Introduction to Ethical Hacking (101)


  • The Hacker Playbook methodology
  • Common testing tools such as nmap, openvas, metasploit
  • Intelligence gathering via DNS brute, scanning, web screenshots
  • Identify and exploiting vulnerabilities via metasploit, sqlmap, python, etc
  • Post exploitation including lateral movement, reusing credentials
  • Reporting


  • Basic Windows and Linux Knowledge
  • Laptop with administrator access, wireless/network connectivity, capable of running two virtual machines simultaneously using either VMware Workstation or Player or Fusion (for OS X) and at least 30GB of free disk space