guide

▶️ Man in the Middle

Intercepting SSL Traffic - Study Guide

🧪 Cain and Abel

🧪 Poisoning and Sniffing

🧪 NBT-NS Poisoning and Exploitation with Responder

🧪 ICMP Redirect Attack

Exploitation

Vulnerability Assessment - Study Guide

▶️ Nessus

Low Hanging Fruits - Study Guide

▶️ Authentication Bruteforcing

Exploitation - Study Guide

▶️ Metasploit Basic Usage

▶️ LM NTLM Cracking

▶️ EternalBlue & Metasploit

▶️ Client Side Exploitation

▶️ Remote Exploitation

▶️ Metasploit Usage

▶️ Responder & Multirelay

🧪 VA and Exploitation

🧪 Nessus

🧪 Client-Side Exploitation

🧪 DNS and SMB Relay Attack

⭐ Post Exploitation

Introduction - Study Guide

Privilege Escalation and Maintaining Access - Study Guide

▶️ Privilege Escalation

▶️ Exploiting Unquoted Service Paths

▶️ Maintaining Access

▶️ DLL Hijacking

Pillaging - Study Guide

▶️ ⭐Pillaging

▶️ Bypassing Firewalls and Data Exfiltration with DNS Tunneling

Mapping the Internal Network - Study Guide

▶️ Mapping the Network

⭐ Exploitation Through Pivoting - Study Guide

▶️ ⭐ Exploiting via Pivoting

▶️ Meterpreter SSL Certificate Impersonation and Detection Evasion

▶️ Obtaining Stored Credentials with SessionGopher

🧪 Post-Exploitation

🧪 Blind Penetration Test

🧪 Privilege Escalation

🧪 Privilege Escalation Via Services

🧪 Finding and Exploiting DLL Hijacking Vulnerabilities

🧪 Bypassing AV

🧪 From XSS to Domain Admin

Anonymity

Anonymity - Study Guide

Browsing Anonymously - Study Guide

Tunneling for Anonymity - Study Guide

Social Engineering

What Is It - Study Guide

Types of Social Engineering - Study Guide

Samples of Social Engineering Attacks - Study Guide

Pretexting Samples - Study Guide

Tools - Study Guide

▶️ Social Engineering Linux Targets

Last updated