This document provides an overview of the HadSec Professional Network Pentester training course. The training covers a variety of topics related to penetration testing over 57 chapters, including Windows and network pentesting techniques like vulnerability analysis, social engineering, privilege escalation, password dumping, and covering tools like Metasploit, Burp Suite, and Volatility. The objectives of the training are to teach participants how to perform internal and external network penetration testing and prepare them to become professional pentesters. The target audience includes system administrators, security engineers, and those looking to enter the pentesting field.
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Hadsec Professional network pentester
1. Kali Linux / BackBox
MUHAMMAD PAILUS
HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta
HadSec Network pentesting
Professional
2. 1
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
Hadsec Professional Network Pentester
Pentest merupakan salah satu profesi yang tergolong masih sedikit terutama
di negara indonesia. Dalam rangka meningkatkan mutu security sebuah perusahaan,
keahlian Pentester akan sangat menentukan bagaimana keamanan dari sebuah
perusahaan. HadSec salah satu perusahaan yang bergerak dibidang IT ikut
memberikan materi Network Pentester guna meningkatkan kemampuan Pentester
maupun bagi yang ingin belajar jadi Pentester, untuk melakukan audit kemanan
jaringan.
Semua materi yang ada dalam HadSec Professional Network Pentest telah di
persiapkan dengan segala bentuk kasus yang di sesuaikan dengan standar yang
sesuai dengan kasus yang ada di lapangan saat ini. Semua materi dalam training ini
tidak hanya di referensikan dengan standar international yang ada, tetapi juga di
tambahkan pengalaman Trainer-Trainer HadSec yang berprofesi sebagai
Professional Pentester.
Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa melakukan
melakukan Pengujian terhadap jaringan baik itu sebagai internal Pentester maupun
eksternal Pentester.
Target Audience: Sysadmin, Security enginer,:
Corporate networks
Security Enginer
Prepare Become Pentester
3. 2
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
HadSec-NetPen[N101]
No Chapter Objective
Introduction Penetration Testing
1 Chapter 1 Introduction Penetration Testing
2 Chapter 2 Penetration Testing Phase
3 Chapter 3 How Setup Lab Preparation
Windows Pentesting
5 Chapter 4 Vulnerabilities on Windows Environment
6 Chapter 5 Misconfigurations on windows Software
7 Chapter 6 Applied Social Engineering
8 Chapter 7 Reverse Shell for bypass Firewall
9 Chapter 8 Payload Tunneling over HTTP/HTTPS
10 Chapter 9 Open Port Detection With Automatic Outbound
11 Chapter 10 Port Forwarding For Jumping Target
12 Chapter 11 Pivoting (on Nat Network)
13 Chapter 12 Reverse Connect through Pivots
4. 3
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
14 Chapter 13 Bypass Anti virus With manual Technique
15 Chapter 14 Escalation Privileges and Bypass Uac
12 Chapter 15 Hash Dumping For User Password
16 Chapter 16 Remote Network Monitoring
17 Chapter 17 Desktop and Windows Sessions
18 Chapter 18 Impersonation token On windows
19 Chapter 19 Wevtutil for Log Management
20 Chapter 20 Post Exploitation With Wmic
21 Chapter 21 Make Custom Backdoor Shell Bind
22 Chapter 22 Bind Shell Payload Custom
23 Chapter 23 Bitsadmin
24 Chapter 24 Recovery Password From Browser
25 Chapter 25 Browser Master Password Dictionary attack
26 Chapter 26 Reverse Connect through Pivots
27 Chapter 27 Brute force over ssh
5. 4
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
28 Chapter 28 Escalation Privileges and Bypass Uac
29 Chapter 29 Hash Dumping For User Password
30 Chapter 30 Remote Network Monitoring
31 Chapter 31 Desktop and Windows Sessions
32 Chapter 32 Impersonation token On windows
33 Chapter 33 Wevtutil for Log Management
34 Chapter 34 Post Exploitation With Wmic
35 Chapter 35 Make Custom Backdoor Shell Bind
36 Chapter 36 Bind Shell Payload Custom
37 Chapter 37 Laughing with hydra
38 Chapter 38 Laughing with Medusa
39 Chapter 39 Ncrack master bruteforce
40 Chapter 40 Proxy as tempering packet
41 Chapter 41 Burp Suite Powerfull Proxy tampering
42 Chapter 42 DNS Poisoning With the Hosts File
6. 5
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
43 Chapter 43 Veil Framework For Evasion Anti Virus
44 Chapter 44 Metasploit Loader For Evasion Anti Virus
DLL Creation
45 Chapter 45 Run Meterpreter on multi Arch DLL
46 Chapter 46 Running Metasploit Loader As a DLL
47 Chapter 47 Hijacking creation DLL
48 Chapter 48 Meterpreter DLL Hijacking with DLLManager
49 Chapter 49 Bind Shell Payload Custom
50 Chapter 50 Reverse Dll Technique with Debugger
51 Chapter 51 Exploiting VLC Using DLL
52 Chapter 52 DTools For Hijacking DLL
53 Chapter 53 Evasion Anti Virus With Power Shell
54 Chapter 54 DLL Injection using AppInit_DLLs
55 Chapter 55 Firefox Addon Attack
56 Chapter 56 Stripping Manifest Files for DLL Hijacking
7. 6
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
57 Chapter 57 Perpetual Meterpreter
58 Chapter 58 Perpetual Meterpreter
Anti Forensic Safety Creation
59 Chapter 59 Prefetch Directory On Windows
60 Chapter 60 Windows Prefetch make disable
61 Chapter 61 0wning Windows Prefetch with Meterpreter
62 Chapter 62 Dumping Memory and analisys
63 Chapter 63 Broser Memory Stealth Password with Dumping
64 Chapter 64 Dumping Logon Credentials from Memory Dumps
65 Chapter 65 Dumping Process Memory with Volatility