🌐eJPT References
Introduction
Networking
Web Applications
Assessment Methodologies
Information Gathering
Enumeration
Vulnerability Assessment & Auditing
Host & Network PenTesting
Windows System Attacks
Linux System Attacks
Network Attacks
Metasploit
Exploitation
Shells
Defense Evasion
Post Exploitation
TTY Shells
Privilege Escalation
Persistence
Cracking Hashes
Pivoting
Social Engineering
Web App PenTesting
Vulnerable Web Apps
Tools
Last updated