• Cyber Security vs Information security
• CIA Triad and Security Standards
• Ethical Hacking
• Penetration Testing Methodology
• Introduction to Kali Linux
• Setting up the Virtualization environment
• Kali Linux Installation
• Linux special commands for Penetration Testing
• Collecting information on target
• Active Reconnaissance
• Passive Reconnaissance
• OSINT Framework
• Gathering information on Websites and IP addresses
• Introduction to Scanning
• Performing Host Discovery - Nmap
• Performing Port Scanning - Nmap
• Enumerating services - FTP, SSH, RDP, SMB, Kerberos, DNS, SMTP, Telnet, VNC, MySQL, etc.
• Vulnerability Scanning
• Vulnerability Scoring System
• Tool for Vulnerability Scanning
• Acunetix, Nessus, Qualys, Crashtest, Nikto, MSF-Pro, Nmap, NSE Script, Pentest toolbox etc.
• Gathering information about Active Machines and targets
• Searching for exploits online and offline
• Exploring Metasploit Framework
• The CLI Interface
• Meterpreter shell
• Searching exploits
• Exploiting vulnerabilities
• Service Version Detection Scan
• OS Detection scan
• Looking for vulnerabilities using NVD database.
• Exploring Exploit Database
• Introduction of Web Architecture
• Reconnaissance of Websites
• Technology Analyses with Wappalyzer, Built With, WHOIS etc.
• Directory Busting with Gobuster, Dirbuster etc.
• Directory Traversal
• Exploiting Absolute Path and Relative Path
• File Inclusion
• Local File Inclusion (LFI)
• Remote File Inclusion (RFI)
• File Upload Vulnerabilities
• Command Injection.
• Broken Authentication
• Broken Access Control
• IDOR- Insecure Direct Object Reference
• Cross-Site Scripting (XSS)
• Stored and Reflected XSS
• Solving web based CTFs
• Understanding SQL language and DBMS
• Authentication Bypass using SQL Injection attack
• Types of SQL Injection
• In-band SQL Injection
• Error-based SQL injection
• UNION-based SQL Injection
• Blind SQL Injection
• Time-based SQL Injection
• Boolean Based SQL Injection
• Out of band SQL Injection
• Understanding Client Side Attack
• Social Engineering
• Exploring techniques like Phishing web-pages, Mirroring websites, etc.
• Encryption, Hashing and Encoding
• Brute Forcing Credentials on Services
• Cracking different Password Hashes
• Exploring tools like John The Ripper, Hashcat, Hydra, NCrack & Medusa
• Python Scripting related Troubleshooting
• Troubleshooting the “index out of range” Error
• Fixing Exploits of Exploit DB
• Exploring Online Exploits
• Exploring Manual Exploits on Kali Linux
• Overview of Antivirus
• Working process of Antivirus and thread injection
• Bypassing Antivirus using Nim
• Understanding concepts of Windows Privilege Escalation
• Enumerating Windows manually
• Enumerating Windows using Automated Scripts
• Enumerating Kernel details
• Exploitation of Privilege escalation techniques
• Overview of Linux Privilege Escalation
• Enumerating Linux OS Manually
• Enumerating Linux OS using Automated Scripts
• Looking for Confidential Information like credentials
• Getting Root Account Privilege
• Exploitation of Privilege escalation techniques
• Understanding Fundamentals of Active Directory
• Lab setup for AD
• Enumeration on Active Directory
• Bloodhound Setup
• Impacket Setup
• Analyzing domain data using Bloodhound
• Kerberosting attack
• Pass the Hash using MimiKatz
• NTLM Attack etc.
• Understanding concepts of Port forwarding
• Introduction to SSH and HTTP Tunneling
• Tunneling through Deep Packet Analysis
• Binding Ports using MobaXterm, Putty, Chisel etc.
• Enumerating & exploiting the Public Network to learn
• Exploiting Internal Network for exploring
• Attacking on Internal Application
• Solving Machines
• Privilege access of the Domain Controller
• CTF Practice on TryHackMe, HackTheBox and VulnHub.
• Note Taking
• VAPT Report Making
• Proving Grounds