Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux.
  • Installing and configuring Kali Linux.
  • Using and updating Kali Linux.

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP).
  • Licensor Penetration Testing (LPT).
  • White box and black box testing.
  • Penetration testing versus vulnerability assessment.

Advanced Penetration Methodology

  • Target framework and scope definition.
  • Gathering client requirements.
  • Test plan checklist.
  • Profiling test boundaries.
  • Advanced penetration testing using Kali Linux.

Information Discovery

  • Google hacking techniques.
  • Gathering DNS and WHOIS information.
  • Gathering route and network information.
  • Gathering all-in-one information.

Scanning and Enumerating Target

  • Advanced network scanning.
  • Port and UDP port scanning.
  • Stealth port scanning techniques.
  • Packet crafting with Hping.
  • Nmap scanning and plugins.
  • Active and passive banners and system OS enumeration.
  • Enumerating users, groups, and shares.
  • Enumerating DNS resource records and network devices.

Vulnerability Assessment Tools

  • Nessus.
  • OpenVAS.

Target Exploitation

  • Setting up Metasploit.
  • Exploitation with Metasploit.
  • Meterpreter session management.
  • VNC exploitation.
  • Stealing password hashes.
  • Adding custom modules to Metasploit.
  • Using Immunity Debugger.
  • Writing exploits.

Privilege Escalation and Access Maintenance

  • Cracking password hashes.
  • Cracking Telnet, SSH, and FTP passwords.
  • Using Metasploit post-exploitation modules.
  • Protocol tunneling.
  • Proxy usage.
  • Installing persistent backdoors.

Advanced Sniffing

  • ARP poisoning.
  • DHCP starvation.
  • MAC flooding.
  • DNS poisoning.
  • Sniffing credentials from secured websites.

Denial of Service (DoS) Attack

  • SYN attack.
  • Application request flood attack.
  • Service request flood.
  • Permanent denial of service attack.

Penetration Testing

  • Web penetration testing.
  • Wireless penetration testing.

Exploitation and Client-Side Attacks

  • Exploiting browser vulnerabilities.
  • Buffer overflow.
  • Fuzzing.
  • Fast-track hacking.
  • Phishing for passwords.
  • Generating backdoors.
  • Java applet attacks.

Firewall Testing

  • Firewall overview.
  • Testing firewall and ports.
  • Rules for testing firewalls.

Management and Reporting

  • Documentation and results verification.
  • Dradis framework.
  • MagicTree and Maltego.
  • Data collection and evidence management.
  • Report types and presentation.
  • Post-testing procedures.

Summary and Next Steps

Requirements

  • Basic knowledge of using Kali Linux for penetration testing.
  • Basic understanding of Linux/Unix and networking concepts.
  • An understanding of network vulnerabilities.

Audience

  • Ethical hackers.
  • Penetration testers.
  • Security engineers.
  • IT professionals.
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories