Advanced Penetration Testing
Course Description
The Advanced Penetration Testing course teaches the cyber-attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.
Penetration testing is one of the most in-demand skill-sets right now. There are more jobs that require advanced level hacking then there are people who have the ability to fill them, and this class is a really great one.
Objectives
• This course provides a more sophisticated approach to penetration testing. You will learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion, while gaining the knowledge of how to defend the network you are penetrating.
• Unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to and to help create more secure networks and systems for our modern, high-security environments.
• The course also covers the post-exploitation process, including how to enable RDP, backdoor SSH logins, and use other data exfiltration techniques.
Target Audience
• Penetration Testers
• Network Administrators
• IT Auditors
• Information Security Engineers
• Security Consultants
Prerequisites
While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:
• Windows administration for servers and workstations
• Linux/ *NIX system administration
• Command-line proficiency on both Windows and *NIX systems
They should also have some basic knowledge of the following languages:
• Python
• HTML
• JavaScript
• SQL
Duration
• 40 Hours
Course Outline
Module 1: Linux
Linux (part 1)
Linux (part 2) Kali Linux Commands
Linux (part 3) - Directories, myfile and Nano
Linux (part 4) chmod, manipulation and packages
Linux (part 5) IP Addressing and netcat
Linux (part 6) Copy Commands and crontab
Module 2: Programming
2.1Programming (part 1) Fundamentals for Pen Testers
2.2Programming (part 2) Bash Scripting and If/Then Command
2.3Programming (part 3) Network Pings
2.4Programming (part 4) Python for Port Scanning
2.5Programming (part 5) Python Import Command
Module 3: Metasploit
3.1Metasploit (part 1) Introduction
3.2Metasploit (part 2) Fundamentals
3.3Metasploit (part 3) Operation
3.4Metasploit (part 4) Auxiliary Module
3.5Metasploit (part 5) msfcli
3.6Metasploit (part 6) msfvenom
Module 4: Information Gathering
4.1Information Gathering Intro (part 1)
4.2Information Gathering (part 2) Domain Name Service
4.3Information Gathering (part 3) Targeting Email and Maltego
4.4Information Gathering (part 4) recon-ng and google operators
4.5Information Gathering (part 5) NMAP and PortScanning
Module 5: Vulnerability Discovery/Scanning
5.1Vulnerability Scanning Intro (part 1)
5.2Vulnerability Scanning (part 2) Nessus
5.3Vulnerability Scanning (part 3) Nmap Scripting Engine
5.4Vulnerability Scanning (part 4) Metasploit
5.5Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
5.6Vulnerability Scanning (part 6) Directory Transversals
Module 6: Traffic Capture
6.1Traffic Capture Introduction (part 1)
6.2Traffic Capture (part 2) Analyzing Network Protocol with Wireshark
6.3Traffic Capture (part 3) Address Resolution Protocol ARP
6.4Traffic Capture (part 4) DNS
6.5Traffic Capture (part 5) ettercap
6.6Traffic Capture (part 6) SSL Stripping
Module 7: Exploitation
7.1Exploitation (part 1) Direct Exploitation
7.2Exploitation (part 2) SQL Commands
7.3Exploitation (part 3) Directory Traversal
7.4Exploitation (part 4) Open Source Vulnerability
7.5Exploitation (part 5) Using Backdoor to Access an FTP Server
7.6Exploitation (part 6) Attaching to an IP Address
Module 8: Passwords
8.1Passwords (part 1) Password Attacks
8.2Passwords (part 2) Online Password Cracking
8.3Passwords (part 3) Offline Password Attacks
8.4Passwords (part 4) Using oclhashcat
Module 9: Advanced Exploitation
9.1Advanced Exploitation (part 1) Introduction
9.2Advanced Exploitation (part 2) Client Side Attacks
9.3Advanced Exploitation (part 3) Exploiting Java
9.4Advanced Exploitation (part 4) Social Engineering
9.5Advanced Exploitation (part 5) Bypassing Antivirus Software
Module 10: Post Exploitation
10.1Post Exploitation (part 1) File Transfer without and Interactive Shell
10.2Post Exploitation (part 2) Exploit Development
10.3Post Exploitation (part 3) Pivoting
10.4Post Exploitation (part 4) Setting Up a Domain Controller
Module 11: WebApps
11.1WebApp Introduction (part 1) Web App Testing
11.2WebApp (part 2) Vulnerable Web Applications
11.3WebApp (part 3) SQL Injection
11.4WebApp (part 4) File Inclusion
11.5WebApp (part 5) Cross Site Scripting XSS
Module 12: Exploit Development
12.1Exploit Development Introduction (part 1)
12.2Exploit Development (part 2) A Program in Memory
12.3Exploit Development (part 3) Stack Frame for Function
12.4Exploit Development (part 4) GNU Compilers
12.5Exploit Development (part 5) Python
12.6Exploit Development (part 6) Executing Unintended Code
12.7Exploit Development (part 7) Network Based Exploits and Debuggers
12.8Exploit Development (part 8) Creating a Cyclic Pattern
12.9Exploit Development (part 9) Verifying Offsets
12.10Exploit Development (part 10) Creating Shell Code in Kali Linux
12.11Exploit Development (part 11) Fuzzing
12.12Exploit Development (part 12) Public Exploits and Perl
12.13Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module
12.14Exploit Development (part 14) Structured Exception Handler Over-Write
Module 13: Smartphone Pentest Framework
13.1SPF Introduction (part 1)
13.2SPF (part 2) Attach to Smartphone Based Apps
13.3SPF (part 3) Turning an Android App into a SPF Agent
13.4SPF (part 4) Functionality for Agents
13.5SPF (part 5) Pentesting Mobile Devices