Build your own virtual lab environment. Learn to use pentesting tools to enumerate and gain root access, and the different attack vectors used to exploit a target.
Learn with a walkthrough how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities, and exploit the target to gain root access.
Learn about CTF exercises
Build your own virtual lab environment
Learn basic to advance level Pentesting
Capture the Flags using various tools
Scanning, footprinting, and recon
Enumeration and gaining access
Exploitation and privilege escalation
Cover tracks and plant backdoors
SQL Injection to Shell