Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin by Its_me_kali
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
SSL/TLS misconfigurations
Command Injection
SQL Injection
Cross-Site Scripting (XSS)
Local and Remote File Inclusion (LFI / RFI)
Cross-Site Request Forgery (CSRF)
And other interesting topics
Free Download Link
> https://mega.nz/file/UzVxgB6a#EJ5zeIZuhj3TrNt0tWgGNmStaKpM9l84KdFBKHv-A3o
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Firewalls
Payloads and Shells
HTTP/HTTPS tunneling
Port Forwaring, Pivoting, Reverse Connects
Privilege Escalation and UAC bypass
Hash Dumping and Mimikatz
Windows Sessions, Stations and Desktops
Impersonation attacks
WMIC post exploitation
Hidden bind shells
Bitsadmin by Its_me_kali
Browser Password Recovery
PAC Attacks
DNS Poisoning
Veil Framework
DLL Injection using Appinit_DLLs
Stripping Manifest Files for DLL Hijacking
Attacking with DLL Forwarding
Anti-Forensics techniques
SSL/TLS misconfigurations
Command Injection
SQL Injection
Cross-Site Scripting (XSS)
Local and Remote File Inclusion (LFI / RFI)
Cross-Site Request Forgery (CSRF)
And other interesting topics
Free Download Link
> https://mega.nz/file/UzVxgB6a#EJ5zeIZuhj3TrNt0tWgGNmStaKpM9l84KdFBKHv-A3o