Penetration Testing

CloudLabs

Projects

Assignment

24x7 Support

Lifetime Access

.

Course Overview

  • Participants will learn how to deploy ethical hacking to expose weaknesses in your organization. Participants will learn how gather intelligence by employing reconnaissance, published data, and scanning tools. Participants will…

At the end of the training, participants will be able to:

  1. Participants will learn how to deploy ethical hacking to expose weaknesses in your organization
  2. Participants will learn how gather intelligence by employing reconnaissance, published data, and scanning tools
  3. Participants will learn how test and improve your security by compromising your netwrk using hacking tools
  4. Participants will learn how protect against privilege escalation to prevent intrusions

Pre-requisite

  1. Experience with security issues

Duration

4 days

Course Outline

  1. Defining a penetration testing methodology
  2. Creating a security testing plan
  3. Footprinting and Intelligence Gathering
  1. Locating useful and relevant information
  2. Scavenging published data
  3. Mining archive sites
  1. Identifying authentication methods
  2. Harvesting e–mail information
  3. Interrogating network services
  4. Scanning from the inside out with HTML and egress busting
  5. Identifying Vulnerabilities
  1. Researching databases
  2. Determining target configuration
  3. Evaluating vulnerability assessment tools
  1. Discovering filtered ports
  2. Manipulating ports to gain access
  3. Connecting to blocked services
  1. Examining Windows protection modes
  2. Analysing Linux / UNIX processes
  1. Injecting SQL and HTML code
  2. Hijacking web sessions by prediction and Cross–Site Scripting (XSS)
  3. Bypassing authentication mechanisms
  4. Manipulating Clients to Uncover Internal Threats
  1. Executing client–side attacks
  2. Gaining control of browsers
  1. Harvesting client information
  2. Enumerating internal data
 
  1. Cloning a legitimate site
  2. Diverting clients by poisoning DNS
  3. Exploiting Targets to Increase Security
  1. Selecting reverse or bind shells
  2. Leveraging the Metasploit Meterpreter
  1. Deploying portable media attacks
  2. Routing through compromised clients
  1. Stealing password hashes
  2. Extracting infrastructure routing, DNS and NetBIOS data
  1. Controlling memory processes
  2. Utilizing the remote file system
 

Reviews