ctf

  • Linux basics for hackers
  • Fundamentals of Network
  • Webserver setup
  • Web Applicaiton Lab Setup
  • Nmap
  • Wireshark
  • Metasploit Framework
  • Enumeration
  • Using Public Exploits
  • Social Engineering
  • File Transfer
  • Privilege Escalation
  • Client-Side Attacks
  • Sniffing, Spoofing
  • Word press Pretesting Attacks
  • DOS Attacks
  • Web Applicaiton Attacks
  • Password Attacks
  • Port Redirection Attacks
  • IDS, Honeypot , Firewall
  • 50 Vulnerable Lab Practice

Linux for hackers

  • Basics of Linux service – startup manager systemd
  • Linux foremost commands
  • Linux filesystem
  • Linux Utlity
  • installing & Configuration of systems packages
  • Deleting & removing systems packages
  • Reading Logs

Windows for hackers

  • Basics of Windos services & Registry
  • Windows foremost commands
  • windos filesystems
  • windows utlilty
  • working of dll, python & C-programs
  • installing & configuration of systems packages
  • deleting and removing system packages
  • Reading event logs

Kali Linux

  • Introduction to toolbox
  • Kali Linux Services
  • Searching, Installing and Removing Tools
  • Basic to Advance Pretesting Commands
  • Finding Files in Kali

The 3 Key

  • enumerate ()
  • escalate ()
  • capture

Enumeration

Vulnerability Scanning 3T ( Tips,Tricks & Techniques)

  • nmap
  • powershell Scripts
  • Nessus
  • burpsuit

Port Scanning with nmap

  • TCP Connect Scan
  • Netwrok Sweeping
  • Stealth Scanning
  • UDP Scaning
  • Banner Grabbing
  • OS Discovery
  • NSE Scripts

Misc Targeted Port Enumeration

  • DNS Enumeration
  • SMB Enumeration
  • NFS Enumeration
  • MSSQL Enumeration
  • SMTP Enumeration
  • SNMP Enumeration

File Transfer Concepts

  • FTP
  • python HTTP server
  • netcat
  • curl
  • wget
  • TFTP
  • Python SMB Server
  • PowerShell File Transfer

Password Attacks

  • Kali Linux wordlist
  • Creating Wordlist
  • Retrive Password Hashes
  • Pass the Hash
  • Hydra/Medussa/Ncrack
  • Windows Credential dumping

Web Based Attack

  • Web Application Enumeration
  • SQL Injection
  • File Inclusion
  • Remote Code Execution
  • Authentication Bypass
  • Directory Brute Forcing
  • Cross Site Scripting
  • Directory Traversal

Linux Privilege Escalation

  • Understanding Linux Privilege Concepts
  • Exploiting Kernel Vulnerabilities
  • Exposing Writable Scripts
  • Concepts of Timer and Automated Jobs in Linux
  • Insecure File Permissions
  • Concepts of Crontab

Windows Privilege Escalation

  • Post Enumeration Concepts
  • Windows Services
  • Unquoted Service Path
  • Auto Elevated
  • Automated Scripts
  • Kerne;/Bypass UAC/Patch Levels

Finding Public Exploits

  • Google Hacking Database
  • Searchploit
  • Exploit DB
  • Securityfocus
  • packetstromsecurity
  • Mitre CVE

Port Forwarding & Tunneling

  • Overview & La Setup
  • Port Forwarding
  • SSH Tunnels
  • Chisel
  • Proxy Chains

Introduction to Linux Buffer Overflows

  • Overview
  • Vulnerable Code
  • Stack Overflow

Introduction to Windows Buffer Overflows

  • Overview
  • Fuzzing
  • Crash Replication
  • Controlling EIP
  • Introduction to Shellcode
  • Bad Characters
  • Redirecting Execution
  • Introducing Mona
  • Shellcode Payload

Active Directory Attack

  • AD & Domain Controller Lab Setup
  • Active Directory Enumeration
  • Active Directory Authentication
  • Active Directory Lateral Movment
  • Active Directory Persistence

PowerShell Empire

  • Installation, Setup and Usage
  • Powershell Empire Syntax
  • Listeners and Stagers
  • The Empire Agent
  • Powershell Modules
  • Situational Awareness
  • Credentials Awareness
  • Credentials and Privilege Escalation
  • Lateral Movement

Exploiting Container | CI |CMS

  • Jenkins
  • Docker
  • LXC
  • WordPress
  • Drupal | Joomla

Tools & its Uses

  • Kali
  • wireshark
  • tcpdump
  • lsof
  • nmap
  • netcat
  • powercat
  • burpsuit
  • gtfobin
  • asciitohex
  • process monitor
  • lolbin
  • cyberchef

Capture The Flag Practice

  • Level-1: Easy
  • Level-2: Medium
  • Level-3: Intermediate
  • Level 4: Hard
Scroll to Top