Ine/Elearning - eJPTv2 - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eJPTv2-Notes
    • 1️⃣Assessment Methodologies & Auditing
      • 1.1 Information Gathering
      • 1.2 Footprinting & Scanning
      • 1.3 Enumeration
        • SMB Enum
        • FTP Enum
        • SSH Enum
        • HTTP Enum
        • MySQL Enum
        • SMTP Enum
      • 1.4 Vulnerability Assessment
      • 1.5 Auditing Fundamentals
    • 2️⃣Host & Network Penetration Testing
      • 2.1 System/Host Based Attacks
        • Windows Vulnerabilities
        • Linux Vulnerabilities
      • 2.2 Network Based Attacks
      • 2.3 The Metasploit Framework (MSF)
        • MSF Introduction
        • Information Gathering & Enumeration
        • Vulnerability Scanning
        • Client-Side Attacks
        • Exploitation
        • Post Exploitation
        • Armitage
      • 2.4 Exploitation
      • 2.5 Post-Exploitation
      • 2.6 Social Engineering
    • 3️⃣Web Application Penetration Testing
      • 3.1 Intro to Web App Pentesting
  • 🛣️RoadMap
  • 📔eJPT Cheat Sheet
Powered by GitBook
On this page
  1. eJPTv2-Notes
  2. Host & Network Penetration Testing

2.1 System/Host Based Attacks

PreviousHost & Network Penetration TestingNextWindows Vulnerabilities

Last updated 1 year ago

⚡ Prerequisites

  • Basic familiarity with Linux & Windows

  • Basic familiarity with TCP & UDP

📕 Learning Objectives

  • Understand, identify and exploit Windows & Linux vulnerabilities

  • Perform privilege escalation

  • Identity and exploit file system vulnerabilities

  • Understand credentials storage and password hashes dumping

🔬 Training list - PentesterAcademy/INE Labs

subscription required

📝
2️⃣
IIS Service Win Exploitation
SMB Service Win Exploitation
RDP Service Win Exploitation
WINRM Service Win Exploitation
Basic Windows Privesc
UAC Bypass Win Privesc
Win Post Exploitation with Metasploit
Linux Exploitation
Basic Linux Privesc
Password Cracking Linux Exploitation