Name |
Progress |
Difficulty |
status of Completion |
---|---|---|---|
Penetration Testing Process | Fundamental | ||
Getting Started | Fundamental | ||
Network Enumeration with Nmap | Easy | ||
Footprinting | Medium | ||
Information Gathering - Web Edition | Easy | ||
Vulnerability Assessment | Easy | ||
File Transfers | Medium | ||
Shells & Payloads | Medium | ||
Using the Metasploit Framework | Easy | ||
Password Attacks | Medium | ||
Attacking Common Services | Medium | ||
Pivoting, Tunneling, and Port Forwarding | Medium | ||
Active Directory Enumeration & Attacks | Medium | ||
Using Web Proxies | Easy | ||
Attacking Web Applications with Ffuf | Easy | ||
Login Brute Forcing | Easy | ||
SQL Injection Fundamentals | Medium | ||
SQLMap Essentials | Easy | ||
Cross-Site Scripting (XSS) | Easy | ||
File Inclusion | Medium | ||
File Upload Attacks | Medium | ||
Command Injections | Medium | ||
Web Attacks | Medium | ||
Attacking Common Applications | Medium | ||
Linux Privilege Escalation | Easy | ||
Windows Privilege Escalation | Medium | ||
Documentation & Reporting | Easy | ||
Attacking Enterprise Networks |
Start with the fundamentals:
Several platforms offer hands-on labs and theoretical content for free: