HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackerPath

Scanning & Exploitation - La Phase Offensive

0%
Lessons
Balayage et Énumération des Vulnérabilités
01Your First Network Scan — Understanding Before Using Nmap
50 min
02Scanning Techniques — Visibility, Detection, and Limits
50 min
03Advanced Enumeration with NSE
70 min
04From Version to CVE — Turning a Discovery into Risk
55 min
Exploitation
05Understanding Exploitation — Exploits, Payloads, and Shellcode
45 min
06Introduction to Metasploit
55 min
07First Exploits on Vulnerable Targets
60 min
08Manual Exploitation Without Metasploit
55 min
09Basic Post-Exploitation
30 min
10Vulnerability Reporting and Prioritization
60 min
Énumération Web
11Analyzing a web application: reading weak signals
55 min
12Analyzing a web application: headers, technologies, and entry points
50 min
13Nikto — Scanning Web Vulnerabilities
45 min
Attaques sur les Accès
14Exploiting Weak Passwords with Hydra
55 min
15Basic SQL Injection
55 min
16XSS: Reflected and Stored Cross-Site Scripting
50 min
17Hash cracking with Hashcat
55 min
18Exploiting Misconfigured Services
60 min
Après l'Accès
19Linux Privilege Escalation
60 min
20Persistence and Trace Management
50 min
21Understanding pivoting
45 min
Méthodologie Complète
22Reproducible Pentest Methodology
50 min
23Complete Pentest Simulation — From Scanning to Report
120 min

Lesson 01

Your First Network Scan — Understanding Before Using Nmap

Understand how network scanning actually works (ports, states, TCP handshake) and learn a clear, documentable Nmap workflow — from host discovery to service enumeration — in an authorized environment.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Upgrade