Course Outline
Introduction
- Overview of Kali Linux
- Installing and configuring Kali Linux
- Using and updating Kali Linux
Penetration Testing Standards and Classification
- Open Web Application Security Project (OWASP)
- Licensee Penetration Testing (LPT)
- White box and black box
- Penetration testing vs vulnerability assessment
Advanced Penetration Methodology
- Target framework and scope
- Gathering client requirements
- Checklist for test plan
- Profiling test boundaries
- Advance penetration testing using Kali Linux
Information Discovery
- Hacking Google
- Gathering DNS and who information
- Gathering route and network information
- Gathering all-in-one information
Scanning and Enumerating Target
- Advance network scanning
- Port and Udp port scanning
- Stealth port scanning techniques
- Packet crafting with Hping
- Nmap scanning and plug-ins
- Active and passive banners and system OS enumeration
- Enumerating users, groups, and shares
- Enumerating DNS resource records and network devices
Vulnerability Assessment Tools
- Nessus
- Open Vas
Target Exploitation
- Setting up Metaslpoit
- Exploitation with Metaslpoit
- Meterpreter session
- VNC exploitation
- Stealing password hash
- Adding custom modules to Metaslpoit
- Using immunity debugger
- Writing exploit
Privileges Escalation and Access Maintenance
- Breaking password hash
- Cracking telnet, ssh, and FTP password
- Using Metasploit post-exploitation modules
- Protocol tunneling
- Proxy
- Installing persistent backdoor
Advance Sniffing
- ARP poisoning
- DHCP starvation
- Mac flooding
- DNS poisoning
- Sniffing credentials from a secured website
DOS Attack
- Syn attack
- Application request flood attack
- Service request flood
- Service attack permanent denial
Penetration Testing
- Web penetration testing
- Wireless penetration testing
Exploitation and Client Side Attack
- Exploiting browser vulnerability
- Buffer overflow
- Fuzzing
- Fast-track hacking
- Phishing passwords
- Generating backdoors
- Java applet attack
Firewall Testing
- Firewall overview
- Testing firewall and ports
- Rules of testing firewall
Management and Reporting
- Documentation and results verification
- Dradis framework
- Magic tree and Maltego
- Data collection and evidence management
- Report types and presentation
- Post testing procedure
Summary and Next Steps
Requirements
- Basic knowledge of using Kali Linux for penetration testing
- Basic understanding of Linux/Unix and networking concepts
- An understanding of network vulnerabilities
Audience
- Ethical hackers
- Penetration testers
- Security engineers
- IT professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €6840 online delivery, based on a group of 2 delegates, €2160 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses