Overview
Syllabus
- Introductions/Welcomes.
- whoami.
- Course learning objectives.
- Important TCM resources.
- Web app resources.
- Five stages of ethical hacking.
- Reconnaissance overview.
- Identifying target to enumerate.
- Using sublist3r to identify subdomains.
- Using crt.sh to identify subdomains.
- Setting up proxy for Burp Suite.
- Enumerating with Burp Suite.
- Credential stuffing/password spraying theory/tools.
- Using Nikto as a vulnerability scanner.
- Enumerating cipher strength.
- Using nmap for fingerprinting.
- Actively scanning with Burp Suite Pro.
- Reviewing Juice Shop.
- AMA begins.
Taught by
The Cyber Mentor