ZX301
ZX301
The Penetration Testing training equips learners with crucial skills to identify and
exploit system vulnerabilities. Covering data gathering, system infiltration, post-breach
techniques, and emphasizing WebApp Security, this program prepares participants to
effectively safeguard digital assets against cyber threats.
PENETRATION TESTING
Module 1: Collecting Information Module 3: Post Exploitation
This module empowers learners with fundamental Post exploitation tactics, used after gaining
penetration testing skills. It commences with unauthorized access, are explored, giving
Information Gathering, enabling understanding of insights into maintaining access, data
targeted systems. Scanning follows, teaching extraction, and covering tracks. Furthermore, it
detection of open ports and services. Lastly, examines social engineering, a human
Enumeration provides detailed system information, manipulation tactic for information or access,
critical for crafting effective cyberattack strategies. underscoring the human element in
cybersecurity.
Information Gathering
Whois and Dmitry Local vs. Remote Exploits
Google and GHDB Privilege Escalation
Shodan CLI Persistence
DNS Reconnaissance Disabling Security
Online Databases Social Engineering
Scanning Online Services
Nmap Scanning BeEF
NSE Scripting Phishing Frameworks
Enumeration Advanced Techniques
Services
Msfconsole Module 3: WebApp Security
Enumeration Tools This module sheds light on the crucial aspect
Vulnerabilities Detection Methods of safeguarding web applications. It navigates
Nessus through various aspects of web application
security, highlighting common vulnerabilities,
and providing effective strategies to
Module 2: Exploitation counteract them. A key focus is on securing
This module is focused on the practical aspects of data transactions, user authentication
penetration testing, with a keen focus on processes, and ensuring overall application
integrity.
Exploitation. It starts by teaching the methodologies
to leverage vulnerabilities for unauthorized system
HTML Basics
access. Further, it explores payloads, which are
pieces of code executed post successful
About OWASP
exploitation, providing crucial insights into XSS
cyberattack mechanics. LFI/RFI
Brute Force
Exploitation SQL Injection
Brute Force Tools Web Payloads
Exploits Database Reverse Shell
Msfconsole Burp Suite
Exploiting Manually Proxy
Payloads Repeater
Msfvenom Payloads Intruder
Payloads Automation Encoder
Meterpreter