🎒

CNWPP - Certified Network & Web app Pentesting Professional

001. Defining what a pentest is

001 - 1 Defining a pentest

001 - 2_assignment_-defining_a_pentest

001 - 3 The deliverables of pentesting

001 - 3 ASSIGNMENT The deliverables of pentesting

001 - 4 The pentest plan

001 - 5 Assignment_Make_a_test_plan_for_hackxpert.com

001 - 5 SOLUTION Assignment_Make_a_test_plan_for_hackxpert.com

001 - 6 EXAMPLE the_pentesting_report

001 - XTRA1 The methodologies of a pentest

001 - XTRA2 - Letter of pen test commencing

001 - XTRA3 - SHORT TEST PLAN - UNCLE RAT'S EXAMPLE

001 - XTRA4 - The NDA

002. The pentesting methodologies

002.1 Pentesting methodolgies

002.2 Assignment - describe the methodologies in your own words

002.3 - 001 OSSTMM

002.3 - 006 RAV CALC_OSSTMM

002.4 OWASP methodology

002.5 OSSTMM assignment

002.6 OWASP assignment

002.8 PTES - Pre-engagement

002.8 PTES Questionaires for pentests

002.9 PTES Information gathering

003. Network scanning and exploits

003.1 BIS - How we do a pentest

003.2 Nmap (1)

003.2 port scanning

003.3 portscanning assignment (1)

003.4 FTP (1)

003.5 FTP assignment (1)

003.6 SMB (1)

003.7 EXPLOIT-DB network hacking tools (1)

003.7 network hacking tools (1)

003.7 WIRESHARK network hacking tools (1)

003.8 DEMO Nikto Nmap network hacking tools assignment (1)

003.8 network hacking tools assignment (1)

004. Web exploits pt. 1

004.1 Fuzzing

004.1.1 Fuzzing Assignment

004.2 Burp Suite CE

004.3 CSRF

004.3 CSRF CHECKLIST

004.3 CSRF Source code

004.4 CSRF assignment

004.5 JWT CHECKLIST

004.5 JWT

004.6 JWT assignment

004.6 SOLUTION JWT assignment

004.7 Open redirect

004.8 Open redirects assignment

004.9 SSRF

004.10 SSRF LABS

004.11 SSRF labs solutions

005. Web exploits pt. 2

005.1 IDOR - Slides

005.1.1 BAC - In-depth demo

005.1.2 IDOR - Demo manual exploitation

005.1.3 IDOR - Demo Authorize exploitation

005.2 IDOR AND BAC LABS

005.3 Business logic flaws

005.4 LABS BUSINESS LOGIC FLAWS

005.5 captcha bypasses

005.6 captcha labs

005.7 XPATH injections

005.7.1 XPATH injections labs

005.8 Insecure_deserialization

006. Methodologies

006.1 A_main app_methodology_V5.0 (1)

006.2 Broad scope methodology (1)

006.3 Broad_scope_methodology_-_Manual (2)

006.XTRA1 Practical_demonstration_-_Main_application_hacking (1) (1)

006.XTRA2 Broad Scope Methodology

006.XTRA3 Extra Resources - Main app methdology

006.XTRA4 Main app methodology (1)

007. Vulnerability scanners & tools

007.1 Vulnerability scanners

007.2 vulnerability scanners ASSIGNMENTS

007.3 out of band servers

007.4 Labs out of band server

007.5 Postman demo

007.6 postman labs

007.7 Assignement- scan hackxpert with zap

008. The OWASP top 10 + WAFs

008.1 OWASP top

008.2 OWASP API top 10

008.3 OWASP Mobile top 10

008.4 Web_Application_Firewalls_(WAFs)_Form_A_to_Z (1)

008.5 WAF_evasion_techniques_checklist (1)

008.XTRA1 two-armed mode WAF

009. Advanced web exploits

009.1 XSS

009.2 XSS labs

009.3 CSP

009.4 CSP excercises

009.5 CSP labs

009.7 hack me labs - Pentest simulation of exploitation phase

010. Exam day - Plan within 6 months