HackPath
CoursesRoadmapPracticePricing

Course

Scanning & Exploitation - La Phase Offensive

From first scans to structured enumeration: learn to observe, measure exposure, and turn results into actionable hypotheses.

Upgrade to access

Lessons

23

Completed

0

Progress

0%

Lessons

Balayage et Énumération des Vulnérabilités

Lesson 01

Your First Network Scan — Understanding Before Using Nmap

Free

Lesson 02

Scanning Techniques — Visibility, Detection, and Limits

Pro

Lesson 03

Advanced Enumeration with NSE

Pro

Lesson 04

From Version to CVE — Turning a Discovery into Risk

Pro

Exploitation

Lesson 01

Understanding Exploitation — Exploits, Payloads, and Shellcode

Pro

Lesson 02

Introduction to Metasploit

Pro

Lesson 03

First Exploits on Vulnerable Targets

Pro

Lesson 04

Manual Exploitation Without Metasploit

Pro

Lesson 05

Basic Post-Exploitation

Pro

Lesson 06

Vulnerability Reporting and Prioritization

Pro

Énumération Web

Lesson 01

Analyzing a web application: reading weak signals

Pro

Lesson 02

Analyzing a web application: headers, technologies, and entry points

Pro

Lesson 03

Nikto — Scanning Web Vulnerabilities

Pro

Attaques sur les Accès

Lesson 01

Exploiting Weak Passwords with Hydra

Pro

Lesson 02

Basic SQL Injection

Pro

Lesson 03

XSS: Reflected and Stored Cross-Site Scripting

Pro

Lesson 04

Hash cracking with Hashcat

Pro

Lesson 05

Exploiting Misconfigured Services

Pro

Après l'Accès

Lesson 01

Linux Privilege Escalation

Pro

Lesson 02

Persistence and Trace Management

Pro

Lesson 03

Understanding pivoting

Pro

Méthodologie Complète

Lesson 01

Reproducible Pentest Methodology

Pro

Lesson 02

Complete Pentest Simulation — From Scanning to Report

Pro

Members only

Upgrade to unlock every lesson in this module.

View pricing