HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

Scanning & Exploitation - The Offensive Phase

0%
Lessons
Scanning & Vulnerability Enumeration
01Your First Network Scan — Understanding Before Using Nmap
50 min
02Scanning Techniques — Visibility, Detection, and Limits
50 min
03Advanced Enumeration with NSE
70 min
04From Version to CVE — Turning a Discovery into Risk
55 min
Exploitation
05Understanding Exploitation — Exploits, Payloads, and Shellcode
45 min
06Introduction to Metasploit
55 min
07First Exploits on Vulnerable Targets
60 min
08Manual Exploitation Without Metasploit
55 min
09Basic Post-Exploitation
30 min
10Vulnerability Reporting and Prioritization
60 min
Web Enumeration
11Analyzing a web application: reading weak signals
55 min
12Analyzing a web application: headers, technologies, and entry points
50 min
13Nikto — Scanning Web Vulnerabilities
45 min
Access Attacks
14Exploiting Weak Passwords with Hydra
55 min
15Basic SQL Injection
55 min
16XSS: Reflected and Stored Cross-Site Scripting
50 min
17Hash cracking with Hashcat
55 min
18Exploiting Misconfigured Services
60 min
Post-Exploitation
19Linux Privilege Escalation
60 min
20Persistence and Trace Management
50 min
21Understanding pivoting
45 min
Complete Methodology
22Reproducible Pentest Methodology
50 min
23Complete Pentest Simulation — From Scanning to Report
120 min

Lesson 23

Complete Pentest Simulation — From Scanning to Report

Capstone lesson: execute a complete pentest from start to finish on a lab target. Perform reconnaissance, identify vulnerabilities, validate impact, and write a professional report.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Unlock Premium Access →

200+ lessons • Challenges • Flashcards • $9/month

22 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →