Hacker Kayra
Ctrlk
  • πŸ“Introduction Page
  • ⭐Learning Process
  • πŸ” Fundamentals
  • 🧰Tools
  • ✍️Write Ups
  • πŸ“šStudy Notes
    • Penetration Tester (HTB CPTS)
      • Penetration Testing Process
      • Reconnaissance, Enumeration & Attack Planning
        • Network Enumeration with Nmap (Continue Here)
        • Footprinting (Just Do Formatting)
        • Vulnerability Scanning (Check)
        • File Transfers
        • Using the Metasploit Framework
        • Web Information Gathering
        • Shells & Payloads
      • Exploitation & Lateral Movement
      • Web Exploitation
      • Post-Exploitation
      • Documentation & Reporting
  • πŸ§‘β€πŸ’»Other
  • πŸ—„οΈArchive/Backup/Bin
Powered by GitBook
On this page
  1. πŸ“šStudy Notes
  2. Penetration Tester (HTB CPTS)

Reconnaissance, Enumeration & Attack Planning

Network Enumeration with Nmap (Continue Here)Footprinting (Just Do Formatting)Vulnerability Scanning (Check)File TransfersUsing the Metasploit FrameworkWeb Information GatheringShells & Payloads
PreviousPenetration Testing ProcessNextNetwork Enumeration with Nmap (Continue Here)