Reconnaissance and Information Gathering
Scanning and Enumeration
Exploitation Basics
Post Exploitation
Tools
- Metasploit
- Mimikatz
- Powershell Empire
- Bloodhound
- Conevant
Lateral Movement
Privilege Escalation
Persistence
Vulnerability Scanning
Active Directory Penetration Testing
Web Application Penetration Testing
Web CMSs Attacks
OWASP Top 10
Wireless Penetration Testing
Windows Penetration Testing
Linux Penetration Testing
Databases Penetration Testing
Cloud Penetration Testing
Exploit Development