Hackers Era Training Module :
Penetration Testing Training
Module 1 : Introduction to the World of Hacking: SOL 1
➢
➢
➢
➢
➢
➢
➢
Module 2 : Introduction to the World of Hacking: SOL 1
➢
➢
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest:SOL 2
➢
➢
➢
➢
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest: SOL3
➢
○
○
○
○
○
○
➢
Module 3 : Solid Introduction to pentest: SOL3
➢
○○○○
➢
➢
➢
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest: SOL3
Module 4 : Google As A Weapon : SOL 4
➢
➢
➢
➢
➢
➢
➢
Module 4 : Google As A Weapon : SOL 4
➢
○
○
➢
➢
➢
Module 5 : Intelligent Information Gathering SOL 5
➢
➢
➢
➢
➢
➢
➢
➢
Module 5 : Intelligent Information Gathering SOL 6
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 5 : Intelligent Information Gathering SOL 6
Module 6 : Scanning and Vulnerability Assessment SOL 7
➢
○○○○
➢
○○○○
➢
➢
➢
○
➢
Module 6 : Scanning and Vulnerability Assessment SOL 7
Module 7 : Advanced Windows Hacking & Protection SOL 8
➢
○
○
○
○
➢
➢
Module 7 : Advanced Windows Hacking & Protection SOL 9
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 7 : Advanced Windows Hacking & Protection SOL 10
➢
➢
➢
➢
➢
➢
Module 8 : Hacking Linux SOL 11
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 8 : Hacking Linux SOL11
Module 10 : Metasploit SOL 14
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 10 : Metasploit SOL 15
Module 11 : Windows & Unix Post Exploitation SOL 16
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 11 : Windows & Unix Post Exploitation SOL 17
Module 12 : Wireless Hacking (Not Ever Happen Before) SOL 18
➢
○
○
○
○
➢
➢
➢
○○○○○○
➢
➢
Module 12 : Wireless Hacking (Not Ever Happen Before) SOL 18
➢
○ Airmon-ng
○ Airodump-ng
○ Aireplay-ng
○ Injection Test
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever Happen Before) SOL 18
➢
➢
➢
➢
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever Happen Before) SOL 19
➢
➢
➢
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever Happen Before) SOL 20
Module 13 : Network Attacking SOL 21
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 13 : Network Attacking SOL 22
➢
➢
➢
➢
Module 13 : Network Attacking SOL 22
Module 15 : Injecting The Database SOL 25
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 15 : Injecting The Database SOL 26
Module 16 : Web Exploitation SOL 27-28
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 16 : Web Exploitation SOL 29-30
Module 18 : Extra Module ( Tips & Tricks ) SOL 31