A non-exhaustive set of topics covered includes:
- Pentesting Routers
- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
- SNMP attacks
- Bypassing Firewalls
- Payloads and Shells
- HTTP/HTTPS tunneling
- Port Forwarding, Pivoting, Reverse Connects
- Privilege Escalation and UAC bypass
- Hash Dumping and Mimikatz
- Windows Sessions, Stations and Desktops
- Impersonation attacks
- WMIC post-exploitation
- Hidden bind shells
- Bitsadmin
- Browser Password Recovery
- PAC Attacks
- DNS Poisoning
- Veil Framework and AV Evasion
- Metasploit Loader 32/64-bit
- DLL Hijacking basics
- DLL Hijacking and Meterpreter
- Privilege Escalation via DLL Hijacking
- DLL Injection using Appinit_DLLs
- Stripping Manifest Files for DLL Hijacking
- Attacking with DLL Forwarding
- Anti-Forensics techniques
- Memory Dumping and Analysis
- ... tons of other interesting topics
Pentester Academy – Network Pentesting
Reviews
There are no reviews for this product.