The Advanced Penetration Testing with Kali Linux is an all-embracing course that expertly explains to optimize Kali Linux and its powerful tools for advanced wired and wireless networks.
2. Course Description
The Advanced Penetration Testing with Kali Linux is an all-encompassing
course that aptly explains how to optimize Kali Linux and its powerful tools for
advanced network and mobile security. The course focuses on demonstrating
advanced techniques to perform penetration testing. You learn to use
Metasploit Framework and practices used in exploiting Windows and Unix
Platforms. Vulnerability scanning forms an integral part of this comprehensive
training and demonstrates how a system is targeted and exploited. The
training also empowers you with detailed understanding of diverse
post-exploitation techniques and modernistic techniques to evade antivirus
while understanding the customization of attacks.
www.infosectrain.com
Overview
40 hrs of
instructor-led
training
Real-like scenarios
for practical
understanding
Hands-on exposure
with diverse
vulnerabilities
Interactive training
and Q&A sessions
4. www.infosectrain.com
Course Objectives
The advanced web penetration testing training course helps
you gain skills related to
โข Setting up lab and installing Kali Linux
โข Understanding types of reconnaissance including active and passive
โข Analyzing vulnerabilities and using SSL Scan to fetch SSL and TLS information
โข Vulnerability scanning using OWASP ZAP, w3af, Wapiti, Vega
scanner, Metasploitโs Wmap and using Lynis for hardening
โข Learn Security tools including Squid proxy, Port Sentry, Network
Security Toolkit (NST), OSSEC, Tripwire and many more
โข Using SQLMap, Metasploit, Tomcat Manager and other tools to
find exploitation and attacks
โข Understanding how to exploit Windows and Unix vulnerable services
โข Understanding how to perform DNS spoofing, redirecting traffic
and maintaining access
โข Using PING tunnel and HTTP tunnel for protocol spoofing
โข Understanding client side attacks, social engineering and BeFF
โข Managing network security with Security Onion and securing traffic
โข Working with various security tools
โข Setting up and hacking a wireless network
โข Hacking of mobile platforms
โข Mitigating OWASP vulnerabilities
โข Performing penetration testing and documenting reports
5. โข Middle and advanced level penetration testers
โข Security enthusiasts
โข Aspiring penetration testers
โข Security professionals intending to upskill for compliance based
penetration testing
โข Basic understanding of networking and servers
โข Understanding of a programming language like Python recommended
www.infosectrain.com
Target Audience
Pre-requisites
6. www.infosectrain.com
Course Content
Network and System Security Testing
Linux for Testing
Scripting for Pen-Testers
โข The Linux Filesystem
โข Basic Linux Commands
โข Finding Files in Linux
โข Managing Linux Services
โข Searching, Installing, and Removing Tools
โข The Bash Environment
โข Piping and Redirection
โข Text Searching and Manipulation
โข Background Processes (bg)
โข Jobs Control
โข Process Control
โข File and Command Monitoring
โข Downloading Files
โข Persistent Bash Customization
โ Introduction to Shell
โข Script Basics
โข Global Declarations
โข Variable basics
โข Escape characters
โข Basic redirection and pipe
โข Understanding Conditions
7. www.infosectrain.com
โ Introduction to Python
โข What is Python?
โข Python: Favourite of Hackers
โข Data Types and variables
โข Control Flow and Data structure
โข Functions, Functional Programming and File Handling
โข Exception Handling
โข Creating Managing File and Directory Access
โข Raw Socket basics
โข Socket Programming with Python
โข Servers and Clients architecture
โข Creating Sniffers (wired and wireless)
โข Creating packet injector
โข Understanding Loops
โข Recursion and Nested Functions
โข Function Attributes
โข The Linux Execution Environment with Scripts
โข Restricted Shells
8. www.infosectrain.com
Introduction to Pentesting
OSINT & Analysis
โข Penetration Testing Benefits
โข Types of Penetration Testing
โข Penetration Testing Methodologies
โข Law & Compliance
โข Planning, Managing & Reporting
โข Foundation of OSINT
โข Goals of OSINT Collection
โข Core OSINT Skills
โข Leveraging Search Engines
โข File Metadata Analysis
โข Reverse Image Searching
โข People Investigations
โข SOCMINT
โข Finding Email Addresses
โข Domain & IP Investigations
โข Dark Web OSINT
โข What is TOR?
โข OSINT for Business
โข Capture the Flag Exercises for OSINT
9. www.infosectrain.com
Reconnaissance & Enumeration
The Exploit Framework
โข Types of Information Gathering
โข Reconnaissance vs Enumeration
โข Google Search
โข Google Hacking
โข User Enumeration & Phishing
โข Forward Lookup Brute Force
โข Reverse Lookup Brute Force
โข DNS Zone Transfers
โข Port Scanning
โข Null Sessions
โข Enum4Linux
โข VRFY Script
โข Python Port
โข Exploring Metasploit Framework
โข Using Metasploit Auxiliary
โข Using Exploit Modules
โข Staged and Non-Staged Payloads
โข Working with Multi Handler
โข Working with Meterpreter Session
10. www.infosectrain.com
Bypassing Security
Overflow to Attack
โข Antivirus Evasion using Encoder
โข Creating the shellcode with Msfvenom
โข Bypassing Network Filters
โข Understanding and bypassing pfsense firewall
โข Bypassing IDS and IPS demo on snort
โข Stack Overflows Introduction
โข A Word About DEP, ASLR, and CFG
โข Replicating the Crash
โข Controlling EIP
โข Stack Overflows and ASLR Bypass
โข ASLR Introduction
โข ASLR Implementation
โข ASLR Bypass Theory
โข Windows Defender Exploit Guard and ASLR
โข Understanding SEH
โข Exploiting SEH Overflows
โข Understanding the low fragmentation heap
โข Heap Overrun/Overflow
11. www.infosectrain.com
Advanced Windows Exploitation
โข Operating System and Programming Theory
โข Win32 APIs
โข Windows Registry
โข What are Macros?
โข Creating Dangerous Macros using Empire
โข Microsoft Office Phishing using Macros
โข Executing Shellcode in Word Memory
โข PowerShell File Transfers
โข VBA Shellcode Runner
โข PowerShell Shellcode Runner
โข Reflection Shellcode Runner in PowerShell
โข Client-Side Code Execution with Windows Script Host
โข Credential Replay Attacks
โข Credential Discovery
โข Hashing Concept
โข Exploiting Latest Vulnerabilities
โข Pass the Hash (PTH)
โข Kerberoasting and AS-REP Roasting
โข Pass the Ticket (PTT
โข FOLLINA
โข Log4j
โข Spring4Shell
12. www.infosectrain.com
Privilege Escalation & Persistence
โข Windows Privilege Escalation
โข Linux Privilege Escalation
โข Understanding Windows Privileges and Integrity Levels
โข User Account Control (UAC) Bypass: fodhelper.exe Case Study
โข Insecure File Permissions: Serviio Case Study
โข Leveraging Unquoted Service Paths
โข Kernel Vulnerabilities: USBPcap Case Study
โข Understanding Linux Privileges
โข Insecure File Permissions: Cron Case Study
โข Insecure File Permissions: /etc/passwd Case Study
โข Kernel Vulnerabilities: Case Study
13. www.infosectrain.com
โข OWASP Standards
โข Broken Web Application
โข ATutor & JuiceShop
โข Web Traffic Inspection using Burpsuite
โข Atmail Mail Server Appliance: from XSS to RCE
โข Session Hijacking
โข Session Riding
โข Authentication Bypass and RCE
โข Injection Attacks
โข ATutor LMS Type Juggling Vulnerability
โข Attacking the Loose Comparison
โข Magic Hashes
โข JavaScript Injection Remote Code Execution
โข Cookie Deserialization RCE
โข Server-Side Template Injection
โข XSS and OS Command Injection
โข Advanced XSS Exploitation
โข RCE Hunting
The Web Attacks
14. www.infosectrain.com
โข Building and setup AWS pen testing Environment
โข Exploiting S3
โข Understanding and exploiting Lambda Services
โข Testing IAM privileges
โข Case study For Capital One Attack
โข Defining Methodology
โข Types of Reports
โข Executive Summary
โข Detailed Reports
โข Adding Proof of Concept
โข Creating Drafts
โข Risk Rating Factors
โข Automating Reports
โข Report Writing Tools
AWS Pentesting
Deliverables โ Report Writing