CPTS labs
- Getting started
- Network Enumeration with nmap
- Footprinting
- Information Gathering
- Vulnerability assessment
- File Transfers
- Shell & Payloads
- Using the Metasploit Framework
- Password attacks
- Attacking Common Services
- Pivoting, Tunneling, and Port Forwarding
- Active Directory Enumeration & Attacks
- Using Web proxies
- Attacking Web Applications with Ffuf
- Login Brute Forcing
- SQL Injection Fundamentals
- SQLMap Essentials
- Cross-Site Scripting (XSS)
- File Inclusion
- File Upload Attacks
- Command injections
- Web attacks
- Attacking Common Applications
- Linux Privilege Escalation
- Windows Privilege Escalation
- Documentation & Reporting
- Attacking Enterprise Networks
Question
Results:
Last update: 2025-03-15 Created: May 31, 2024 18:03:27