Advanced Penetration Testing
Module 1 – Linux
Linux (part 1)
Linux (part 2) Kali Linux Commands
Linux (part 3) – Directories, myfile and Nano
Linux (part 4) chmod, manipulation and packages
Linux (part 5) IP Addressing and netcat
Linux (part 6) Copy Commands and crontab
Module 2 – Programming
Programming (part 1) Fundamentals for Pen Testers
Programming (part 2) Bash Scripting and If/Then Command
Programming (part 3) Network Pings
Programming (part 4) Python for Port Scanning
Programming (part 5) Python Import Command
Module 3 – Metasploit
Metasploit (part 1) Introduction
Metasploit (part 2) Fundamentals
Metasploit (part 3) Operation
Metasploit (part 4) Auxiliary Module
Metasploit (part 5) msfcli
Metasploit (part 6) msfvenom
Module 4 – Information Gathering
Information Gathering Intro (part 1)
Information Gathering (part 2) Domain Name Services
Information Gathering (part 3) Targeting Email and Maltego
Information Gathering (part 4) recon-ng and google operators
Information Gathering (part 5) NMAP and PortScanning
Module 5 – Vulnerability Discovery/Scanning
Vulnerability Scanning Intro (part 1)
Vulnerability Scanning (part 2) Nessus
Vulnerability Scanning (part 3) Nmap Scripting Engine
Vulnerability Scanning (part 4) Metasploit
Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
Vulnerability Scanning (part 6) Directory Transversals
Module 6 – Traffic Capture
Traffic Capture Introduction (part 1)
Traffic Capture (part 2) Analyzing Network Protocol with Wireshark
Traffic Capture (part 3) Address Resolution Protocol ARP
Traffic Capture (part 4) DNS
Traffic Capture (part 5) ettercap
Traffic Capture (part 6) SSL Stripping
Module 7 – Exploitation
Exploitation (part 1) Direct Exploitation
Exploitation (part 2) SQL Commands
Exploitation (part 3) Directory Traversal
Exploitation (part 4) Open Source Vulnerability
Exploitation (part 5) Using Backdoor to Access an FTP Server
Exploitation (part 6) Attaching to an IP Address
Module 8 – Passwords
Passwords (part 1) Password Attacks
Passwords (part 2) Online Password Cracking
Passwords (part 3) Offline Password Attacks
Passwords (part 4) Using oclhashcat
Module 9 – Advanced Exploitation
Advanced Exploitation (part 1) Introduction
Advanced Exploitation (part 2) Client Side Attacks
Advanced Exploitation (part 3) Exploiting Java
Advanced Exploitation (part 4) Social Engineering
Advanced Exploitation (part 5) Bypassing Antivirus Software
Module 10 – Post Exploitation
Post Exploitation (part 1) File Transfer without and Interactive Shell
Post Exploitation (part 2) Exploit Development
Post Exploitation (part 3) Pivoting
Post Exploitation (part 4) Setting Up a Domain Controller
Module 11 – WebApps
WebApp Introduction (part 1) Web App Testing
WebApp (part 2) Vulnerable Web Applications
WebApp (part 3) SQL Injection
WebApp (part 4) File Inclusion
WebApp (part 5) Cross Site Scripting XSS
Module 12 – Exploit Development
Exploit Development Introduction (part 1)
Exploit Development (part 2) A Program in Memory
Exploit Development (part 3) Stack Frame for Function
Exploit Development (part 4) GNU Compilers
Exploit Development (part 5) Python
Exploit Development (part 6) Executing Unintended Code
Exploit Development (part 7) Network Based Exploits and Debuggers
Exploit Development (part 8) Creating a Cyclic Pattern
Exploit Development (part 9) Verifying Offsets
Exploit Development (part 10) Creating Shell Code in Kali Linux
Exploit Development (part 11) Fuzzing
Exploit Development (part 12) Public Exploits and Perl
Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module
Exploit Development (part 14) Structured Exception Handler Over-Write
Module 13 – Smartphone Pentest Framework
SPF Introduction (part 1)
SPF (part 2) Attach to Smartphone Based Apps
SPF (part 3) Turning an Android App into a SPF Agent
SPF (part 4) Functionality for Agents
SPF (part 5) Pentesting Mobile Devices

Download do material via torrent — magnet:?xt=urn:btih:HLCVJYCRX5DGOZR4JTO5T3KNGQGI6IEL&dn=Cybrary+-+Advanced+Penetration+Testing&tr=udp://