Course Navigation
- CPENT | Module 06 Lab: Scanning with Netdiscover
- CPENT | Module 06 Lab: Scanning and Scripting with hping3
- CPENT | Module 06 Lab: Scanning and Building a Target Database
- CPENT | Module 06 Lab: Using Workspaces and db_nmap
- CPENT | Module 06 Lab: Performing Passive OS Fingerprinting to Obtain Remote Operating System Information
- CPENT | Module 06 Lab: OS Fingerprinting with Nmap
- CPENT | Module 06 Lab: Scanning with DMitry
- CPENT | Module 06 Lab: Create a Python Script to Grab the Banner of the ssh Service
- CPENT | Module 06 Lab: Use Metasploit to Detect Version of HTTP
- CPENT | Module 06 Lab: Enumerating SMB
- CPENT | Module 06 Lab: Pentesting Misconfigured RPC Service and NFS Shares
- CPENT | Module 06 Lab: Enumerating Logged on Users Using Finger Protocol
- CPENT | Module 06 Lab: Performing Man-in-the-Middle Attack using Cain & Abel
- CPENT | Module 06 Lab: Auditing a Machine for Weak Passwords Using L0phtCrack
- CPENT | Module 06 Lab: Automating Penetration Testing Tasks Using Bash Scripting
- CPENT | Module 06 Lab: Vulnerability Analysis with OpenVAS
- CPENT | Module 06 Lab: Search for Exploits using Searchsploit
- CPENT | Module 06 Lab: Adding an Exploit to Metasploit
- CPENT | MODULE 06 LAB: Exploiting Windows OS Vulnerability
- CPENT | Module 06 Lab: Exploiting and Escalating Privileges on a Windows Operating System
- CPENT | Module 06 Lab: Penetration Testing Buffer Overflow Vulnerability on a Windows Application
- CPENT | Module 06 Lab: Exploiting and Escalating Privileges on a Linux Operating System
- CPENT | Module 06 Lab: Penetration Testing Vulnerable Machines and Creating a Botnet
- CPENT | Module 07 Lab: Scanning with Nmap against Defenses
- CPENT | Module 07 Lab: Identifying and Bypassing a Firewall
- CPENT | Module 07 Lab: HTTP Tunneling to Bypass Firewalls Using HTTPort
- CPENT | Module 07 Lab : Evasion Using Social-Engineer Toolkit (SET)
- CPENT | Module 07 Lab: Proxychains
- CPENT | Module 07 Lab: Pivoting
- CPENT | Module 8 Lab: Gathering Information About a Target Using WhatWeb
- CPENT | Module 08 Lab: Web Application Vulnerability Assessment Using Vega
- CPENT | Module 08 Lab: Pentesting Identified Web Applications Vulnerabilities
- CPENT | Module 08 Lab: Pentesting Web Application for Stored XSS and Parameter Manipulation Vulnerabilities
- CPENT | Module 08 Lab: Exploiting Directory Traversal Vulnerability in WordPress Application
- CPENT | Module 08 Lab: Performing Dictionary Attack on a WordPress Web Application using Burp Suite
- CPENT | Module 08 Lab: Exploiting WordPress Web Application Vulnerability by Uploading a Customized Shell
- CPENT | Module 08 Lab: Directory Browsing a WordPress Website using DirBuster and Accessing Shell
- CPENT | Module 13 Lab: Binary Analysis
- CPENT | Module 13 Lab: Binary Analysis on a 64-bit Machine
- CPENT | Module 13 Lab: Binary Analysis Methodology
- CPENT | Module 13 Lab: Advanced Binary Analysis
- CPENT | Module 13 Lab: 32-bit Buffer Overflow
- CPENT | Module 13 Lab: Libc Exploit To Bypass No Execute Stack
- CPENT | Module 13 Lab: 64-bit Exploitation
- CPENT | Module 13 Lab: ROP Fundamental Exploitation
- CPENT | Module 13 Lab: Linux Kernel ROP and ropgadget

