Kali Linux

  1. The Kali Linux Toolkit: Exploitation Tools
    1. Exploitation Fundamentals
      1. Vulnerability Types
        1. Exploit Development Process
          1. Payload Types
            1. Post-Exploitation Concepts
            2. The Metasploit Framework
              1. Metasploit Architecture
                1. Modules Overview
                  1. Database Integration
                    1. Workspace Management
                    2. MSFconsole
                      1. Basic Commands
                        1. Module Selection
                          1. Option Configuration
                            1. Exploit Execution
                            2. Exploit Modules
                              1. Module Categories
                                1. Exploit Selection
                                  1. Target Configuration
                                    1. Payload Selection
                                    2. Auxiliary Modules
                                      1. Scanners
                                        1. Fuzzers
                                          1. Denial of Service
                                            1. Information Gathering
                                            2. Post-Exploitation Modules
                                              1. Privilege Escalation
                                                1. Persistence
                                                  1. Information Gathering
                                                    1. Lateral Movement
                                                    2. Payloads
                                                      1. Payload Types
                                                        1. Singles
                                                          1. Stagers
                                                            1. Stages
                                                            2. Payload Formats
                                                              1. Custom Payload Generation
                                                              2. Meterpreter
                                                                1. Meterpreter Sessions
                                                                  1. Core Commands
                                                                    1. File System Operations
                                                                      1. Network Operations
                                                                        1. System Operations
                                                                          1. Advanced Features
                                                                          2. MSFvenom
                                                                            1. Payload Generation
                                                                              1. Encoding Options
                                                                                1. Output Formats
                                                                                  1. Custom Templates
                                                                                2. Exploit Databases and Search Tools
                                                                                  1. SearchSploit
                                                                                    1. Local Exploit Database
                                                                                      1. Search Techniques
                                                                                        1. Exploit Mirroring
                                                                                        2. Exploit-DB Integration
                                                                                          1. CVE Database Access
                                                                                            1. Custom Exploit Development
                                                                                            2. Social Engineering Toolkit (SET)
                                                                                              1. SET Overview
                                                                                                1. Spear-Phishing Attacks
                                                                                                  1. Website Attack Vectors
                                                                                                    1. Infectious Media Generator
                                                                                                      1. Mass Mailer Attack
                                                                                                        1. Arduino-Based Attacks
                                                                                                          1. SMS Spoofing
                                                                                                          2. Web Application Exploitation
                                                                                                            1. SQL Injection Exploitation
                                                                                                              1. Cross-Site Scripting Exploitation
                                                                                                                1. File Upload Vulnerabilities
                                                                                                                  1. Local File Inclusion
                                                                                                                    1. Remote File Inclusion
                                                                                                                      1. Command Injection
                                                                                                                      2. Network Service Exploitation
                                                                                                                        1. Buffer Overflow Exploitation
                                                                                                                          1. Format String Vulnerabilities
                                                                                                                            1. Race Condition Exploitation
                                                                                                                              1. Authentication Bypass
                                                                                                                              2. Client-Side Exploitation
                                                                                                                                1. Browser Exploitation
                                                                                                                                  1. Office Document Exploitation
                                                                                                                                    1. PDF Exploitation
                                                                                                                                      1. Java Applet Exploitation
                                                                                                                                      2. Advanced Exploitation Techniques
                                                                                                                                        1. Return-Oriented Programming (ROP)
                                                                                                                                          1. Heap Exploitation
                                                                                                                                            1. Kernel Exploitation
                                                                                                                                              1. Exploit Chaining