his Course contains:-
1- Pentesting Routers
2- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
3-SNMP attacks
4-Bypassing Firewalls
5-Payloads and Shells
6-HTTP/HTTPS tunneling
7-Port Forwaring, Pivoting, Reverse Connects 8-Privilege Escalation and UAC bypass
9-Hash Dumping and Mimikatz
10-Windows Sessions, Stations and Desktops
11-Impersonation attacks 12-WMIC post exploitation
12-Hidden bind shells
13-Bitsadmin by Its_me_kali
14-Browser Password Recovery
15-PAC Attacks
16-DNS Poisoning
17-Veil Framework
18-DLL Injection using Appinit_DLLs
19-Stripping Manifest Files for DLL Hijacking
20-Attacking with DLL Forwarding
21-Anti-Forensics techniques
22-SSL/TLS misconfigurations
23-Command Injection
24-SQL Injection
25-Cross-Site Scripting (XSS)
26-Local and Remote File Inclusion (LFI / RFI)
27-Cross-Site Request Forgery (CSRF)
http://mega.nz/folder/YtU0WZyR#wDAyWeTCqz-g4-GXhP9MgA
1- Pentesting Routers
2- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
3-SNMP attacks
4-Bypassing Firewalls
5-Payloads and Shells
6-HTTP/HTTPS tunneling
7-Port Forwaring, Pivoting, Reverse Connects 8-Privilege Escalation and UAC bypass
9-Hash Dumping and Mimikatz
10-Windows Sessions, Stations and Desktops
11-Impersonation attacks 12-WMIC post exploitation
12-Hidden bind shells
13-Bitsadmin by Its_me_kali
14-Browser Password Recovery
15-PAC Attacks
16-DNS Poisoning
17-Veil Framework
18-DLL Injection using Appinit_DLLs
19-Stripping Manifest Files for DLL Hijacking
20-Attacking with DLL Forwarding
21-Anti-Forensics techniques
22-SSL/TLS misconfigurations
23-Command Injection
24-SQL Injection
25-Cross-Site Scripting (XSS)
26-Local and Remote File Inclusion (LFI / RFI)
27-Cross-Site Request Forgery (CSRF)
http://mega.nz/folder/YtU0WZyR#wDAyWeTCqz-g4-GXhP9MgA