Advanced Penetration Testing
Mob: +254 721 130 397, +254 780 342 333 | Email: info@learnovate.co.ke

Advanced Penetration Testing


Course Description

The Advanced Penetration Testing course teaches the cyber-attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

Penetration testing is one of the most in-demand skill-sets right now. There are more jobs that require advanced level hacking then there are people who have the ability to fill them, and this class is a really great one.

Objectives

• This course provides a more sophisticated approach to penetration testing. You will learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion, while gaining the knowledge of how to defend the network you are penetrating.

• Unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to and to help create more secure networks and systems for our modern, high-security environments.

• The course also covers the post-exploitation process, including how to enable RDP, backdoor SSH logins, and use other data exfiltration techniques.

Target Audience

• Penetration Testers

• Network Administrators

• IT Auditors

• Information Security Engineers

• Security Consultants

Prerequisites

While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:

• Windows administration for servers and workstations

• Linux/ *NIX system administration

• Command-line proficiency on both Windows and *NIX systems

They should also have some basic knowledge of the following languages:

• Python

• HTML

• JavaScript

• SQL

Duration

• 40 Hours

Course Outline

Module 1: Linux

Linux (part 1)

Linux (part 2) Kali Linux Commands

Linux (part 3) - Directories, myfile and Nano

Linux (part 4) chmod, manipulation and packages

Linux (part 5) IP Addressing and netcat

Linux (part 6) Copy Commands and crontab

Module 2: Programming

2.1Programming (part 1) Fundamentals for Pen Testers

2.2Programming (part 2) Bash Scripting and If/Then Command

2.3Programming (part 3) Network Pings

2.4Programming (part 4) Python for Port Scanning

2.5Programming (part 5) Python Import Command

Module 3: Metasploit

3.1Metasploit (part 1) Introduction

3.2Metasploit (part 2) Fundamentals

3.3Metasploit (part 3) Operation

3.4Metasploit (part 4) Auxiliary Module

3.5Metasploit (part 5) msfcli

3.6Metasploit (part 6) msfvenom

Module 4: Information Gathering

4.1Information Gathering Intro (part 1)

4.2Information Gathering (part 2) Domain Name Service

4.3Information Gathering (part 3) Targeting Email and Maltego

4.4Information Gathering (part 4) recon-ng and google operators

4.5Information Gathering (part 5) NMAP and PortScanning

Module 5: Vulnerability Discovery/Scanning

5.1Vulnerability Scanning Intro (part 1)

5.2Vulnerability Scanning (part 2) Nessus

5.3Vulnerability Scanning (part 3) Nmap Scripting Engine

5.4Vulnerability Scanning (part 4) Metasploit

5.5Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto

5.6Vulnerability Scanning (part 6) Directory Transversals

Module 6: Traffic Capture

6.1Traffic Capture Introduction (part 1)

6.2Traffic Capture (part 2) Analyzing Network Protocol with Wireshark

6.3Traffic Capture (part 3) Address Resolution Protocol ARP

6.4Traffic Capture (part 4) DNS

6.5Traffic Capture (part 5) ettercap

6.6Traffic Capture (part 6) SSL Stripping

Module 7: Exploitation

7.1Exploitation (part 1) Direct Exploitation

7.2Exploitation (part 2) SQL Commands

7.3Exploitation (part 3) Directory Traversal

7.4Exploitation (part 4) Open Source Vulnerability

7.5Exploitation (part 5) Using Backdoor to Access an FTP Server

7.6Exploitation (part 6) Attaching to an IP Address

Module 8: Passwords

8.1Passwords (part 1) Password Attacks

8.2Passwords (part 2) Online Password Cracking

8.3Passwords (part 3) Offline Password Attacks

8.4Passwords (part 4) Using oclhashcat

Module 9: Advanced Exploitation

9.1Advanced Exploitation (part 1) Introduction

9.2Advanced Exploitation (part 2) Client Side Attacks

9.3Advanced Exploitation (part 3) Exploiting Java

9.4Advanced Exploitation (part 4) Social Engineering

9.5Advanced Exploitation (part 5) Bypassing Antivirus Software

Module 10: Post Exploitation

10.1Post Exploitation (part 1) File Transfer without and Interactive Shell

10.2Post Exploitation (part 2) Exploit Development

10.3Post Exploitation (part 3) Pivoting

10.4Post Exploitation (part 4) Setting Up a Domain Controller

Module 11: WebApps

11.1WebApp Introduction (part 1) Web App Testing

11.2WebApp (part 2) Vulnerable Web Applications

11.3WebApp (part 3) SQL Injection

11.4WebApp (part 4) File Inclusion

11.5WebApp (part 5) Cross Site Scripting XSS

Module 12: Exploit Development

12.1Exploit Development Introduction (part 1)

12.2Exploit Development (part 2) A Program in Memory

12.3Exploit Development (part 3) Stack Frame for Function

12.4Exploit Development (part 4) GNU Compilers

12.5Exploit Development (part 5) Python

12.6Exploit Development (part 6) Executing Unintended Code

12.7Exploit Development (part 7) Network Based Exploits and Debuggers

12.8Exploit Development (part 8) Creating a Cyclic Pattern

12.9Exploit Development (part 9) Verifying Offsets

12.10Exploit Development (part 10) Creating Shell Code in Kali Linux

12.11Exploit Development (part 11) Fuzzing

12.12Exploit Development (part 12) Public Exploits and Perl

12.13Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module

12.14Exploit Development (part 14) Structured Exception Handler Over-Write

Module 13: Smartphone Pentest Framework

13.1SPF Introduction (part 1)

13.2SPF (part 2) Attach to Smartphone Based Apps

13.3SPF (part 3) Turning an Android App into a SPF Agent

13.4SPF (part 4) Functionality for Agents

13.5SPF (part 5) Pentesting Mobile Devices

Accreditations

 

Contact Information

Eco Bank Towers, 4th Floor Muindi Mbingu Street
P. O. Box 21857 - 00100 Nairobi

Mob: +254 780 342 333, +254 202 246145, 2246154 

Copyright © 2022 Learnovate Technologies Limited. All rights reserved