Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views1 page

Pentration Testing Introduction

The document outlines various types of hacking and penetration testing methodologies, categorized into black hat, grey hat, and white hat hackers. It lists essential skills, tools, and courses related to network security, digital forensics, malware analysis, and different types of penetration testing, including web, mobile, and cloud. Additionally, it highlights various training modules and resources for aspiring penetration testers.

Uploaded by

t30968409
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Pentration Testing Introduction

The document outlines various types of hacking and penetration testing methodologies, categorized into black hat, grey hat, and white hat hackers. It lists essential skills, tools, and courses related to network security, digital forensics, malware analysis, and different types of penetration testing, including web, mobile, and cloud. Additionally, it highlights various training modules and resources for aspiring penetration testers.

Uploaded by

t30968409
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Black hat

Programming (HTML -J.s -PHP-SQL-Python)

Grey hat Essentials


Types Of Hackers Network

APT
OS (windows-Linux) Virtualization

White hat

OSCP

Source Code Review


OSEP
Network Defending Offensive Security
Blue team OSWE
Digital Forensics
OSWP
Malware analysis
EJPT

ECPPT
Service

ECPPTX
Letral movment & pioviting(Post Exploitation)

Network Pentest EWPT


WIFI

Elearn (ine) EWPTX


Bluetooth
Wireless network Pentest
EMAPT
RFID -NFC

EXDS
IOT

Application ECMAP

Server EDFIR
Cources
Network Pentesting
Databse Web Pentest

Wireless Pentesting
Cloud Pentesting
Pentester academy
Web Pentesting
CMS Pentesting

Mobile Device Python - Power shell For Pentesters

SEC 401
Application
Mobile Aplllication Pentest
Server Red Team Penetration Testing (Arabic) SEC 560

Databse
INTRODUCTION SEc 573
SANS
Links SEC 542 -642

Word - Excel Doc SEC 588

PDF FOR 610


Social Engineering (client side attacks)
CEH
EXE -APK

EC-Council C|PENT
Dump Credentials

CHFI
Photo

Nethunter store >> Rucky Malicious USB Hardware Pentest


Module 0: Introduction
Exploit Development Module 1: Linux Basics
Module 2: Network Basics
Module 3: Coding for Penetration testers
Reverse Engineering
Module 4: Footprinting and
Reconnaissance
Malware development & Antivirus Baypass
Module 5: Enumeration and Scanning
Module 6: Network and Perimeter Hacking
Infrastructure pentest Module 7: System Hacking
Module 8: Wireless Hacking
Module 9: Vulnerability Scanning
Module 10: Metasploit
Black box
Module 11: Traffic Capture
Module 12: Exploitation
Crystal box Types Of Engagment
Module 13: Buffer overflow
Module 14: Windows and Linux Privilege
White box Escalation, Maintaining Access
Module 15: Passwords Attacks
Module 16: Client side attacks,Social
Engineering
Portswigger Module 17: [intro] Exploting Java,
Bypassing Antivirus
ROOT ME - TryHACK ME Module 18: [intro] Post Exploitation
Module 19: WebApp Pentest
Offensive Security Labs Module 20: [intro] Mobile Pentest
Module 21: [intro] Exploit Development
Module 22: [intro] IoT/OT Hacking
Vuln hub
Practice Module 23: SPF - Smartphone Pentest
Course Modules Framework
Hack The Box

Pentester Labs

Hack tis SIte

You might also like