File Transfers

During a penetration test, it is very common to transfer files to and from the target system. Whether you’re moving scripts, payloads, or collected data, knowing how to do this efficiently and safely is essential. This module covers file transfer techniques using tools that are commonly available on both Windows and Linux systems, ensuring that … Ler mais

Penetration Testing Process

This module breaks down the penetration testing process into its individual stages, explaining each step in detail. We’ll explore the many responsibilities of a penetration tester during an engagement, with clear examples to illustrate real-world scenarios. Additionally, the module covers pre-engagement steps, such as the criteria and considerations for establishing a contract with a client … Ler mais

Information Gathering – Web Edition

This module provides learners with the core skills needed for web reconnaissance, a crucial phase in ethical hacking and penetration testing. Students explore both active and passive techniques to gather intelligence about web targets safely and effectively. Key topics covered include: By the end of this module, learners gain the ability to collect actionable intelligence, … Ler mais

Footprinting

This module focuses on techniques for footprinting the most commonly used services found in almost every enterprise or business IT infrastructure. Footprinting is a crucial phase of any penetration test or security audit, helping to identify potential information disclosure before attackers can exploit it. Through this process, we examine individual services in detail, aiming to … Ler mais

Network Enumeration with Nmap

Enumeration is arguably the most critical phase of penetration testing. The challenge and the goal aren’t just about gaining access to the target — it’s about identifying every possible way the system could be attacked. This isn’t something tools can do for you on their own. Tools are helpful, but their output is only valuable … Ler mais

Getting Started

This module provides a practical introduction to penetration testing and the Hack The Dome. You’ll learn the core concepts of information security, explore scanning and enumeration techniques, work with public exploits, and practice privilege escalation in safe, controlled environments. Through guided exercises—including a step-by-step walkthrough of a retired HTD machine—you’ll build hands-on skills while avoiding … Ler mais