CPTS labs
- Getting started
- Network Enumeration with nmap
- Footprinting
- Information Gathering
- Vulnerability assessment
- File Transfers
- Shell & Payloads
- Using the Metasploit Framework
- Password attacks
- Attacking Common Services
- Pivoting, Tunneling, and Port Forwarding
- Active Directory Enumeration & Attacks
- Using Web proxies
- Attacking Web Applications with Ffuf
- Login Brute Forcing
- SQL Injection Fundamentals
- SQLMap Essentials
- Cross-Site Scripting (XSS)
- File Inclusion
- File Upload Attacks
- Command injections
- Web attacks
- Attacking Common Applications
Linux Privilege Escalation
Windows Privilege Escalation
Documentation & Reporting
Attacking Enterprise Networks
Question
Results:
Last update: 2025-02-10 Created: May 31, 2024 18:03:27