itsMe Posted January 9, 2023 Share Posted January 9, 2023 This is the hidden content, please Sign In or Sign Up Table of Contents About the Authors Introduction—101 Labs Lab 1. Credential Harvesting Using Site Cloning Lab 2. Nmap Lab 3. Recon-ng Lab 4. Conducting a Dictionary Attack to Crack Online Passwords Using Hydra Lab 5. Conducting a Cross Site Scripting (XXS) Attack Lab 6. Automating SQL Injection Using SQLmap Lab 7. How to Use Burp Suite to Intercept Client-side Requests Lab 8. Information Gathering Using theHarvester Lab 9. Evil Twin Attack with Airgeddon Lab 10. Using Curl Lab 11. Using Traceroute in Linux Lab 12. Ping and Its Various Uses Lab 13. How to SSH into a Server from a Windows Machine Using PuTTY Lab 14. How to SSH into a Server from a Linux Machine Lab 15. How to Setup Your Own Kali Linux Virtual Machine Lab 16. Nslookup Lab 17. Dig Lab 18. Using Ipconfig to View and Modify Network Information on Windows Lab 19. Using Ifconfig to View and Modify Network Information on Linux Lab 20. Hping for Security Auditing and Testing of Network Devices Lab 21. Using Netstat to View Networking Information Lab 22. Netcat Lab 23. IP Scanners Lab 24. Using ARP for Network Reconnaissance Lab 25. Using Route to Display Network Information on Linux Lab 26. Using Scanless for Easy Anonymous Port Scanning Lab 27. Directory Traversal Lab 28. Gathering DNS Information with Dnsenum Lab 29. How to Connect to an Internal Network Using OpenVPN Lab 30. How to Crack Passwords with Hashcat Lab 31. Fuzzing with Spike Lab 32. Spoofing your MAC Address with Macchanger Lab 33. Perform a Network Vulnerability Scan with OpenVAS Lab 34. Automate WordPress Scanning with Wpscan Lab 35. Hack WPS with Reaver Lab 36. Cross Site Request Forgery (CSRF) Lab 37. Using Gobuster to Discover Directories Lab 38. Using Burp Suite’s Intruder Lab 39. Broken Access Control Lab 40. Broken Access Control Lab 41. Getting a Reverse Shell on a Server through a File Upload Lab 42. Manual Privilege Escalation Using Python Lab 43. Web Application Vulnerability Scanning with Nikto Lab 44. Web Server Vulnerability Scanning with ZAP Lab 45. Capturing Password Hashes with Responder Lab 46. Monitoring Wi-Fi Signals with Kismet Lab 47. Sn1per Lab 48. Browser Exploitation Framework (BeEF) Lab 49. Hacking WPS Networks with Wifite Lab 50. Capturing Credentials Submitted through http with Wireshark Lab 51. Packet Capture with Tcpdump Lab 52. How to Discover Nearby Wi-Fi Networks with Airodump-ng Lab 53. How to Capture a WPA Handshake File Using Airodump-ng and Aireplay-ng Lab 54. How to Crack WPA Handshake Files Using Aircrack-ng Lab 55. Using Proxychains for Anonymous Hacking Lab 56. How to Use MD5 Checksums to Determine if a File Contains Malware Lab 57. How to Use Process Explorer to Find and Scan Suspicious Processes for Malware Lab 58. Fundamental Linux Concepts Lab 59. Linux Operations Advanced Linux Operations Lab 60. Basic File Operations Lab 61. Advanced File Operations Lab 62. Cracking Basic Hashes with John the Ripper Lab 63. Cracking Advanced Hashes with John the Ripper Lab 64. More Advanced Uses of John the Ripper Lab 65. Establishing a Reverse Shell with Netcat Lab 66. Establishing a Bind Shell with Netcat Lab 67. How to Stabilise Netcat Shells Lab 68. Getting a Reverse Shell Using Socat Lab 69. Establishing a Bind Shell Using Socat Lab 70. Establishing a Stable Socat Shell Lab 71. Upgrading a Limited Shell to Meterpreter Shell Using Metasploit Lab 72. Exploiting a Vulnerable FTP Service to Gain a Shell Using Metasploit Lab 73. Running a Vulnerability Scan with Nessus Lab 74. Creating Metasploit Payloads with Msfvenom Lab 75. Establishing a Reverse Shell on a Linux Target Using Msfvenom and Metasploit Lab 76. Establishing a Bind Shell on a Linux Target Using Msfvenom and Metasploit Lab 77. Basic Meterpreter Commands Lab 78. More Advanced Meterpreter Commands Lab 79. Introduction to Bash Scripting Lab 80. More Bash Scripting Lab 81. Advanced Bash Scripting Lab 82. How to Establish a Meterpreter Shell on a Windows Target Using SET Lab 83. How to Migrate to a Different Process on the Target Machine after Establishing a Meterpreter Shell Lab 84. How to Use Mimikatz to Extract all the Passwords from a Windows Machine Lab 85. How to Enumerate for Privilege Escalation on a Windows Target with WinPEAS Lab 86. How to Enumerate for Privilege Escalation on a Linux Target with LinPEAS Lab 87. OWASP A1—OS Command Injection Lab 88. OWASP A2—Broken Authentication and Session Management: Username Enumeration Vulnerability Lab 89. OWASP A3—Sensitive Information Disclosure Lab 90. OWASP A4—EML External Entities (XXE) Lab 91. OWASP A5—Broken Access Control Lab 92. OWASP A6—Security Misconfiguration Lab 93. OWASP A7—Cross Site Scripting (XSS) Lab 94. OWASP A8—Insecure Deserialization Lab 95. OWASP A9—Using Components with Known Vulnerabilities Lab 96. OWASP A10—Unvalidated Redirects and Forwards Lab 97. Introduction to Python Scripting Lab 98. More Python Scripting Lab 99. More Advanced Python Scripting Lab 100. Introduction to Scripting with PowerShell Lab 101. More Advanced Scripting with PowerShell This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts