Explore various document-based attacks used in security and red team operations. Learn about Word, Excel, PDF, CHM, and PPT exploits including macros, DDE, OLE,
Discover how to perform a thorough RDP penetration test to uncover security vulnerabilities in your internal network. Learn about RDP service determination, por
Explore post-penetration techniques including UAC bypass methods and privilege escalation using MSF modules. Learn how to collect system information, crack hash
Explore the basics of internal network penetration techniques including information gathering methods, password cracking tools, and common exploits. Learn about
Discover the detailed 9-step process of penetration testing for web applications, including target definition, risk analysis, information collection, and more.