CTF Training
CTF Training
⏰24 hours | ▶️ 24 Videos | 📣 9435 Participants | 🎓 4318 Reviews | 4.8 ⭐⭐⭐⭐⭐
Choose a Plan that Works for You
Self Paced
- Advanced sessions
- Interview Q&A
- Free study Materials
- Premium Technical support
Instructor Led Live Training
- Live Instructor
- Advanced sessions
- Interview Q&A
- Premium Technical Support
Corporate Training
- Live Instructor
- Advanced sessions
- Interview Q&A
- Premium Technical Support
Upcoming Batches PST
Weekday
| June 10(1 HR A DAY) |
| 07:00 PM PST |
| Enroll Now → |
Weekday
| June 26(1 HR A DAY) |
| 07:00 AM PST |
| Enroll Now → |
Weekend
| June 28(1 HR A DAY) |
| 07:00 PM PST |
| Enroll Now → |
Upcoming Batches IST
Weekday
| June 11(1 HR A DAY |
| 07:30 AM IST |
| Enroll Now → |
Weekday
| June 26(1 HR A DAY) |
| 07:30 PM IST |
| Enroll Now → |
Weekday
| June 29(1 HR A DAY) |
| 07:00 AM PST |
| Enroll Now → |
Course Description
variety of tasks related to computer security problems.
understanding of the TCP and IP protocols.
online classes.
in Ethical Hacking or IT security.

Course Content
1.Introduction to Pentesting
- Penetration Testing Benefits
- Types of Penetration Testing
- Penetration Testing Methodologies
- Law & Compliance
- Planning, Managing & Reporting
2.Assessment & Skill Management
- Finding Files
- Services in Kali
- SSH Service
- FTP Services
- HTTP Service
- SNMP Service
- Mysql Services
- Service Management
- IP Protocols, Networking Protocols, IPSec, VOIP
- Network Architecture, Mapping & Target Identification
3.Basic Linux and Commands
- Locate
- Which
- Find
- Sed
- Awk
- Cut
- Sort
- Grep
- Head
- Tail
- Wget
- Cat
4.Netcat Tutorials
- Getting start with NC
- Connecting to a Server
- Fetching HTTP header
- Chatting
- Creating a Backdoor
- Verbose Mode
- Save Output to Disk
- Port Scanning
- TCP Delay Scan
- UDP Scan
- Reverse TCP Shell Exploitation
- Randomize Port
- File Transfer
- Reverse Netcat Shell Exploitation
- Banner grabbing
5.Port Scanning with Nmap & WireShark
- TCP Connect Scan with wireshark
- Network sweeping with wireshark
- SYN Scan with wireshark
- UDP Scan with wireshark
- FIN Scan with wireshark
- Null Scan with wireshark
- OS Discovery with wireshark
- NSE Scripts with wireshark
- Nmap Firewall Scan
6.Enumeration
- Overview
- Structure, interpretation and analysis of DNS records
- DNS Enumeration
- Forward DNS Lookup
- Reverse DNS Lookup
- Zone Transfers
- NetBIOS & SMB Enumeration
- Null Sessions
- Enum4Linux
- SMB NSE Scripts
- MYSQL Enumeration
- MSSQL Enumeration
- SMTP Enumeration
- VRFY Script
- Python Port
- SNMP Enumeration
- SNMP MiB
- SNMPWalk
7.Passive Info Gathering
- Overview
- Google Search
- Google Hacking
- GHDB
- NNTP Newsgroups & Information Leakage from Mail Headers
8.Directory Bruteforce Attack
- Dirb
- Dirbuster
- Dirsearch
- Metasploit
9.Windows Security Assessment
- Domain Reconnaissance
- User Enumeration
- Active Directory
- Windows Patch Management Strategies
- Desktop Lockdown & Exchange Server
10.Reverse Shell
- Php reverse shell
- Python reverse shell
- Perl reverse shell
- Bash reverse shell
- Msfvenom shell
11.Intro to Overflows
- Overview
- Vulnerable Code
- Stack Overflow
- Heap Overrun/Overflow
12.Windows BO Example
- Overview DEP, ASLR and CFG
- Fuzzing
- Crash Replication
- Controlling EIP
- Locating space for our Shellcode
- Bad Characters
- Redirecting Execution
- Introducing Mona
- Shellcode Payload
13.Linux BO Example
- Overview DEP, ASLR and Canaries
- Controlling EIP
- Locating Space
- First Stage Shellcode
- Locating RET
- Generating Shellcode
14.Using Public Exploits
- Overview
- Finding Exploits
- Exploit-DB
- Fixing Exploits 1
- Fixing Exploits 2
- Cross-Compiling
15.File Transfers
- FTP
- Python HTTP Server
- php http server
- HFS Tool
- Netcat
- CURL
- Wget
- TFTP
- Python SMB Server
- Powershell File Transfer
- Bitsadmin
16.Linux Privilege Escalation
- Suid Binaries
- AbsuingSudo’s Right
- Kernel Exploit
- Path Variables
- Multiple Ways to edit /etc/passwd file
17.Linux Privilege Escalation
- Suid Binaries
- AbsuingSudo’s Right
- Kernel Exploit
- Path Variables
- Multiple Ways to edit /etc/passwd file
18.Windows Privilege Escalation
- Weak File Permissions
- Always Install Elevated
- Bypass UAC
- Unquoted Service Path
- Kernel Exploits
19.Web Application Attacks
- Overview
- Web Servers Flaws
- Web Protocols
- Local File Inclusion
- SQL Injection
- Authentication Bypass
- Error Based Enum
- Blind SQL Injection
- Attack Proxies
- XSS, LDAP & XML Injection
- SQLMap
- Web APIs
- Web Sub-Components
20.Password Cracking
- Overview
- Crunch
- Passing the Hash
- Password Profiling
- Online Attacks
- Medusa
- Ncrack
- Hydra
- Password Hashes
- Cracking Hashes
- LM / NTLM
21.Port Fun
- Overview
- Port Forwarding
- SSH Tunnels
- Dynamic Proxies
- Proxy Chains
22.Metasploit Framework
- Overview
- AUX Modules
- SNMP Modules
- SMB Modules
- WEBDAV Modules
- Database Services
- Exploits
- Payloads
- Meterpreter
- Meterpreter in Action
- Additional Payloads
- Binary Payloads
- Multihandler
- Porting Exploits
- Post Exploitation
23.Antivirus Avoidance
- Overview
- Shellter
- Veil-Evasion
- thefatrat
24.Misconfigured Lab Setup
- WordPress lab Setup & Pentesting
- Joomla Lab Setup & Pentesting
- Drupal Lab Setup & Pentesting
