Pentest Process

Nmap

Footprinting

Information Gathering - Web Edition

Vulnerability Assessments

File Transfers

Shells & Payloads

Metasploit

Password attacks

Attacking Common Services

Pivoting Tunneling & Port Forwarding

Active Directory Enumeration & Attacks

File Inclusion

File Upload

Command Injections

Web Attacks

Attacking Common Applications

Linux Privesc

Windows Privesc