- Getting Started
- Network Enumeration NMAP
- Foot-printing
- Information Gathering
- File Transfers
- Shells and Payloads
- MetaSploit MSFconsole
- Password Attacks
- Attack Common Services
- Pivoting, Tunnelling, and Port Forwarding
- Active Directory Enumeration & Attacks
- Active Directory Tools
- Using Web Proxies
- Attacking Web Applications with Ffuf
- Login Brute Forcing
- SQL Injection Fundamentals
- SQLMap Essentials
- Cross-Site Scripting (XSS)
- File Inclusion - LFI
- File Upload Attacks
- Command Injections
- Web Attacks
- Attacking Common Applications
- Linux Privilege Escalation
- Windows Privilege Escalation
- Documentation & Reporting
- Attacking Enterprise Networks
- ...
- Getting Started - Knowledge Check
- Network Enumeration with NMAP - Firewall and IDS/IPS Evasion - Hard
- Footprinting Lab - Easy
- Footprinting Lab - Medium
- Footprinting Lab - Hard
- Password Attacks Lab - Easy
- Password Attacks Lab - Medium
- Password Attacks Lab - Hard
- Attacking Common Services - Easy
- Attacking Common Services - Medium
- Attacking Common Services - Hard
- Pivoting Tunneling and Port Forwarding Skills Assessment
- AD Enumeration & Attacks - Skills Assessment Part I
- AD Enumeration & Attacks - Skills Assessment Part II
- Skills Assessment - Web Fuzzing
- Login Brute Force - Skills Assessment Website
- Login Brute Force - Skills Assessment Service Login
- SQL Injection Fundamentals - Skills Assessment
- SQLMAP Essentials - Skills Assessment
- XSS - Skills Assessment
- File Inclusion - Skills Assessment
- File Upload Attacks - Skills Assessment
- Command Injection - Skills Assessment
- Learning In progress ... ... loading ... ...