VAPT Methodology : Cyber-kill chain: Reconnaissance and Information Gathering : OSINT, Breached credentials, Subdomain brute forcing, Directory scanning. Scanning and Enumeration : Scanning and exploiting open ports and services, Scanning for potential exploits in public vulnerability databases. Exploitation Basics : Metasploit, Gaining access to machines using vulnerabilities, Custom exploitation scripts, Password brute forcing, Password spraying. Active Directory : LLMNR poisoning, SMB relays, IPv6 DNS takeovers, pass-the-hash/pass-the- password, token impersonation, kerberoasting, GPP attacks, golden ticket attacks. Maintaining access : Reverse shell, file transfer. Web Application Penetration Testing. Automated Vulnerability scanners: Nessus, NMap, Metasploit, Acunetix. Report Writing : Statements of Work, Rules of Engagement, Non-Disclosure Agreements, and Master Service Agreements
Programs
View all programsFrom the news
- Anti-Ragging Awareness Program 2025
- Wadi Project Achieves Milestone: Nearly 3,000 Saplings Planted in a Single Day
Others
- Amrita Hosts One-Day Workshop on Career Opportunities in Pharmaceuticals and Release of the 9th Edition of the Alumni Magazine
- Postdoctoral Fellowship in Deregulated Power Market, Smart Grid, Cyber Security, Electric Vehicles (Charging/Discharging/Infrastructure), Special Machine Designs, Novel DC-DC/AC-DC/DC-AC Converters, Micro Grid Applications @Coimbatore