Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux.
  • Installing and configuring Kali Linux.
  • Using and updating Kali Linux.

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP).
  • Licensee Penetration Testing (LPT).
  • White box and black box testing.
  • Differences between penetration testing and vulnerability assessment.

Advanced Penetration Methodology

  • Target framework and scope definition.
  • Gathering client requirements.
  • Test plan checklist.
  • Profiling test boundaries.
  • Advanced penetration testing using Kali Linux.

Information Discovery

  • Google hacking techniques.
  • Gathering DNS and WHO information.
  • Gathering route and network information.
  • Gathering comprehensive (all-in-one) information.

Scanning and Enumerating the Target

  • Advanced network scanning.
  • Port and UDP port scanning.
  • Stealth port scanning techniques.
  • Packet crafting with Hping.
  • Nmap scanning and plugins.
  • Active and passive banner and operating system enumeration.
  • Enumerating users, groups, and shares.
  • Enumerating DNS resource records and network devices.

Vulnerability Assessment Tools

  • Nessus.
  • OpenVAS.

Target Exploitation

  • Setting up Metasploit.
  • Exploitation with Metasploit.
  • Meterpreter sessions.
  • VNC exploitation.
  • Stealing password hashes.
  • Adding custom modules to Metasploit.
  • Using Immunity Debugger.
  • Writing exploits.

Privilege Escalation and Access Maintenance

  • Breaking password hashes.
  • Cracking Telnet, SSH, and FTP passwords.
  • Using Metasploit post-exploitation modules.
  • Protocol tunneling.
  • Proxy usage.
  • Installing persistent backdoors.

Advanced Sniffing

  • ARP poisoning.
  • DHCP starvation.
  • MAC flooding.
  • DNS poisoning.
  • Sniffing credentials from a secured website.

DOS Attack

  • Syn attack.
  • Application request flood attack.
  • Service request flood.
  • Service attack permanent denial.

Penetration Testing

  • Web penetration testing.
  • Wireless penetration testing.

Exploitation and Client Side Attack

  • Exploiting browser vulnerabilities.
  • Buffer overflow.
  • Fuzzing.
  • Fast-track hacking.
  • Phishing passwords.
  • Generating backdoors.
  • Java applet attacks.

Firewall Testing

  • Firewall overview.
  • Testing firewall and ports.
  • Rules of testing firewall.

Management and Reporting

  • Documentation and results verification.
  • Dradis framework.
  • MagicTree and Maltego.
  • Data collection and evidence management.
  • Report types and presentation.
  • Post-testing procedures.

Summary and Next Steps

Requirements

  • Foundational knowledge of using Kali Linux for penetration testing.
  • Basic understanding of Linux/Unix operating systems and networking concepts.
  • Understanding of network vulnerabilities.

Target Audience

  • Ethical hackers.
  • Penetration testers.
  • Security engineers.
  • IT professionals.
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories