Table of contents INE Training Notes Courses eJPT - PTSv2 📒Penetration Testing Prerequisites Introduction Networking Web Applications 📒1. Assessment Methodologies & Auditing Information Gathering Footprinting & Scanning Enumeration 🔬SMB Enum 🔬FTP Enum 🔬SSH Enum 🔬HTTP Enum 🔬MYSQL Enum 🔬SMTP Enum Vulnerability Assessment Auditing Fundamentals 📒2. Host & Network Penetration Testing System/Host Based Attacks 🪟 Windows Attacks 🔬IIS - WebDAV 🔬SMB - PsExec 🔬RDP 🔬WinRM 🔬Win Kernel Privesc 🔬UAC Bypass 🔬Access Token 🔬Alternate Data Stream 🔬Credentials Dumping 🐧 Linux Attacks 🔬Bash 🔬FTP 🔬SSH 🔬SAMBA 🔬Cron Jobs 🔬SUID 🔬Hashes Dumping Network Based Attacks 🔬Tshark, ARP, WiFi The Metasploit Framework (MSF) 🔬HFS - MSF Exploit 🔬Tomcat - MSF Exploit 🔬FTP - MSF Exploit 🔬Samba - MSF Exploit 🔬SSH - MSF Exploit 🔬SMTP - MSF Exploit 🔬Meterpreter - MSF 🔬Win Post Exploitation - MSF 🔬Linux Post Exploitation - MSF Exploitation 🔬Fixing Exploits - HFS 🔬Win Workflow Platform - MSF 🔬Win Black Box Pentest 🔬Linux Black Box Pentest Post-Exploitation 🔬Windows Post-Exploitation 🔬Windows Privilege Escalation 🔬Windows Persistence 🔬Linux Post-Exploitation 🔬Linux Privilege Escalation 🔬Linux Persistence 🔬Cracking Hashes 🔬Pivoting Social Engineering 📒3. Web Application Penetration Testing Intro to Web App Pentesting 🔬HTTP Enumeration 🔬Web App Scanning 🔬Web App Attacks 🔬Exam Preparation - Labs PTSv1 Prerequisites Labs 🔬HTTP(S) Traffic Sniffing 🔬Find the Secret Server 🔬Data Exfiltration 🔬Burp Suite Basics - Directory Enumeration PTSv2 Practice Labs 🌐 eJPT References 📜 eJPT Cheat Sheet ICCA 📒1. Cloud Foundations 📒2. Cloud Management Concepts 📒3. Cloud Identity, Security, and Compliance 🌐 Icca References eMAPT 📒Android 📒iOS 🌐 eMAPT References 🏠 syselement's Blog Home