Workshop’s eBook: Penetration Testing Using "The Kill Chain" Methodology


Get the access to all our courses via Subscription




Preview: Workshop’s eBook: Penetration Testing Using "The Kill Chain" Methodology

Dear PenTest Readers,

We would like to proudly present you the newest PenTest workshop issue. We hope that you will learn interesting techniques and tools from this e-book.

In this e-book you will find materials presented in the course “Penetration Testing using the Kill Chain methodology”. You will learn how to perform a penetration test step by step using above methodology. It’s a 90% hands-on material.

Note: Some of the materials, like videos or particular exercises, are not presented in this issue. If you would like to gain access to all the materials, you have to buy a course.

Table of content

Module 0 -Pre-course materials

Module 1 – Information Gathering – Passive Reconnaissance

Topic 1:

Topic 2: Linux commands

Topic 3: Social Engineering ToolKit

Module 2 – Vulnerability Analysis

Topic 1: OpenVas

Topic 2: Nikto

Topic 3: W3af

Topic 4: Exploit­

Module 3 – Scanners – Active scanning

Topic 1: Nmap

Topic 2: Zenmap

Topic 3: Advanced MitM Framework

Module 4 – Vulnerability Exploits And Test Analysis

Topic 1: Veil-­Evasion

Topic 2: The Metasploit Framework

Topic 3: And More …

Visit the original course:

Taking part in the course will get you:

  • More material;
  • Instructor's guidance;
  • Exercises and challenges;
  • Open discussion with other students;
  • Certificate of Completion.



There are no reviews yet.

Be the first to review “Workshop’s eBook: Penetration Testing Using "The Kill Chain" Methodology”

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013