- Linux basics for hackers
- Fundamentals of Network
- Webserver setup
- Web Applicaiton Lab Setup
- Nmap
- Wireshark
- Metasploit Framework
- Enumeration
- Using Public Exploits
- Social Engineering
- File Transfer
- Privilege Escalation
- Client-Side Attacks
- Sniffing, Spoofing
- Word press Pretesting Attacks
- DOS Attacks
- Web Applicaiton Attacks
- Password Attacks
- Port Redirection Attacks
- IDS, Honeypot , Firewall
- 50 Vulnerable Lab Practice
Linux for hackers
- Basics of Linux service – startup manager systemd
- Linux foremost commands
- Linux filesystem
- Linux Utlity
- installing & Configuration of systems packages
- Deleting & removing systems packages
- Reading Logs
Windows for hackers
- Basics of Windos services & Registry
- Windows foremost commands
- windos filesystems
- windows utlilty
- working of dll, python & C-programs
- installing & configuration of systems packages
- deleting and removing system packages
- Reading event logs
Kali Linux
- Introduction to toolbox
- Kali Linux Services
- Searching, Installing and Removing Tools
- Basic to Advance Pretesting Commands
- Finding Files in Kali
The 3 Key
- enumerate ()
- escalate ()
- capture
Enumeration
Vulnerability Scanning 3T ( Tips,Tricks & Techniques)
- nmap
- powershell Scripts
- Nessus
- burpsuit
Port Scanning with nmap
- TCP Connect Scan
- Netwrok Sweeping
- Stealth Scanning
- UDP Scaning
- Banner Grabbing
- OS Discovery
- NSE Scripts
Misc Targeted Port Enumeration
- DNS Enumeration
- SMB Enumeration
- NFS Enumeration
- MSSQL Enumeration
- SMTP Enumeration
- SNMP Enumeration
File Transfer Concepts
- FTP
- python HTTP server
- netcat
- curl
- wget
- TFTP
- Python SMB Server
- PowerShell File Transfer
Password Attacks
- Kali Linux wordlist
- Creating Wordlist
- Retrive Password Hashes
- Pass the Hash
- Hydra/Medussa/Ncrack
- Windows Credential dumping
Web Based Attack
- Web Application Enumeration
- SQL Injection
- File Inclusion
- Remote Code Execution
- Authentication Bypass
- Directory Brute Forcing
- Cross Site Scripting
- Directory Traversal
Linux Privilege Escalation
- Understanding Linux Privilege Concepts
- Exploiting Kernel Vulnerabilities
- Exposing Writable Scripts
- Concepts of Timer and Automated Jobs in Linux
- Insecure File Permissions
- Concepts of Crontab
Windows Privilege Escalation
- Post Enumeration Concepts
- Windows Services
- Unquoted Service Path
- Auto Elevated
- Automated Scripts
- Kerne;/Bypass UAC/Patch Levels
Finding Public Exploits
- Google Hacking Database
- Searchploit
- Exploit DB
- Securityfocus
- packetstromsecurity
- Mitre CVE
Port Forwarding & Tunneling
- Overview & La Setup
- Port Forwarding
- SSH Tunnels
- Chisel
- Proxy Chains
Introduction to Linux Buffer Overflows
- Overview
- Vulnerable Code
- Stack Overflow
Introduction to Windows Buffer Overflows
- Overview
- Fuzzing
- Crash Replication
- Controlling EIP
- Introduction to Shellcode
- Bad Characters
- Redirecting Execution
- Introducing Mona
- Shellcode Payload
Active Directory Attack
- AD & Domain Controller Lab Setup
- Active Directory Enumeration
- Active Directory Authentication
- Active Directory Lateral Movment
- Active Directory Persistence
PowerShell Empire
- Installation, Setup and Usage
- Powershell Empire Syntax
- Listeners and Stagers
- The Empire Agent
- Powershell Modules
- Situational Awareness
- Credentials Awareness
- Credentials and Privilege Escalation
- Lateral Movement
Exploiting Container | CI |CMS
- Jenkins
- Docker
- LXC
- WordPress
- Drupal | Joomla
Tools & its Uses
- Kali
- wireshark
- tcpdump
- lsof
- nmap
- netcat
- powercat
- burpsuit
- gtfobin
- asciitohex
- process monitor
- lolbin
- cyberchef
Capture The Flag Practice
- Level-1: Easy
- Level-2: Medium
- Level-3: Intermediate
- Level 4: Hard