Ine/Elearning - eJPTv2 - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eJPTv2-Notes
    • 1️⃣Assessment Methodologies & Auditing
      • 1.1 Information Gathering
      • 1.2 Footprinting & Scanning
      • 1.3 Enumeration
        • SMB Enum
        • FTP Enum
        • SSH Enum
        • HTTP Enum
        • MySQL Enum
        • SMTP Enum
      • 1.4 Vulnerability Assessment
      • 1.5 Auditing Fundamentals
    • 2️⃣Host & Network Penetration Testing
      • 2.1 System/Host Based Attacks
        • Windows Vulnerabilities
        • Linux Vulnerabilities
      • 2.2 Network Based Attacks
      • 2.3 The Metasploit Framework (MSF)
        • MSF Introduction
        • Information Gathering & Enumeration
        • Vulnerability Scanning
        • Client-Side Attacks
        • Exploitation
        • Post Exploitation
        • Armitage
      • 2.4 Exploitation
      • 2.5 Post-Exploitation
      • 2.6 Social Engineering
    • 3️⃣Web Application Penetration Testing
      • 3.1 Intro to Web App Pentesting
  • 🛣️RoadMap
  • 📔eJPT Cheat Sheet
Powered by GitBook
On this page
  1. eJPTv2-Notes
  2. Host & Network Penetration Testing

2.2 Network Based Attacks

PreviousLinux VulnerabilitiesNext2.3 The Metasploit Framework (MSF)

Last updated 1 year ago

⚡ Prerequisites

  • Basic Cybersecurity & Network Concepts

📕 Learning Objectives

  • Describe service related Network Attacks

  • Identify network traffic and perform packet analysis

  • Perform MITM (Man in the Middle) attacks

🔬 Training list - PentesterAcademy/INE Labs

subscription required

More common tools are:

  • Wireshark

  • Tshark

  • Arpspoof

📝
2️⃣
Tshark Traffic Analysis
Traffic Analysis: TSHARK Unleashed - Course
WIFI Traffic Analysis
Wi-Fi Security and Pentesting - Course