Workshop’s eBook: Penetration Testing Using "The Kill Chain" Methodology

Pentest Workshop eBook - Kill Chain Methodology

Dear PenTest Readers,

We would like to proudly present you the newest PenTest workshop issue. We hope that you will learn interesting techniques and tools from this e-book.

In this e-book you will find materials presented in the course “Penetration Testing using the Kill Chain methodology”. You will learn how to perform a penetration test step by step using above methodology. It’s a 90% hands-on material.

Note: Some of the materials, like videos or particular exercises, are not presented in this issue. If you would like to gain access to all the materials, you have to buy a course.

Table of content

Module 0 - Pre-course materials

Module 1 – Information Gathering – Passive Reconnaissance

Topic 1:

Topic 2: Linux commands

Topic 3: Social Engineering ToolKit

Module 2 – Vulnerability Analysis

Topic 1: OpenVas

Topic 2: Nikto

Topic 3: W3af

Topic 4: Exploit­

Module 3 – Scanners – Active scanning

Topic 1: Nmap

Topic 2: Zenmap

Topic 3: Advanced MitM Framework

Module 4 – Vulnerability Exploits And Test Analysis

Topic 1: Veil-­Evasion

Topic 2: The Metasploit Framework

Topic 3: And More …


Visit the original course:

Taking part in the course will get you:

  • More material;
  • Exercises and challenges;
  • Open discussion with other students;
  • Certificate of Completion.


If you are not a subscriber and want to buy this magazine click here

Pentest Workshop eBook - Kill Chain Methodology

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013