Description
Assessment Methodologies (25%)
Locate endpoints on a network
Identify open ports and services on a target
Identify operating system of a target
Extract company information from public sources
Gather email addresses from public sources
Gather technical information from public sources
Identify vulnerabilities in services
Evaluate information and criticality or impact of vulnerabilities
Host and Network Penetration Testing (35%)
Identify and modify exploits
Conduct exploitation with metasploit
Demonstrate pivoting by adding a route and by port forwarding
Conduct brute-force password attacks and hash cracking
Web Application Penetration Testing (15%)
Identify vulnerabilities in web applications
Locate hidden file and directories
Conduct brute-force login attack
Conduct web application reconnaissance
note :- Host and Networking Auditing is missing
Reviews
There are no reviews yet.