Hannelore's Gitbook
SEC-335 Ethical Hacking and Penetration Testing
SEC-335 Ethical Hacking and Penetration Testing
  • SEC 335: Ethical Hacking and Penetration Testing Landing Doc
    • Module 1: Passive Recon
      • Assignment 1.1 Rules of Engagement
      • Activity 1.1 Ethical Hacking Discussion Activity
      • Assignment 1.2 Google Remote Desktop Access
      • Activity 1.2 Passive Recon Group Activity
      • Github files
    • Module 2: Active Recon
      • Lecture: Active Recon
      • Activity 2.1 Host Directory
      • Assignment 2.1 Port Scanning 1
      • Assignment 2.2 Port Scanning 2
      • NMAP Commands
      • GIT Connection Guide Doc
      • Notes
      • Github files
    • Module 3: DNS
      • Class Activty 3.1 DNS Enumeration
      • Assignment 3.1 Powershell and DNS
      • Assignment 3.2 DNS uses TCP and UDP
      • How to Push Code to Github
      • SED Command
      • AWK Command
      • Grep Command
      • Github files
    • Module 4: Manual Vulnerability Detection
      • Assignment 4.1 - "Hacking" Laws
      • Activity 4.1: Exploiting Cupcake
        • Apache 2.1.15 Vulnerabilities
        • OpenSSH 5.3 Vulnerabilities
        • Shellshock Vulnerability
      • Lecture
      • Github files
    • Module 5: Password Guessing
      • Lab 5.1: Password-Guessing
      • Lecture
      • cewl
      • rsmangler
      • dirb
      • Password Cracking Tools
      • Github files
    • Module 6: Password Cracking
      • Activity 6.0 Pre-lab
      • Lab 6.1 Password Cracking - Linux
      • Lecuture
      • Github files
      • John the Ripper
      • Hashcat
      • Understanding /etc/shadow file format on Linux
      • Installing Kali on VirtualBox
    • Module 7: Expoliting Pippin - File Upload Vulnerabilities, WebShells and Database
      • Assignment 7.1 Webshells
      • Lab 7.1 - Exploiting Pippin
    • Module 8: Reverse Shells
      • Class Activity 8.1 - Weevely
      • Class Activity 8.2 - Reverse Shells
    • Module 9: SQLi and Exploiting Gloin
      • Class Activity 9.1 SQLi Review
      • Lab 9.2 - Exploiting Gloin
      • SQLi Commands
      • Understanding SQL
      • INFORMATION_SCHEMA Table Reference
    • Module 10: Permission Errors and Exploiting Nancurinir
      • Class Activity 10.1 - Linux - Permission Vulnerabilites
      • Lab 10.2 - Exploiting Nancurinir
      • SETUID
      • Permissions
    • Module 11: The Metasploit Framework and the Final Pentest
      • Class Activity 11.1 - The Metaspolit Framework
      • Metasploit Commands
Powered by GitBook
Page cover
On this page

SEC 335: Ethical Hacking and Penetration Testing Landing Doc

Module 1: Passive Recon

Assignment 1.1 Rules of engagement

Activity 1.1 Ethical hacking Discussion Activity

Assignment 1.2 Google Remote Desktop Access

Activity 1.2 Passive Recon Group Activity

Module 2: Active Recon

Activity 2.1 Host Directory

Assignment 2.1 Port Scanning 1

Assignment 2.2 Port Scanning 2

Module 3: DNS

Class Activity 3.1 DNS Enumeration

Assignment 3.1 Powershell and DNS

Assignment 3.2 DNS uses TCP and UDP

How to Push Code to Github

SED Command

AWK Command

GREP Command

Module 4: Manual Vulnerability Detection

Lecture - Vulnerability Detection

Activity 4.1: Exploiting Cupcake

Assignment 4.1 - "Hacking" Laws

Module 5: Password Guessing

Lecture

Lab 5.1: Password Guessing

Module 6: Cracking Passwords

Lecture

Activity 6.0 Pre-lab

Lab 6.1: Password Cracking - Linux

Installing Kali on VirtualBox

John The Ripper

Hashcat

Github Files Week 6

Module 7: Expoliting Pippin - File Upload Vulnerabilities, WebShells and Database

Assignment 7.1 Webshells

Lab 7.1 - Exploiting Pippin

Module 8: Reverse Shells

Class Activity 8.1 - Weevely

Class Activity 8.2 - Reverse Shells

Module 9: SQLi and Exploiting Gloin

Class Activity 9.1 SQLi Review

Lab 9.2 Exploiting Gloin

Module 10: Permission Errors and Exploiting Nancurinir

Class Activity 10.1 - Linux - Permission Vulnerabilities

Lab 10.2 - Exploiting Nancurinir

NextModule 1: Passive Recon

Last updated 2 months ago