Module 01: Penetration Testing: What You Should Know
Blackbox Penetration Testing
Graybox Penetration Testing
Whitebox Penetration Testing
Reconnaisance
Scanning
Exploitation
Maintaining Access
Reporting
Module 02 : Using The Metasploit Framework
Getting started with CTFs- Metasploitable
Metasploitable- Initial Enumeration
What You Will Learn From Metasploitable ?
Metasploitable – Scanning
Metasploitable – Analysing Vulnerability Scan Results
Metasploitable – Exploiting FTP
Metasploitable – Exploiting RMI
Module 03 : Command Line Fun
BanditCtf Machine Description
What You Will Learn from BanditCtf ?
BanditCTF – Getting Started
BanditCtf – Levels 3-5
BanditCtf – Levels 5-7
BanditCtf- Levels 8-10
BanditCtf – Levels 10-12
BanditCtf- Levels 12-14
BanditCtf Levels 14-16
BanditCtf Levels 16-17
Module 04 : Linux Pentesting with BasicPT
BasicPT Machine Description
What You will Learn From BasicPT?
BasicPT – Initial Enumeration
BasicPT- Exploiting FTP
BasicPT- Exploring the Web Server
BasicPT- Uploading a Webshell
BasicPT – Gaining Initial Access
BasicPT – Final Privilege Escalation
Module 05 : Linux Pentesting with MrRobotCtf
Getting Started with TryHackMe
MrRobot Machine Description
What You Will Learn from MrRobotCtf?
MrRobot – Initial Enumeration
MrRobot – Finding the First Flag
MrRobot -Exploring the Website
MrRobot – Finding a Username
MrRobot – Uploading the Webshell
MrRobot – Gaining Initial Access
MrRobot – Privilege Escalation to User
MrRobot – Privilege Escalation to Root
MrRobot – Finding the Final Flag
Module 06 : Windows PT with AnthemCtf
Anthem Machine Description
What You Will Learn from AnthemCtf?
AnthemCtf – Initial Enumeration
AnthemCtf – Scanning
AnthemCtf – Exploring the Website
Anthem CTf – Accessing the Admin Panel
Anthem Ctf – RDP Access
Anthem CTF – Looking Through User Files
Anthem Ctf – Finding Final Flag
AnthemCtf – Finding Flags on the Website
Module 07 : LinuxPT with Anonforce
Anonforce Machine Description
What You WIll Learn from Anonforce ?
Anonforce- Initial Enumeration
Anonforce – Scanning
Anonforce- Exploring the FTP Server
Anonforce-Importing the PGP Key
Anonforce- Decrypting the File
Anonforce- Cracking the Root Password
Anonforce- Getting Shell Access
Anonforce – Getting the Flags
Module 08 : Windows PT with Retro
Retro Machine Description
What You Will Learn from RetroCtf?
RetroCtf- Initial Enumeration
RetroCtf – Scanning
RetroCtf – Directory Bruteforcing
RetroCtf – Exploring the Website
RetroCtf- Accessing the Admin Panel
RetroCtf – RDP Access
RetroCtf – Exploring Browser History
RetroCtf- Researching CVE-2019-1388
RetroCtf – Exploiting the Vulnerability
RetroCtf – Final Privilege Escalation
Module 09 : LinuxPT with DAV
DAV Machine Description
What You Will Learn from DAV?
DAV – Initial Enumeration
DAV – Scanning
DAV -Exploring the Webserver
DAV – Finding the Default Password
DAV – Cracking the Hash
DAV – Webdav File Server
DAV – Uploading a Webshell
DAV – Looking for Privesc Vectors
DAV – Getting the Root Flag
Module 10 : Linux PT with WonderlandCtf
Wonderland Machine Description
What You Will Learn from Wonderland ?
Wonderland – Initial Enumeration
Wonderland – Scanning
Wonderland – Exploring the Website
Wonderland – Steganalysis of Image Files
Wonderland – Following the Hint
Wonderland – Gaining Initial Access
Wonderland – Analyzing the Python Script
Wonderland – Lateral Privilege Escalation
Wonderland – Exploring User Files
Wonderland – Exploring Privesc Vectors
Wonderland – Horizontal Privilege Escalation
Wonderland – Exploring User Files – 2
Wonderland – LinPEAS
Wonderland – Final Privilege Escalation
Module 11 : Linux PT with Chocolate Factory
Chocolate Factory Machine Description
What You WIll Learn from Chocolate Factory?
Chocolate factory Initial Enumeration
Chocolate Factory – Scanning
Chocolate Factory – Finding the Key
Chocolate Factory – Command Injection
Chocolate Factory – Getting User Flag
Chocolate Factory – Final Privilege Escalation
Module 12 : Report Writing
Report Writing
Report Writing Part 2
What is Pentesting?