Network Pentesting
- Attacking Routers
- Attacking Switchs
Network Devices Attacks
- Sub Domain Enumeration
Network Services Attacks
- Attack FTP Port 21
- Attack SSH Port 22
- RDP Penetration Testing
- Attack SMB Port 445
- SMTP Penetration Testing
- NFS Penetration Testing
- MySQL Penetration Testing
- SNMP Penetration Testing
- POP3 Penetration Testing
- HTTP Penetration Testing
- SNMP Attacks
- DNS Attacks
Attacking Active Directory Domains
- Enumerating an Active Directory
- DLL Hijacking
- Post Exploitation using WMIC
- Hash Dumping
Kerberos Attacks
Pentesting Tools
- Gobuster
- THC Hydra
- CrackMapExec
- Evil-WinRM
- SMBMap
- John the Ripper
- SQLMap
- Nmap
- Nessus
- Enum4Linux
Metasploit
- Install Armitage
- Payloads Types
- Reverse Shells (MsVenom)
- Commands List
Password Attacks
Brute Force Network Services
- Brute Force Email Services
Pass the Hash
Pivoting Inside Networks
- Pivoting using SSH
- Pivoting using Chisel
Web Applications Pentesting
Reverse Engineering
- Radare2
- Ghidra
- OllyDB