Plan Szkolenia

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP)
  • Licensee Penetration Testing (LPT)
  • White box and black box
  • Penetration testing vs vulnerability assessment

Advanced Penetration Methodology

  • Target framework and scope
  • Gathering client requirements
  • Checklist for test plan
  • Profiling test boundaries
  • Advance penetration testing using Kali Linux

Information Discovery

  • Hacking Google
  • Gathering DNS and who information
  • Gathering route and network information
  • Gathering all-in-one information

Scanning and Enumerating Target

  • Advance network scanning
  • Port and Udp port scanning
  • Stealth port scanning techniques
  • Packet crafting with Hping
  • Nmap scanning and plug-ins
  • Active and passive banners and system OS enumeration
  • Enumerating users, groups, and shares
  • Enumerating DNS resource records and network devices

Vulnerability Assessment Tools

  • Nessus
  • Open Vas

Target Exploitation

  • Setting up Metaslpoit
  • Exploitation with Metaslpoit
  • Meterpreter session
  • VNC exploitation
  • Stealing password hash
  • Adding custom modules to Metaslpoit
  • Using immunity debugger
  • Writing exploit

Privileges Escalation and Access Maintenance

  • Breaking password hash
  • Cracking telnet, ssh, and FTP password
  • Using Metasploit post-exploitation modules
  • Protocol tunneling
  • Proxy
  • Installing persistent backdoor

Advance Sniffing

  • ARP poisoning
  • DHCP starvation
  • Mac flooding
  • DNS poisoning
  • Sniffing credentials from a secured website

DOS Attack

  • Syn attack
  • Application request flood attack
  • Service request flood
  • Service attack permanent denial

Penetration Testing

  • Web penetration testing
  • Wireless penetration testing

Exploitation and Client Side Attack

  • Exploiting browser vulnerability
  • Buffer overflow
  • Fuzzing
  • Fast-track hacking
  • Phishing passwords
  • Generating backdoors
  • Java applet attack

Firewall Testing

  • Firewall overview
  • Testing firewall and ports
  • Rules of testing firewall

Management and Reporting

  • Documentation and results verification
  • Dradis framework
  • Magic tree and Maltego
  • Data collection and evidence management
  • Report types and presentation
  • Post testing procedure

Summary and Next Steps

Wymagania

  • Basic knowledge of using Kali Linux for penetration testing
  • Basic understanding of Linux/Unix and networking concepts
  • An understanding of network vulnerabilities

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 21 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (3)

Szkolenia Powiązane

Kali Linux Penetration Testing (Intermediary)

14 godzin

Penetration Testing: Python and Kali Linux

14 godzin

Wprowadzenie do systemu Linux

14 godzin

Alpine Linux

7 godzin

Automatyzacja budowy aplikacji z użyciem Autotools

14 godzin

Introduction to Cumulus Linux

14 godzin

DNS and BIND: Setting Up, Managing and Securing Your DNS Server

14 godzin

Top 4 Linux/Unix Servers - DNS,Web,Mail and Database

28 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - wprowadzenie do administracji i pracy w linii komend

21 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - administracja siecią, bezpieczeństwem i wprowadzenie do kontenerów

14 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - administracja pamięcią masową (LVM), lokalnymi użytkownikami oraz pakietami i usługami

14 godzin

Running Kubernetes on Fedora CoreOS

14 godzin

Go for Systems Programming

35 godzin

Intermediate Unix

21 godzin

LEDE: Set Up a Linux Wireless Router

7 godzin

Powiązane Kategorie