Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP)
  • Licensee Penetration Testing (LPT)
  • White box and black box testing
  • Penetration testing vs. vulnerability assessment

Advanced Penetration Methodology

  • Target framework and scope definition
  • Gathering client requirements
  • Checklist for test planning
  • Profiling test boundaries
  • Advanced penetration testing using Kali Linux

Information Discovery

  • Hacking Google
  • Gathering DNS and WHOIS information
  • Gathering route and network information
  • Gathering all-in-one information

Scanning and Enumerating Targets

  • Advanced network scanning
  • Port and UDP port scanning
  • Stealth port scanning techniques
  • Packet crafting with Hping
  • Nmap scanning and plug-ins
  • Active and passive banner grabbing and system OS enumeration
  • Enumerating users, groups, and shares
  • Enumerating DNS resource records and network devices

Vulnerability Assessment Tools

  • Nessus
  • OpenVAS

Target Exploitation

  • Setting up Metasploit
  • Exploitation with Metasploit
  • Meterpreter sessions
  • VNC exploitation
  • Stealing password hashes
  • Adding custom modules to Metasploit
  • Using Immunity Debugger
  • Writing exploits

Privilege Escalation and Access Maintenance

  • Breaking password hashes
  • Cracking Telnet, SSH, and FTP passwords
  • Using Metasploit post-exploitation modules
  • Protocol tunnelling
  • Proxy setup
  • Installing persistent backdoors

Advanced Sniffing

  • ARP poisoning
  • DHCP starvation
  • MAC flooding
  • DNS poisoning
  • Sniffing credentials from a secured website

DoS Attack

  • Syn attack
  • Application request flood attack
  • Service request flood
  • Permanent denial-of-service attacks

Penetration Testing

  • Web penetration testing
  • Wireless penetration testing

Exploitation and Client-Side Attacks

  • Exploiting browser vulnerabilities
  • Buffer overflow
  • Fuzzing
  • Fast-track hacking
  • Phishing for passwords
  • Generating backdoors
  • Java applet attacks

Firewall Testing

  • Firewall overview
  • Testing firewalls and ports
  • Rules for testing firewalls

Management and Reporting

  • Documentation and results verification
  • Dradis framework
  • Magic Tree and Maltego
  • Data collection and evidence management
  • Report types and presentation
  • Post-testing procedures

Summary and Next Steps

Requirements

  • Basic knowledge of using Kali Linux for penetration testing
  • Fundamental understanding of Linux/Unix and networking concepts
  • Awareness of common network vulnerabilities

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 21 Hours

Number of participants


Price per participant

Provisional Upcoming Courses (Require 5+ participants)

Related Categories