Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked 101 Labs – CompTIA Security+


itsMe

Recommended Posts

This is the hidden content, please

Table of Contents
About the Authors
Introduction—101 Labs
Lab 1. Credential Harvesting Using Site Cloning
Lab 2. Nmap
Lab 3. Recon-ng
Lab 4. Conducting a Dictionary Attack to Crack Online Passwords Using Hydra
Lab 5. Conducting a Cross Site Scripting (XXS) Attack
Lab 6. Automating SQL Injection Using SQLmap
Lab 7. How to Use Burp Suite to Intercept Client-side Requests
Lab 8. Information Gathering Using theHarvester
Lab 9. Evil Twin Attack with Airgeddon
Lab 10. Using Curl
Lab 11. Using Traceroute in Linux
Lab 12. Ping and Its Various Uses
Lab 13. How to SSH into a Server from a Windows Machine Using PuTTY
Lab 14. How to SSH into a Server from a Linux Machine
Lab 15. How to Setup Your Own Kali Linux Virtual Machine
Lab 16. Nslookup
Lab 17. Dig
Lab 18. Using Ipconfig to View and Modify Network Information on Windows
Lab 19. Using Ifconfig to View and Modify Network Information on Linux
Lab 20. Hping for Security Auditing and Testing of Network Devices
Lab 21. Using Netstat to View Networking Information
Lab 22. Netcat
Lab 23. IP Scanners
Lab 24. Using ARP for Network Reconnaissance
Lab 25. Using Route to Display Network Information on Linux
Lab 26. Using Scanless for Easy Anonymous Port Scanning
Lab 27. Directory Traversal
Lab 28. Gathering DNS Information with Dnsenum
Lab 29. How to Connect to an Internal Network Using OpenVPN
Lab 30. How to Crack Passwords with Hashcat
Lab 31. Fuzzing with Spike
Lab 32. Spoofing your MAC Address with Macchanger
Lab 33. Perform a Network Vulnerability Scan with OpenVAS
Lab 34. Automate WordPress Scanning with Wpscan
Lab 35. Hack WPS with Reaver
Lab 36. Cross Site Request Forgery (CSRF)
Lab 37. Using Gobuster to Discover Directories
Lab 38. Using Burp Suite’s Intruder
Lab 39. Broken Access Control
Lab 40. Broken Access Control
Lab 41. Getting a Reverse Shell on a Server through a File Upload
Lab 42. Manual Privilege Escalation Using Python
Lab 43. Web Application Vulnerability Scanning with Nikto
Lab 44. Web Server Vulnerability Scanning with ZAP
Lab 45. Capturing Password Hashes with Responder
Lab 46. Monitoring Wi-Fi Signals with Kismet
Lab 47. Sn1per
Lab 48. Browser Exploitation Framework (BeEF)
Lab 49. Hacking WPS Networks with Wifite
Lab 50. Capturing Credentials Submitted through http with Wireshark
Lab 51. Packet Capture with Tcpdump
Lab 52. How to Discover Nearby Wi-Fi Networks with Airodump-ng
Lab 53. How to Capture a WPA Handshake File Using Airodump-ng and Aireplay-ng
Lab 54. How to Crack WPA Handshake Files Using Aircrack-ng
Lab 55. Using Proxychains for Anonymous Hacking
Lab 56. How to Use MD5 Checksums to Determine if a File Contains Malware
Lab 57. How to Use Process Explorer to Find and Scan Suspicious Processes for Malware
Lab 58. Fundamental Linux Concepts
Lab 59. Linux Operations Advanced Linux Operations
Lab 60. Basic File Operations
Lab 61. Advanced File Operations
Lab 62. Cracking Basic Hashes with John the Ripper
Lab 63. Cracking Advanced Hashes with John the Ripper
Lab 64. More Advanced Uses of John the Ripper
Lab 65. Establishing a Reverse Shell with Netcat
Lab 66. Establishing a Bind Shell with Netcat
Lab 67. How to Stabilise Netcat Shells
Lab 68. Getting a Reverse Shell Using Socat
Lab 69. Establishing a Bind Shell Using Socat
Lab 70. Establishing a Stable Socat Shell
Lab 71. Upgrading a Limited Shell to Meterpreter Shell Using Metasploit
Lab 72. Exploiting a Vulnerable FTP Service to Gain a Shell Using Metasploit
Lab 73. Running a Vulnerability Scan with Nessus
Lab 74. Creating Metasploit Payloads with Msfvenom
Lab 75. Establishing a Reverse Shell on a Linux Target Using Msfvenom and Metasploit
Lab 76. Establishing a Bind Shell on a Linux Target Using Msfvenom and Metasploit
Lab 77. Basic Meterpreter Commands
Lab 78. More Advanced Meterpreter Commands
Lab 79. Introduction to Bash Scripting
Lab 80. More Bash Scripting
Lab 81. Advanced Bash Scripting
Lab 82. How to Establish a Meterpreter Shell on a Windows Target Using SET
Lab 83. How to Migrate to a Different Process on the Target Machine after
Establishing a Meterpreter Shell
Lab 84. How to Use Mimikatz to Extract all the Passwords from a Windows Machine
Lab 85. How to Enumerate for Privilege Escalation on a Windows Target with WinPEAS
Lab 86. How to Enumerate for Privilege Escalation on a Linux Target with LinPEAS
Lab 87. OWASP A1—OS Command Injection
Lab 88. OWASP A2—Broken Authentication and Session Management: Username Enumeration Vulnerability
Lab 89. OWASP A3—Sensitive Information Disclosure
Lab 90. OWASP A4—EML External Entities (XXE)
Lab 91. OWASP A5—Broken Access Control
Lab 92. OWASP A6—Security Misconfiguration
Lab 93. OWASP A7—Cross Site Scripting (XSS)
Lab 94. OWASP A8—Insecure Deserialization
Lab 95. OWASP A9—Using Components with Known Vulnerabilities
Lab 96. OWASP A10—Unvalidated Redirects and Forwards
Lab 97. Introduction to Python Scripting
Lab 98. More Python Scripting
Lab 99. More Advanced Python Scripting
Lab 100. Introduction to Scripting with PowerShell
Lab 101. More Advanced Scripting with PowerShell

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.