Course Outline
Introduction
- Overview of Kali Linux
- Installing and configuring Kali Linux
- Using and updating Kali Linux
Penetration Testing Standards and Classification
- Open Web Application Security Project (OWASP)
- Licensee Penetration Testing (LPT)
- White box and black box
- Penetration testing vs vulnerability assessment
Advanced Penetration Methodology
- Target framework and scope
- Gathering client requirements
- Checklist for test plan
- Profiling test boundaries
- Advance penetration testing using Kali Linux
Information Discovery
- Hacking Google
- Gathering DNS and who information
- Gathering route and network information
- Gathering all-in-one information
Scanning and Enumerating Target
- Advance network scanning
- Port and Udp port scanning
- Stealth port scanning techniques
- Packet crafting with Hping
- Nmap scanning and plug-ins
- Active and passive banners and system OS enumeration
- Enumerating users, groups, and shares
- Enumerating DNS resource records and network devices
Vulnerability Assessment Tools
- Nessus
- Open Vas
Target Exploitation
- Setting up Metaslpoit
- Exploitation with Metaslpoit
- Meterpreter session
- VNC exploitation
- Stealing password hash
- Adding custom modules to Metaslpoit
- Using immunity debugger
- Writing exploit
Privileges Escalation and Access Maintenance
- Breaking password hash
- Cracking telnet, ssh, and FTP password
- Using Metasploit post-exploitation modules
- Protocol tunneling
- Proxy
- Installing persistent backdoor
Advance Sniffing
- ARP poisoning
- DHCP starvation
- Mac flooding
- DNS poisoning
- Sniffing credentials from a secured website
DOS Attack
- Syn attack
- Application request flood attack
- Service request flood
- Service attack permanent denial
Penetration Testing
- Web penetration testing
- Wireless penetration testing
Exploitation and Client Side Attack
- Exploiting browser vulnerability
- Buffer overflow
- Fuzzing
- Fast-track hacking
- Phishing passwords
- Generating backdoors
- Java applet attack
Firewall Testing
- Firewall overview
- Testing firewall and ports
- Rules of testing firewall
Management and Reporting
- Documentation and results verification
- Dradis framework
- Magic tree and Maltego
- Data collection and evidence management
- Report types and presentation
- Post testing procedure
Summary and Next Steps
Requirements
- Basic knowledge of using Kali Linux for penetration testing
- Basic understanding of Linux/Unix and networking concepts
- An understanding of network vulnerabilities
Audience
- Ethical hackers
- Penetration testers
- Security engineers
- IT professionals
Testimonials
The coolest thing was that it was not the "dry" knowledge, there were only a lot of exercises and repetitions on a regular basis, and that all the questions asked during the training were answered by the instructor, which definitely facilitated the understanding of the issue.
Julia Minicka
The way of conducting classes
Szymon Wolny
interesting issues, nice facilitator, professional way of conducting classes
Małgorzata Konior
The most striking thing for me was the trainer's use of talking to the group in the way "Look", "Look", "Now use this command" - this is a fairly well-known and effective method of maintaining focus among listeners. In addition, extensive knowledge of the teacher. which he can convey in an accessible way.
Motorola Solutions Systems Polska Sp. z o.o
The trainer has a lot of substantive knowledge and communicates well with the audience.
Motorola Solutions Systems Polska Sp. z o.o
The flexibility of the trainer
Dawid Rowinski - IBM Global Services Delivery Centre Polska Sp. z o.o.
I mostly liked the explanation of fundamentals.
Desi Cozier - National Defence / Government of Canada
-
- Deloitte Digital Sp. z o.o.
The great place left to the exercises
- ONEM
the trainer was able to adapt his course in relation to our needs
Pascal Houyoux - ONEM
The number of exercises
Jos Couder - ONEM
interractivité
- ONEM
many exercises
Jean-Paul Labaisse - ONEM
Very good training, dynamic and interactive
Agostino Candela - ONEM
A good refresher of my historical knowledge
- ONEM
availability of the trainer. The explanations are clear.
mostafa el oueriaghli - ONEM
the exercises
rudi bernaer - ONEM
The extra informations not in the official docs
Sayf Eddine HAMMEMI - SCALITY SA
Go tooling
- SCALITY SA
The many practical exercises
Delphine Agnello - ONEM
Adapting the content of workshops to the needs of students, striving to address the issue, ability to communicate information
- Powiat Lubański
Covered Linux basics which was very helpful to understand the rest of the course Good pace and good communication
Richard Copley - Egress Software Technologies
Executing commands myself and learning what some of the Linux 'code' actually means.
Paul Tosseano - Egress Software Technologies
Engaging exercises, perfect pace
Hannah Clough - Egress Software Technologies
Many positives. I came to the training to get a better understanding of Unix and I certainly can go back to work with a lot more knowledge which was my main goal.
Ben Frijters - Argenta Spaarbank NV
Delivery and Lab
Egress Software Technologies
There were lots of exercises, which was really good.
James Eyre - Egress Software Technologies
There were alsways some information on the side, which is usually left (in other courses) out but nonetheless important and interesting.
Sopra Steria
The personal approach and the practical way of going trough the seen theory afterwards.