Table of Content
- [semester 2] Multimedia
- [semester 3] Database system
- [semester 4] Intelligence system
- [semester 4] Ethical hacking and penetration testing
- [semester 5] Network Forensic
Progress
Ethical Hacking and Penetration Testing
- Introduction
- Meet In the Middle(MITM)
- Footprinting Tools
- Utilizing Search Engines
- Target Discovery
- Enumerating Target
- Vulnerability Mapping
- DVWA
- Social Engineering
- Target Exploitation
- Privilege Escalation
- Sherlock Tool
- Maintaining Access