TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Enterprise Linux
Penetration Testing Linux – Exploit
Curriculum
1 Section
26 Lessons
2 Hours
Expand all sections
Collapse all sections
01.
26
1.1
SQLmap
1.2
SQL injection
1.3
Hardware additions
1.4
SQLninja
1.5
Computer accessories, computers, or networking hardware may be introduced into a system as a vector to gain exexution
1.6
Liffy
1.7
Kadabra
1.8
FIMap
1.9
Enumeration – Burp
1.10
WPSploit
1.11
Enumeration – OWASP ZAP
1.12
Enumeration – Nikto
1.13
Web exploits
1.14
FuzzDB
1.15
Buffer overflows
1.16
Use of software, data, or commands to take advantages of weaknesses
1.17
Exploit public-facing application
1.18
SSLStrip
1.19
Malicious advertisements
1.20
SETookit – Clone websites
1.21
Watering hole attacks
1.22
What is it?
1.23
Drive-by compromise
1.24
What is MITRE
1.25
Rubber ducky Spearfishing attachment Unicorn Spearfishing Link GoPhish, Phishing Frenzy, SET Domain monitoring
1.26
Wifi Pineapple MiTM Responder DNSChef MiTMProxy Morpheus SSH MiTM Ettercap Bettercap MiTM wireless Aircrack-ng Wifiti MANA Toolkit Replication through removable media
This content is protected, please
login
and
enroll
in the course to view this content!