Course curriculum

  • 1

    Nmap - The Network Mapper

    • Legal Considerations

    • Why Nmap

    • Nmap Installation Windows

    • Nmap Installation Linux

    • Nmap Email Enumeration

    • Nmap Fake TTL

    • Nmap RCE Method Exploitation

    • Nmap XML Output to CSV

    • Nmap Decoy Scan Bypass Firewalls

    • Nmap Spoof MAC Address

    • Nmap Cheatsheet

  • 2

    Burpsuite

    • Burp Suite Setup and Practical

    • Burpsuite CTF Approach

  • 3

    Google Hacking Database

    • Google Dorks

    • Become Author of your Google Dork

  • 4

    Content Discovery Tools

    • Dirsearch - SDE Live Hunting

    • Sublist3r

    • Project Discovery Subdomains

    • Resolving IP's & Domains + CIDR

    • Resolving Subs + Status Code + Banner Grab

  • 5

    Github Recon

    • Automated Way

    • Manual Way

  • 6

    Linux

    • Installation of Linux Kali 2020.2

  • 7

    Shodan

    • Installation & Lab Setup

    • Shodan API Setup

    • Shodan Information & Count

    • Shodan Scan Downloads

    • Shodan Host Enumeration

    • Shodan Parse Dataset

    • Shodan Search Query

    • Shodan Scan Commands

    • Shodan Stats

    • Shodan GUI

    • Shodan Report Generation

    • Shodan Report Generation 2

    • Shodan Images

    • Shodan Exploits

    • Bonus: Shodan Extension

  • 8

    Anatomy of HTTP Request

    • Breakdown of HTTP Request