CTF Challenge Course in Pune Maharastra

Master the Art of CTF Challenges in Cyber Security

Our CTF Challenge Course helps you sharpen your ethical hacking and problem-solving skills through realistic attack-defense scenarios. Learn how to identify, exploit, and secure vulnerabilities like a pro.

Register Now

Contact Form Demo

Training Options

Offline Training Mode

Online Training Mode

Learn, Compete, and Conquer Real-World Cyber Attacks

At Recon Cyber Security, this course takes you beyond theory — into real-world cyber battlegrounds. You’ll participate in guided CTF simulations, explore advanced exploitation techniques, and understand attacker methodologies step by step. Perfect for students, professionals, and cyber warriors aiming to build their offensive and defensive expertise. Get ready to decode, defend, and dominate the leaderboard!

Course Curriculum

  • Finding Files
  • FTP Services
  • HTTP Service
  • Mysql Services
  • Service Management
  • Locate
  • Which
  • Find
  • Sed
  • Awk
  • Cut
  • Sort
  • Grep
  • Head
  • Tail
  • Wget
  • Cat
 
  • Getting start with NC
  • Connecting to a Server
  • Fetching HTTP header
  • Chatting
  • Creating a Backdoor
  • Verbose Mode
  • Save Output to Disk
  • TCP Delay Scan
  • UDP Scan
  • Reverse TCP Exploitation
  • Randomize Port
  • File Transfer
  • Reverse Netcat Shell Exploitation
  • Banner grabbing
  • Port Scanning With Nmap & Wireshark
  • TCP Connect Scan with wireshark
  • Network Sweeping with wireshark
  • SYN Scan with wireshark
  • UDP Scan with wireshark
  • FIN Scan with wireshark
  • Null Scan with wireshark
  • OS Discovery with wireshark
  • NSE Scripts with wireshark
  • Overview
  • DNS Enumeration
  • Forward DNS Lookup
  • Reverse DNS Lookup
  • Zone Transfers
  • NetBIOS & SMB Enumeration
  • Null Sessions
  • Enum4Linux
  • SMB NSE Scripts
  • MSQL Enumeration
  • MSSQL Enumeration
  • SMTP Enumeration
  • VRFY Script
  • Python Port
  • SNMP Enumeration
  • SNMP MiB
  • SNMPWal
  • Overview
  • Google Search
  • Google Hacking
  • GHDB
  • Directory Bruteforce Attack
  • Dirb
  • Dirbuster
  • Dirsearch
  • Metasploit
  • Php reverse shell
  • Python reverse shell
  • Perl reverse shell
  • Bash reverse shell
  • Msfvenom shell
  • Overview
  • Vulnerable Code
  • Stack Overflow
  • Overview
  • Fuzzing
  • Crash Replication
  • Controlling EIP
  • Introducing Shellcode
  • Bad Characters
  • Redirecting Execution
  • Introducing Mona
  • Shellcode Payload
  • Controlling EIP
  • Locating Space
  • First Stage Shellcode
  • Locating RET
  • Generating Shellcode
  • Overview
  • Finding Exploits
  • Exploit – DB
  • Fixing Exploits 1
  • Fixing Exploits 2
  • Cross – Compiling
  • Python HTTP Server
  • php http server
  • HFS Tool
  • Netcat
  • CURL
  • SMB Server
  • Powershell File Transfer
  • Bitsadmin
  • Wget
  • TFTP
  • Python
  • Suid Binaries
  • Absuing Sudo ‘ s Right
  • Kernel Exploit
  • Path Variables
  • Multiple Ways to edit / etc /
  • passwd fill
  • Windows Privilege Escalation
  • Weak File Permissions
  • Always Install Elevated
  • Bypass UAC
  • Kernel Exploits
  • Authentication Bypass
  • Error Based Enum
  • Blind SQL Injection
  • Attack Proxies
  • SQLMap
  • Overview
  • Crunch
  • Passing the Hash
  • Password Profiling
  • Online Attacks
  • Medusa
  • Ncrack
  • Hydra
  • Password Hashes
  • Cracking Hashes
  • LM / NTLM
  • Overview
  • AUX Lessons
  • SNMP Lessons
  • SMB Lessons
  • WEBDAV Lessons
  • Database Services
  • Exploits
  • Payloads
  • Meterpreter
  • Meterpreter in Action
  • Additional Payloads
  • Binary Payloads
  • Multihandler
  • Post Exploitation
  • Overview
  • AUX Lessons
  • SNMP Lessons
  • SMB Lessons
  • WEBDAV Lessons
  • Database Services
  • Exploits
  • Payloads
  • Meterpreter
  • Meterpreter in Action
  • Additional Payloads
  • Binary Payloads
  • MultihandlerPost Exploitation
  • Overview
  • Shellter
  • Veil – Evasion
  • thefatrat

+91 8806666051

Contact Form Demo

Material Included

Pre Requirements

Students should have prior knowledge with Operation System such as : Windows 7, 8, 10, or 11 etc.

World’s leading companies

Cyber Security Updates

Recon_Pune 18th October 2022