Download Journal pdf

Practical 1

Exploring and building a verification lab for penetration testing (Kali Linux)

Practical 2 Part 1

Use of open-source intelligence and passive reconnaissance

Practical 3

Practical on enumerating host, port, and service scanning

Practical 4

Practical on vulnerability scanning and assessment

Practical 5

Practical on use of Social Engineering Toolkit

Practical 6

Practical on Exploiting Web-based applications

Practical 7

Practical on using Metasploit Framework for exploitation.

Practical 8

Practical on injecting Code in Data Driven Applications: SQL Injection