Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 3150

Penetration Testing Professional (PTP) Version 5

by MiNdFuCkErY_1337skid - 02 May, 2020 - 02:29 PM
This post is by a banned member (r00tx01) - Unhide
r00tx01  
Registered
2
Posts
0
Threads
2 Years of service
#33
Thank you for sharing
This post is by a banned member (Hazelnut69) - Unhide
18
Posts
0
Threads
1 Year of service
#34
(02 May, 2020 - 02:29 PM)MiNdFuCkErY_1337skid Wrote: Show More
Code:
[b][b][img]https://i.imgur.com/SRbqijV.jpg[/img]

Penetration Testing Professional[/b]

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit[/b]

Thx
This post is by a banned member (abdoibrahim) - Unhide
7
Posts
0
Threads
1 Year of service
#35
thanks for sharing
This post is by a banned member (tbrtpez006) - Unhide
61
Posts
0
Threads
1 Year of service
#36
thanks
This post is by a banned member (tbrtpez006) - Unhide
61
Posts
0
Threads
1 Year of service
#37
link is not working
This post is by a banned member (r30b0t) - Unhide
r30b0t  
Registered
5
Posts
0
Threads
2 Years of service
#38
(02 May, 2020 - 02:29 PM)MiNdFuCkErY_1337skid Wrote: Show More
Code:
[b][b][img]https://i.imgur.com/SRbqijV.jpg[/img]

Penetration Testing Professional[/b]

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit[/b]

thx

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 9 Guest(s)