- Eng. Nagy K. Aly nagy@aast.edu
| # | Topic | Content |
|---|---|---|
| 0 | Core-Knowledge | Basics of Networks, IP, MAC, Protocols,... etc and Enviroment Setup |
| 1 | Network Discovery | Scanning Networks and discovering ports and services using nmap |
| 2 | Password Attack | Generate wordlist using crunch, crack logins using hydra, Password Attack using john the ripper and #hashcat# |
| 3 | Denial of Service | Exhaust resources of target machine by sending large number of requests using hping3 and metasploit |
| 4 | Exploitation | creating backdoor payload using venom and accessing the target machine using metasploit |
| 5 | Session Hijacking | Intercepting HTTP traffic and DNS poisoning using bettercap, bypassing HTTPS using hstshijack |
| 6 | Database Attack | SQL Injection using sqlmap |
| 7 | Firewall | Uncomplicated Firewall (ufw) |
For Educational Purposes only ;)
