Study Points and Objectives

Rainbow Table Attacks - Hashing algorithms

Basic Metasploit topics - Sessions - Modules - Exploit - Post exploit - Auxillary

Recognizing Recon Screens - Knowing common ports

How windows and linux handle password hashes - What they do do the hashes - Where they are stored - Windows will split passwords into 2 hashes.

Active vs Passive attacks

Online vs offline attacks

Payload vs Exploit vs Vulnerability

Reverse Shell vs Bind Shell - Reverse forces target to give you a shell - Bind is where you get a shell ON the target systems

ARP and MITM - How arp works and how it is used in MITM attacks - ARP spoofing - ARP cache, MAC -> IP

Dirb and Dirbuster

Pivoting - Moving from one box to another

Testing for Injections - Code injection spots - SQL injection spots

OWASP Top 10 Vulnerabilities

Hydra - Brute force password cracking

Basic Commands and Options - uname -a - whoami - sudo, su - pwd

65535 Ports

Hash Dump - Downloading hashes form target machine