SlideShare a Scribd company logo
1 of 7
Download to read offline
Kali Linux / BackBox
MUHAMMAD PAILUS
HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta
HadSec Network pentesting
Professional
1
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
Hadsec Professional Network Pentester
Pentest merupakan salah satu profesi yang tergolong masih sedikit terutama
di negara indonesia. Dalam rangka meningkatkan mutu security sebuah perusahaan,
keahlian Pentester akan sangat menentukan bagaimana keamanan dari sebuah
perusahaan. HadSec salah satu perusahaan yang bergerak dibidang IT ikut
memberikan materi Network Pentester guna meningkatkan kemampuan Pentester
maupun bagi yang ingin belajar jadi Pentester, untuk melakukan audit kemanan
jaringan.
Semua materi yang ada dalam HadSec Professional Network Pentest telah di
persiapkan dengan segala bentuk kasus yang di sesuaikan dengan standar yang
sesuai dengan kasus yang ada di lapangan saat ini. Semua materi dalam training ini
tidak hanya di referensikan dengan standar international yang ada, tetapi juga di
tambahkan pengalaman Trainer-Trainer HadSec yang berprofesi sebagai
Professional Pentester.
Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa melakukan
melakukan Pengujian terhadap jaringan baik itu sebagai internal Pentester maupun
eksternal Pentester.
Target Audience: Sysadmin, Security enginer,:
 Corporate networks
 Security Enginer
 Prepare Become Pentester
2
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
HadSec-NetPen[N101]
No Chapter Objective
Introduction Penetration Testing
1 Chapter 1 Introduction Penetration Testing
2 Chapter 2 Penetration Testing Phase
3 Chapter 3 How Setup Lab Preparation
Windows Pentesting
5 Chapter 4 Vulnerabilities on Windows Environment
6 Chapter 5 Misconfigurations on windows Software
7 Chapter 6 Applied Social Engineering
8 Chapter 7 Reverse Shell for bypass Firewall
9 Chapter 8 Payload Tunneling over HTTP/HTTPS
10 Chapter 9 Open Port Detection With Automatic Outbound
11 Chapter 10 Port Forwarding For Jumping Target
12 Chapter 11 Pivoting (on Nat Network)
13 Chapter 12 Reverse Connect through Pivots
3
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
14 Chapter 13 Bypass Anti virus With manual Technique
15 Chapter 14 Escalation Privileges and Bypass Uac
12 Chapter 15 Hash Dumping For User Password
16 Chapter 16 Remote Network Monitoring
17 Chapter 17 Desktop and Windows Sessions
18 Chapter 18 Impersonation token On windows
19 Chapter 19 Wevtutil for Log Management
20 Chapter 20 Post Exploitation With Wmic
21 Chapter 21 Make Custom Backdoor Shell Bind
22 Chapter 22 Bind Shell Payload Custom
23 Chapter 23 Bitsadmin
24 Chapter 24 Recovery Password From Browser
25 Chapter 25 Browser Master Password Dictionary attack
26 Chapter 26 Reverse Connect through Pivots
27 Chapter 27 Brute force over ssh
4
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
28 Chapter 28 Escalation Privileges and Bypass Uac
29 Chapter 29 Hash Dumping For User Password
30 Chapter 30 Remote Network Monitoring
31 Chapter 31 Desktop and Windows Sessions
32 Chapter 32 Impersonation token On windows
33 Chapter 33 Wevtutil for Log Management
34 Chapter 34 Post Exploitation With Wmic
35 Chapter 35 Make Custom Backdoor Shell Bind
36 Chapter 36 Bind Shell Payload Custom
37 Chapter 37 Laughing with hydra
38 Chapter 38 Laughing with Medusa
39 Chapter 39 Ncrack master bruteforce
40 Chapter 40 Proxy as tempering packet
41 Chapter 41 Burp Suite Powerfull Proxy tampering
42 Chapter 42 DNS Poisoning With the Hosts File
5
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
43 Chapter 43 Veil Framework For Evasion Anti Virus
44 Chapter 44 Metasploit Loader For Evasion Anti Virus
DLL Creation
45 Chapter 45 Run Meterpreter on multi Arch DLL
46 Chapter 46 Running Metasploit Loader As a DLL
47 Chapter 47 Hijacking creation DLL
48 Chapter 48 Meterpreter DLL Hijacking with DLLManager
49 Chapter 49 Bind Shell Payload Custom
50 Chapter 50 Reverse Dll Technique with Debugger
51 Chapter 51 Exploiting VLC Using DLL
52 Chapter 52 DTools For Hijacking DLL
53 Chapter 53 Evasion Anti Virus With Power Shell
54 Chapter 54 DLL Injection using AppInit_DLLs
55 Chapter 55 Firefox Addon Attack
56 Chapter 56 Stripping Manifest Files for DLL Hijacking
6
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
57 Chapter 57 Perpetual Meterpreter
58 Chapter 58 Perpetual Meterpreter
Anti Forensic Safety Creation
59 Chapter 59 Prefetch Directory On Windows
60 Chapter 60 Windows Prefetch make disable
61 Chapter 61 0wning Windows Prefetch with Meterpreter
62 Chapter 62 Dumping Memory and analisys
63 Chapter 63 Broser Memory Stealth Password with Dumping
64 Chapter 64 Dumping Logon Credentials from Memory Dumps
65 Chapter 65 Dumping Process Memory with Volatility

More Related Content

Similar to Hadsec Professional network pentester

Using Docker Platform to Provide Services
Using Docker Platform to Provide ServicesUsing Docker Platform to Provide Services
Using Docker Platform to Provide ServicesGLC Networks
 
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes ClusterKubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes Clustersmalltown
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureSergey Gordeychik
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjurconjur_inc
 
Docker and SDL Web/Tridion - SDL UK User Group April 2017
Docker and SDL Web/Tridion - SDL UK User Group April 2017Docker and SDL Web/Tridion - SDL UK User Group April 2017
Docker and SDL Web/Tridion - SDL UK User Group April 2017rsleggett
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
 
NetDevOps Development Environments
NetDevOps Development EnvironmentsNetDevOps Development Environments
NetDevOps Development EnvironmentsJoel W. King
 
3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdfSetiya Nugroho
 
Docker Networking - Common Issues and Troubleshooting Techniques
Docker Networking - Common Issues and Troubleshooting TechniquesDocker Networking - Common Issues and Troubleshooting Techniques
Docker Networking - Common Issues and Troubleshooting TechniquesSreenivas Makam
 
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...Guillaume Morini
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Patrick Chanezon
 
Security Tips to run Docker in Production
Security Tips to run Docker in ProductionSecurity Tips to run Docker in Production
Security Tips to run Docker in ProductionGianluca Arbezzano
 
How to Dockerize, Automate the Build and Deployment Process for Flutter?
How to Dockerize, Automate the Build and Deployment Process for Flutter?How to Dockerize, Automate the Build and Deployment Process for Flutter?
How to Dockerize, Automate the Build and Deployment Process for Flutter?9 series
 
DevNet Associate : Python introduction
DevNet Associate : Python introductionDevNet Associate : Python introduction
DevNet Associate : Python introductionJoel W. King
 

Similar to Hadsec Professional network pentester (20)

docker.pdf
docker.pdfdocker.pdf
docker.pdf
 
Using Docker Platform to Provide Services
Using Docker Platform to Provide ServicesUsing Docker Platform to Provide Services
Using Docker Platform to Provide Services
 
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes ClusterKubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjur
 
Docker and SDL Web/Tridion - SDL UK User Group April 2017
Docker and SDL Web/Tridion - SDL UK User Group April 2017Docker and SDL Web/Tridion - SDL UK User Group April 2017
Docker and SDL Web/Tridion - SDL UK User Group April 2017
 
The Docker Training in Bangalore From myTectra,Online
The Docker Training in Bangalore From myTectra,OnlineThe Docker Training in Bangalore From myTectra,Online
The Docker Training in Bangalore From myTectra,Online
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
Excelian hyperledger walkthrough-feb17
Excelian hyperledger walkthrough-feb17Excelian hyperledger walkthrough-feb17
Excelian hyperledger walkthrough-feb17
 
NetDevOps Development Environments
NetDevOps Development EnvironmentsNetDevOps Development Environments
NetDevOps Development Environments
 
3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf3. Basic Pentesting 1 Walkthrough.pdf
3. Basic Pentesting 1 Walkthrough.pdf
 
Docker Networking - Common Issues and Troubleshooting Techniques
Docker Networking - Common Issues and Troubleshooting TechniquesDocker Networking - Common Issues and Troubleshooting Techniques
Docker Networking - Common Issues and Troubleshooting Techniques
 
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...
DockerCon EU 2018 Workshop: Container Networking for Swarm and Kubernetes in ...
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
 
Security Tips to run Docker in Production
Security Tips to run Docker in ProductionSecurity Tips to run Docker in Production
Security Tips to run Docker in Production
 
How to Dockerize, Automate the Build and Deployment Process for Flutter?
How to Dockerize, Automate the Build and Deployment Process for Flutter?How to Dockerize, Automate the Build and Deployment Process for Flutter?
How to Dockerize, Automate the Build and Deployment Process for Flutter?
 
Docker.pptx
Docker.pptxDocker.pptx
Docker.pptx
 
DevNet Associate : Python introduction
DevNet Associate : Python introductionDevNet Associate : Python introduction
DevNet Associate : Python introduction
 
Secure network
Secure networkSecure network
Secure network
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Hadsec Professional network pentester

  • 1. Kali Linux / BackBox MUHAMMAD PAILUS HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta HadSec Network pentesting Professional
  • 2. 1 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta Hadsec Professional Network Pentester Pentest merupakan salah satu profesi yang tergolong masih sedikit terutama di negara indonesia. Dalam rangka meningkatkan mutu security sebuah perusahaan, keahlian Pentester akan sangat menentukan bagaimana keamanan dari sebuah perusahaan. HadSec salah satu perusahaan yang bergerak dibidang IT ikut memberikan materi Network Pentester guna meningkatkan kemampuan Pentester maupun bagi yang ingin belajar jadi Pentester, untuk melakukan audit kemanan jaringan. Semua materi yang ada dalam HadSec Professional Network Pentest telah di persiapkan dengan segala bentuk kasus yang di sesuaikan dengan standar yang sesuai dengan kasus yang ada di lapangan saat ini. Semua materi dalam training ini tidak hanya di referensikan dengan standar international yang ada, tetapi juga di tambahkan pengalaman Trainer-Trainer HadSec yang berprofesi sebagai Professional Pentester. Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa melakukan melakukan Pengujian terhadap jaringan baik itu sebagai internal Pentester maupun eksternal Pentester. Target Audience: Sysadmin, Security enginer,:  Corporate networks  Security Enginer  Prepare Become Pentester
  • 3. 2 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta HadSec-NetPen[N101] No Chapter Objective Introduction Penetration Testing 1 Chapter 1 Introduction Penetration Testing 2 Chapter 2 Penetration Testing Phase 3 Chapter 3 How Setup Lab Preparation Windows Pentesting 5 Chapter 4 Vulnerabilities on Windows Environment 6 Chapter 5 Misconfigurations on windows Software 7 Chapter 6 Applied Social Engineering 8 Chapter 7 Reverse Shell for bypass Firewall 9 Chapter 8 Payload Tunneling over HTTP/HTTPS 10 Chapter 9 Open Port Detection With Automatic Outbound 11 Chapter 10 Port Forwarding For Jumping Target 12 Chapter 11 Pivoting (on Nat Network) 13 Chapter 12 Reverse Connect through Pivots
  • 4. 3 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 14 Chapter 13 Bypass Anti virus With manual Technique 15 Chapter 14 Escalation Privileges and Bypass Uac 12 Chapter 15 Hash Dumping For User Password 16 Chapter 16 Remote Network Monitoring 17 Chapter 17 Desktop and Windows Sessions 18 Chapter 18 Impersonation token On windows 19 Chapter 19 Wevtutil for Log Management 20 Chapter 20 Post Exploitation With Wmic 21 Chapter 21 Make Custom Backdoor Shell Bind 22 Chapter 22 Bind Shell Payload Custom 23 Chapter 23 Bitsadmin 24 Chapter 24 Recovery Password From Browser 25 Chapter 25 Browser Master Password Dictionary attack 26 Chapter 26 Reverse Connect through Pivots 27 Chapter 27 Brute force over ssh
  • 5. 4 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 28 Chapter 28 Escalation Privileges and Bypass Uac 29 Chapter 29 Hash Dumping For User Password 30 Chapter 30 Remote Network Monitoring 31 Chapter 31 Desktop and Windows Sessions 32 Chapter 32 Impersonation token On windows 33 Chapter 33 Wevtutil for Log Management 34 Chapter 34 Post Exploitation With Wmic 35 Chapter 35 Make Custom Backdoor Shell Bind 36 Chapter 36 Bind Shell Payload Custom 37 Chapter 37 Laughing with hydra 38 Chapter 38 Laughing with Medusa 39 Chapter 39 Ncrack master bruteforce 40 Chapter 40 Proxy as tempering packet 41 Chapter 41 Burp Suite Powerfull Proxy tampering 42 Chapter 42 DNS Poisoning With the Hosts File
  • 6. 5 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 43 Chapter 43 Veil Framework For Evasion Anti Virus 44 Chapter 44 Metasploit Loader For Evasion Anti Virus DLL Creation 45 Chapter 45 Run Meterpreter on multi Arch DLL 46 Chapter 46 Running Metasploit Loader As a DLL 47 Chapter 47 Hijacking creation DLL 48 Chapter 48 Meterpreter DLL Hijacking with DLLManager 49 Chapter 49 Bind Shell Payload Custom 50 Chapter 50 Reverse Dll Technique with Debugger 51 Chapter 51 Exploiting VLC Using DLL 52 Chapter 52 DTools For Hijacking DLL 53 Chapter 53 Evasion Anti Virus With Power Shell 54 Chapter 54 DLL Injection using AppInit_DLLs 55 Chapter 55 Firefox Addon Attack 56 Chapter 56 Stripping Manifest Files for DLL Hijacking
  • 7. 6 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 57 Chapter 57 Perpetual Meterpreter 58 Chapter 58 Perpetual Meterpreter Anti Forensic Safety Creation 59 Chapter 59 Prefetch Directory On Windows 60 Chapter 60 Windows Prefetch make disable 61 Chapter 61 0wning Windows Prefetch with Meterpreter 62 Chapter 62 Dumping Memory and analisys 63 Chapter 63 Broser Memory Stealth Password with Dumping 64 Chapter 64 Dumping Logon Credentials from Memory Dumps 65 Chapter 65 Dumping Process Memory with Volatility