2 Sections
34 Lessons
15 Weeks
Expand all sections
Collapse all sections
Password Cracking
20
1.1
Password Cracking
1 Hour
1.2
Password Cracking Techniques
1 Hour
1.3
Creating a Wordlist
1 Hour
1.4
CeWL (Custom Word List Generator Web Crawler)
1 Hour
1.5
Hashcat
1 Hour
1.6
Salted hashes and custom formats
1 Hour
1.7
Document Password Cracking
1 Hour
1.8
Extracting and cracking hashes from 7z, zip and rar
1 Hour
1.9
Extracting and cracking hashes from 7z, zip and rar 2
1 Hour
1.10
Linux Password Hashes
1 Hour
1.11
Windows Password Extraction and Cracking
1 Hour
1.12
John the Ripper
1 Hour
1.13
Active Directory Domain ( NTDS.DIT ) Extraction and Cracking
1 Hour
1.14
Hiren’s BootCD PE x64
1 Hour
1.15
Windows Logon Bypass Using Utilman.exe
1 Hour
1.16
BitLocker Password Recovery
1 Hour
1.17
Hydra
1 Hour
1.18
Hydra – HTTP POST Form Authentication
1 Hour
1.19
Medusa automates brute-force password
1 Hour
1.20
Patator
1 Hour
Metasploit Framework
14
2.1
Metasploit Framework
1 Hour
2.2
msfconsole usage and commands
1 Hour
2.3
Works with the Metasploit database
1 Hour
2.4
MS08-067 NetAPI Exploitation Workflow
1 Hour
2.5
vsftpd 2.3.4 – Backdoor Command Execution (Metasploitable-2)
1 Hour
2.6
Apache Tomcat Coyote JSP Engine
1 Hour
2.7
Auxiliary
1 Hour
2.8
FTP Enumeration and Scanning with Metasploit Auxiliary
1 Hour
2.9
Metasploit Payloads
1 Hour
2.10
generic shell_reverse_tcp
1 Hour
2.11
Automation of msfconsole via RC Scripts
1 Hour
2.12
Meterpreter (Meta-Interpreter)
1 Hour
2.13
Meterpreter Commands
1 Hour
2.14
Client-Side Attacks
1 Hour
Enumeration Techniques for Penetration Testing
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content