Penetration with Kali - OSCP

DIFFICULTY    PROFESSIONAL

DURATION    22 HOURS

SECTIONS    16

EPISODES    52

Module 1- 

E1- Introduction to Cyber Security

Module 2- Advanced Command Line 

E2- Linux Essentials  & Keyboard Shortcuts

E3-File Permission

E4-Linux File Management

E5-Mannaging Process and Downloading Files

E6-Piping,Redirecting ,Text Searching and Manipulation

Module 3- Network Practical Tools 

E7-Netcat

E8-Socat

E9-Powershell

E10-Powercat

Module 4- Wireshark 

E11-Advanced Wireshark

E12-Tactical Wireshark

Module 5- Bash Scripting

E13-Introduction-Variables-Arguments

E14-If-else-Elif-Logical operations

E15-Loops-Function

E16-Practical Exercise (Creating our own Tool)

Module 6- Active Information Gathering 

E17-DNS Enumeration

E18-NFS,SMTP,SNMP Enumeration

E19-Nmap TCP-UDP Port Scanning

E20-NSE,OS,Service,Enumeration,Masscan

E21-SMB,Netbios Enumeration

E22-TCP-UDP Port Scanning

Module 7- Vulnerability Scanning with Nessus 

E23-Nessus Installation

E24-Nessus Walkthrough

Module 8- Web App Attacks 

E25-Introduction to Web app

E26-Web app Essentials

E27-Web app Enumeration & Assessment Tools (Fuzzing)

E28-Assessment Tools (Test Vulnerabilities)

E29-Zap Proxy & Burp Suit

E30-Reflected XSS

E31-Stored XSS

E32-Introduction to SQL injection

E33- SQL Exploitation …

Module 9- Client Side Attacks

E34-Attacks with social Engineering

Module 10- Public Exploits

E35- Locating Public Exploits

E36- Exploiting Public Exploits

Module 11- Privilege Escalation

E37- Manual Privilege Escalation

E38- Windows Privilege Escalation (Experimental labs)

E39- Linux Privilege Escalation (Experimental Labs)

Module 12- Password Attacks

E40-Introducction to password Cracking

E41-Sam and Shadow Hash Folders

Module 13- Port Redirection and Tunneling 

E42- SSH Tunneling and Port Forwarding

Module 14- Active Directory Attacks

E43- Introduction-Lab Installation (Server and Managing Domain Controller)

E44- Enumeration and Authentication (NTLM & Kerberos)

E45-Attacks and Full Control 

Module 15-  Metasploit Framework

E46- Introductions-Auxiliary

E47-Exploits-Payloads

E48-Post Exploitation-Metasploit Automation

Module 16- PowerShell Empire 

E49- Introduction-Installation-Overview

E50- Privilege Escalation- Modules

E51- Persistent Mode – Interaction with Metasploit

E52- StarKiller (GUI Empire PowerShell

100$