HackPathHackPath
CoursesRoadmapPracticePricing

Course

Scanning & Exploitation - The Offensive Phase

From first scans to structured enumeration: learn to observe, measure exposure, and turn results into actionable hypotheses.

Structured path preview

1 free lesson to get started, then 22 premium lessons with exercises, scenarios, and detailed solutions.

First locked checkpoint: Scanning Techniques — Visibility, Detection, and Limits

Start free lessonUnlock Full Access

Lessons

23

Completed

0

Progress

0%

Lessons

Scanning & Vulnerability Enumeration

Lesson 01

Your First Network Scan — Understanding Before Using Nmap

Free

Lesson 02

Scanning Techniques — Visibility, Detection, and Limits

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

Advanced Enumeration with NSE

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 04

From Version to CVE — Turning a Discovery into Risk

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Exploitation

Lesson 01

Understanding Exploitation — Exploits, Payloads, and Shellcode

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Introduction to Metasploit

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

First Exploits on Vulnerable Targets

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 04

Manual Exploitation Without Metasploit

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 05

Basic Post-Exploitation

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 06

Vulnerability Reporting and Prioritization

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Web Enumeration

Lesson 01

Analyzing a web application: reading weak signals

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Analyzing a web application: headers, technologies, and entry points

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

Nikto — Scanning Web Vulnerabilities

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Access Attacks

Lesson 01

Exploiting Weak Passwords with Hydra

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Basic SQL Injection

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

XSS: Reflected and Stored Cross-Site Scripting

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 04

Hash cracking with Hashcat

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 05

Exploiting Misconfigured Services

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Post-Exploitation

Lesson 01

Linux Privilege Escalation

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Persistence and Trace Management

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

Understanding pivoting

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Complete Methodology

Lesson 01

Reproducible Pentest Methodology

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Complete Pentest Simulation — From Scanning to Report

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock