Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP)
  • Licensee Penetration Testing (LPT)
  • White box and black box testing
  • Penetration testing vs vulnerability assessment

Advanced Penetration Methodology

  • Target framework and scope
  • Gathering client requirements
  • Checklist for test plan
  • Profiling test boundaries
  • Advanced penetration testing using Kali Linux

Information Discovery

  • Advanced Google hacking techniques
  • Gathering DNS and WHOIS information
  • Gathering route and network information
  • Gathering comprehensive information

Scanning and Enumerating Target

  • Advanced network scanning
  • Port and UDP port scanning
  • Stealth port scanning techniques
  • Packet crafting with Hping
  • Nmap scanning and plugins
  • Active and passive banners and system OS enumeration
  • Enumerating users, groups, and shares
  • Enumerating DNS resource records and network devices

Vulnerability Assessment Tools

  • Nessus
  • OpenVAS

Target Exploitation

  • Setting up Metasploit
  • Exploitation with Metasploit
  • Meterpreter session
  • VNC exploitation
  • Stealing password hash
  • Adding custom modules to Metasploit
  • Using Immunity Debugger
  • Writing exploits

Privilege Escalation and Access Maintenance

  • Breaking password hash
  • Cracking telnet, SSH, and FTP passwords
  • Using Metasploit post-exploitation modules
  • Protocol tunneling
  • Proxy usage
  • Installing persistent backdoors

Advanced Sniffing

  • ARP poisoning
  • DHCP starvation
  • MAC flooding
  • DNS poisoning
  • Sniffing credentials from secured websites

DoS Attacks

  • SYN flood attack
  • Application request flood attack
  • Service request flood
  • Permanent denial of service attacks

Penetration Testing

  • Web penetration testing
  • Wireless penetration testing

Exploitation and Client Side Attack

  • Exploiting browser vulnerabilities
  • Buffer overflow
  • Fuzzing
  • Fast-track hacking
  • Phishing for passwords
  • Generating backdoors
  • Java applet attacks

Firewall Testing

  • Firewall overview
  • Testing firewall and ports
  • Rules of firewall testing

Management and Reporting

  • Documentation and results verification
  • Dradis framework
  • Magic Tree and Maltego
  • Data collection and evidence management
  • Report types and presentation
  • Post-testing procedures

Summary and Next Steps

Requirements

  • Foundational knowledge of using Kali Linux for penetration testing.
  • Basic understanding of Linux/Unix systems and networking concepts.
  • Familiarity with network vulnerabilities.

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories