Get in Touch

Course Outline

Introduction

Understanding Social Engineering

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating threats
  • Non-propagating threats

Information Gathering

  • Domain information extraction
  • Networking accounts analysis
  • Maltego overview

Preparing the Penetration Testing Laboratory

  • Installing and configuring a virtual machine
  • Installing and configuring Maltego (information gathering tool)

Generating Malicious Files

  • Installing and configuring BeeLogger
  • Implementing command-line scripts to access an operating system using bash
  • Creating an advanced backdoor
  • Developing a custom remote keylogger
  • Logging saved passwords
  • Executing payload
  • Reporting payload

Delivery Options

  • Initiating an SMTP server
  • Email spoofing techniques
  • Replicating legitimate login pages
  • Directing targets to malicious URLs

Social Engineering Prevention

  • Identifying spoofed emails
  • Protecting against browser exploits
  • Manually detecting malware or utilizing a sandbox

Summary and Conclusion

Requirements

  • Experience with information systems

Audience

  • Information system analysts
 14 Hours

Testimonials (2)

Upcoming Courses

Related Categories