SQLMap Essentials

The SQLMap Essentials module introduces the fundamentals of using SQLMap, a powerful automated tool for detecting and exploiting SQL injection (SQLi) vulnerabilities. Through this module, you will learn: This module is designed to take you from the basics of discovering SQLi flaws to the advanced enumeration needed to retrieve all relevant data from a target … Ler mais

SQL Injection Fundamentals

Databases are a critical part of any web application, providing a structured way to store, retrieve, and manage information using SQL (Structured Query Language). SQL Injection is a powerful attack technique that targets vulnerabilities in an application’s code. By injecting malicious SQL queries through input fields or application parameters, an attacker can: This makes SQL … Ler mais

Login Brute Forcing

This module dives into brute-force techniques, showing how attackers attempt to gain unauthorized access by systematically guessing passwords. Tools like Hydra and Medusa are commonly used for such attacks, each allowing testers to target a variety of services efficiently. We explore practical attack scenarios, including targeting SSH, FTP, and web login forms, demonstrating how weak … Ler mais

Attacking Web Applications with Ffuf

In this module, we dive into the essential skills of web fuzzing and directory brute forcing using the powerful tool Ffuf. These techniques are key to uncovering hidden pages, directories, and parameters that might not be immediately visible on a web application. By mastering these skills, you’ll gain the ability to map web applications more … Ler mais

Using Web Proxies

When it comes to testing web applications, having a reliable framework is essential. This module will introduce you to two of the most popular tools in the field: Burp Suite and OWASP ZAP, both of which provide comprehensive functionality for finding and exploiting vulnerabilities in web applications. Intercepting Web Requests With our proxy now up … Ler mais

Attacking Common Services

Organizations rely on a standard set of services to keep their operations running smoothly. But each of these services can also be a potential entry point for attackers. That’s why it’s crucial to perform penetration testing—both internally and externally—on every service to ensure they aren’t introducing security risks. In this module, we’ll walk through how … Ler mais

Shells & Payloads

In this comprehensive module, you will gain the essential knowledge and practical skills required to identify and effectively utilize shells and payloads to establish a foothold on vulnerable systems, both Windows and Linux. By understanding how attackers leverage these tools, you will learn how to navigate and manipulate target environments safely and efficiently. The module … Ler mais

Vulnerability Assessment

Definition:A vulnerability assessment is a systematic process of identifying, quantifying, and prioritizing security weaknesses in a system, network, or application. Unlike a full penetration test, it focuses on detection and reporting rather than exploitation. Key Differences: Vulnerability Assessment vs Penetration Test Aspect Vulnerability Assessment Penetration Test Goal Identify and quantify vulnerabilities Exploit vulnerabilities to assess … Ler mais

Using the Metasploit Framework

What it is: Primary Uses: Why it’s valuable: Introduction to Metasploit Core Concept: Components: Features & Capabilities: Modules: Strengths: Diagram Concept: If you want, I can also make a simple visual workflow showing how a Metasploit exploit goes from module selection to payload execution, which is great for learning and reporting. Do you want me … Ler mais

File Transfers

During a penetration test, it is very common to transfer files to and from the target system. Whether you’re moving scripts, payloads, or collected data, knowing how to do this efficiently and safely is essential. This module covers file transfer techniques using tools that are commonly available on both Windows and Linux systems, ensuring that … Ler mais

Penetration Testing Process

This module breaks down the penetration testing process into its individual stages, explaining each step in detail. We’ll explore the many responsibilities of a penetration tester during an engagement, with clear examples to illustrate real-world scenarios. Additionally, the module covers pre-engagement steps, such as the criteria and considerations for establishing a contract with a client … Ler mais

Information Gathering – Web Edition

This module provides learners with the core skills needed for web reconnaissance, a crucial phase in ethical hacking and penetration testing. Students explore both active and passive techniques to gather intelligence about web targets safely and effectively. Key topics covered include: By the end of this module, learners gain the ability to collect actionable intelligence, … Ler mais