intro_pentest.yml 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. title: Introduction to pentesting
  2. url: /intro-pentest/
  3. content:
  4. - title: Intro
  5. desc: Get started with hacking. In this section we'll explain in a deeper way what are going to be the contents of this course.
  6. contents:
  7. - name: Introduction
  8. url: /lessons/intro_pentest/Intro/introduction
  9. - name: Setting the stage
  10. url: /lessons/intro_pentest/Intro/setting-the-stage
  11. - name: Introduction to BlackArch
  12. url: /lessons/intro_pentest/Intro/introduction-to-blackarch
  13. - name: The use and creation of a hacking Lab
  14. url: /lessons/intro_pentest/Intro/creating-a-hacking-lab
  15. - name: Phases of a penetration test
  16. url: /lessons/intro_pentest/Intro/phases-of-a-penetration-test
  17. - name: Four steps methodology
  18. url: /lessons/intro_pentest/Intro/four-steps-meth
  19. - title: Reconnaissance
  20. desc: Learn to gather information about your target, and how to use it when hacking.
  21. contents:
  22. - name: Introduction
  23. url: /lessons/intro_pentest/Reconnaissance/introduction
  24. - name: HTTRack
  25. url: /lessons/intro_pentest/Reconnaissance/httrack
  26. - name: Google directives
  27. url: /lessons/intro_pentest/Reconnaissance/google-directives
  28. - name: The Harvester
  29. url: /lessons/intro_pentest/Reconnaissance/the-harvester
  30. - name: Whois
  31. url: /lessons/intro_pentest/Reconnaissance/whois
  32. - name: Host
  33. url: /lessons/intro_pentest/Reconnaissance/host
  34. - name: Extracting information from DNS
  35. url: /lessons/intro_pentest/Reconnaissance/extract-info-from-dns
  36. - name: NSLookup
  37. url: /lessons/intro_pentest/Reconnaissance/nslookup
  38. - name: Dig
  39. url: /lessons/intro_pentest/Reconnaissance/dig
  40. - name: Extracting information from E-Mail servers
  41. url: /lessons/intro_pentest/Reconnaissance/extracting-information-from-mail-servers
  42. - name: MetaGooFil
  43. url: /lessons/intro_pentest/Reconnaissance/metagoofil
  44. - name: Social Engineering
  45. url: /lessons/intro_pentest/Reconnaissance/social-engineering
  46. - name: Finding attackable targets
  47. url: /lessons/intro_pentest/Reconnaissance/finding-attackable-targets
  48. - name: How do I practise this step
  49. url: /lessons/intro_pentest/Reconnaissance/how-do-i-practise-this-step
  50. - name: Where do I go from here?
  51. url: /lessons/intro_pentest/Reconnaissance/where-do-i-go-from-here
  52. - name: Summary
  53. url: /lessons/intro_pentest/Reconnaissance/summary
  54. - title: Scanning
  55. desc: Scan your target to get more information and - if any - discover vulnerabilities
  56. contents:
  57. - name: Introduction
  58. url: /lessons/intro_pentest/Scanning/introduction
  59. - name: Pings and Sweeps
  60. url: /lessons/intro_pentest/Scanning/pings-and-sweeps
  61. - name: The three way handshake
  62. url: /lessons/intro_pentest/Scanning/handshake
  63. - name: Performing port scans
  64. url: /lessons/intro_pentest/Scanning/port-scanning
  65. - name: Vulnerability scanning
  66. url: /lessons/intro_pentest/Scanning/vulnerability-scanning
  67. - name: How do I practise this step?
  68. url: /lessons/intro_pentest/Scanning/how-do-i-practise-this-step
  69. - name: Where do I go from here?
  70. url: /lessons/intro_pentest/Scanning/where-do-i-go-from-here
  71. - name: Summary
  72. url: /lessons/intro_pentest/Scanning/summary
  73. - title: Exploitation
  74. desc: Learn how to exploit the vulnerabilities of your target, and even, how to get the control if there are not any.
  75. contents:
  76. - name: Introduction
  77. url: /lessons/intro_pentest/Exploitation/introduction
  78. - name: Gaining access to remote services with Medusa
  79. url: /lessons/intro_pentest/Exploitation/medusa
  80. - name: Metasploit
  81. url: /lessons/intro_pentest/Exploitation/metasploit
  82. - name: Cracking passwords with John the Ripper
  83. url: /lessons/intro_pentest/Exploitation/john
  84. - name: Password resetting
  85. url: /lessons/intro_pentest/Exploitation/password-resetting
  86. - name: Sniffing network traffic
  87. url: /lessons/intro_pentest/Exploitation/sniffing-network-traffic
  88. - name: Macof
  89. url: /lessons/intro_pentest/Exploitation/macof
  90. - name: How do I practise this step?
  91. url: /lessons/intro_pentest/Exploitation/how-do-i-practise-this-step
  92. - name: Where do I go from here?
  93. url: /lessons/intro_pentest/Exploitation/where-do-i-go-from-here
  94. - name: Summary
  95. url: /lessons/intro_pentest/Exploitation/summary
  96. - title: Web-Based Exploitation
  97. desc: Learn to exploit a website.
  98. contents:
  99. - name: Introduction
  100. url: /lessons/intro_pentest/WebExploitation/introduction
  101. - name: Nikto
  102. url: /lessons/intro_pentest/WebExploitation/nikto
  103. - name: Spidering websites with WebScarab
  104. url: /lessons/intro_pentest/WebExploitation/webscarab
  105. - name: Intercepting requests with WebScarab
  106. url: /lessons/intro_pentest/WebExploitation/webscarab2
  107. - name: Code Injection Attacks
  108. url: /lessons/intro_pentest/WebExploitation/code-injection-attacks
  109. - name: CROSS-SITE-SCRIPTING
  110. url: /lessons/intro_pentest/WebExploitation/xss
  111. - name: How do I practise this step?
  112. url: /lessons/intro_pentest/WebExploitation/how-do-i-practise-this-step
  113. - name: Where do I go from here?
  114. url: /lessons/intro_pentest/WebExploitation/where-do-i-go-from-here
  115. - name: Summary
  116. url: /lessons/intro_pentest/WebExploitation/summary
  117. - title: Maintaining Access with Backdoors and Rootkits
  118. desc: Usually, when gained the access to your target it'll temporaly, learn how to create a backdoor in order to get access to the systems everytime - even after reboots -
  119. contents:
  120. - name: Introduction
  121. url: /lessons/intro_pentest/Backdooring/introduction
  122. - name: Netcat
  123. url: /lessons/intro_pentest/Backdooring/netcat
  124. - name: Cryptcat
  125. url: /lessons/intro_pentest/Backdooring/cryptcat
  126. - name: Rootkits
  127. url: /lessons/intro_pentest/Backdooring/rootkits
  128. - name: Detecting and defending against rootkits
  129. url: /lessons/intro_pentest/Backdooring/detecting-rootkits
  130. - name: How do I practise this step?
  131. url: /lessons/intro_pentest/Backdooring/how-do-i-practise-this-step
  132. - name: Where do I go from here?
  133. url: /lessons/intro_pentest/Backdooring/where-do-i-go-from-here
  134. - name: Summary
  135. url: /lessons/intro_pentest/Backdooring/summary