Page Index - Paiet/SEC-335 GitHub Wiki
86 page(s) in this GitHub Wiki:
- Home
- Class labs:
- Footprinting and Recon
- Network and Perimeter Hacking: Evading Firewalls, IDS, and Honeypots
- Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking
- Tools for Information Gathering and Vulnerability Identification
- Network Enumeration
- Penetration Testing Tools
- Place holder
- Reporting and Communication
- A Whole lot of Host Based Vulnerabilities!
- Activity 2.1 & 2.2 Host Discovery
- Activity 4.1 Exploiting Cupcake
- APIs and Webhooks
- App Vulnerabilities: Authentication and Authorization
- App Vulnerabilities: File Inclusions
- App Vulnerabilities: Injection Attacks
- App Vulnerabilities: Insecure Coding
- App Vulnerabilities: XSS, CSRF, and Clickjacking
- Assignment F.1 Home Pentesting Lab
- Buffer Overflows
- Chronological Reflections Page
- File Transfer Fun
- Firewalls
- Footprinting
- Footprinting and Recon Countermeasures
- Honeypots
- IDS and IPS
- IoT Attacks, Tools, and Countermeasures
- IoT Basics
- IoT Threats and Vulnerabilities
- Lab 5.1 Password Guessing
- Lab 8.1 Weevely
- Lab 8.2: Reverse Shell
- Linux Privilege Escalation
- Metasploit framework
- NetBIOS and SMB Enumeration
- Network Vulnerabilities: Denial of Service
- Network Vulnerabilities: Man in the Middle
- Network Vulnerabilities: NAC Bypass and VLAN Hopping
- Network Vulnerabilities: Name Resolution
- Network Vulnerabilities: Pass the Hash
- Network Vulnerabilities: SNMP, SMTP, and FTP
- Nmap: ACK Scan
- OT Attacks, Tools, and Countermeasures
- OTs
- Password Attacks: Basic Concepts
- Password Cracking Attacks
- Password Cracking Enhancement Techniques
- Password Extraction and Cracking
- Penetration testing
- Pentest Objectives
- Pentest thoughts
- Pentesting Tools: Credential Testing
- Pentesting Tools: Debuggers
- Pentesting Tools: MISC
- Pentesting Tools: Mobile
- Pentesting Tools: Networking
- Pentesting Tools: OSINT
- Pentesting Tools: Remote Access
- Pentesting Tools: Scanners
- Pentesting Tools: Web Directory Enumeration
- Pentesting Tools: Web Proxies
- Pentesting Tools: Wireless
- Pivoting and Port Forwarding
- Platforms and Basics
- Port Redirection
- Post Exploitation
- Protocols and Ports
- Reflection on the Reverse Shell Lab
- Remote Shells
- Reports
- Rules of Engagement
- Scanning and Enumeration
- Site Security
- Social Engineering
- SQL Injection
- Vulnerability Mitigation Strategies
- Web Apps: LFI
- Web Apps: RFI
- Week 05: Password Cracking
- Week 1: Passive Reconnaissance
- Week03: DNS Enumeration
- week10: file perm
- Windows Authentication
- Windows Privilege Escalation