Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Penetration Testing Standards and Classification

  • Open Web Application Security Project (OWASP)
  • Licence Penetration Testing (LPT)
  • White box and black box approaches
  • Penetration testing versus vulnerability assessment

Advanced Penetration Methodology

  • Target framework and scope definition
  • Gathering client requirements
  • Test plan checklist
  • Defining test boundaries
  • Advanced penetration testing using Kali Linux

Information Discovery

  • Google hacking techniques
  • Gathering DNS and WHOIS information
  • Gathering routing and network information
  • Consolidating comprehensive information

Scanning and Enumerating the Target

  • Advanced network scanning
  • Port and UDP port scanning
  • Stealth port scanning techniques
  • Packet crafting with Hping
  • Nmap scanning and plugins
  • Active and passive banner and OS enumeration
  • Enumerating users, groups, and shares
  • Enumerating DNS resource records and network devices

Vulnerability Assessment Tools

  • Nessus
  • OpenVAS

Target Exploitation

  • Setting up Metasploit
  • Exploitation with Metasploit
  • Meterpreter sessions
  • VNC exploitation
  • Stealing password hashes
  • Adding custom modules to Metasploit
  • Using Immunity Debugger
  • Writing exploits

Privilege Escalation and Access Maintenance

  • Cracking password hashes
  • Cracking Telnet, SSH, and FTP passwords
  • Using Metasploit post-exploitation modules
  • Protocol tunneling
  • Proxy configurations
  • Installing persistent backdoors

Advanced Sniffing

  • ARP poisoning
  • DHCP starvation
  • MAC flooding
  • DNS poisoning
  • Sniffing credentials from secure websites

Denial of Service (DoS) Attacks

  • SYN flood attacks
  • Application request flood attacks
  • Service request floods
  • Permanent denial of service attacks

Penetration Testing

  • Web penetration testing
  • Wireless penetration testing

Exploitation and Client-Side Attacks

  • Exploiting browser vulnerabilities
  • Buffer overflows
  • Fuzzing
  • Fast-track hacking
  • Phishing for passwords
  • Generating backdoors
  • Java applet attacks

Firewall Testing

  • Firewall overview
  • Testing firewalls and ports
  • Rules for testing firewalls

Management and Reporting

  • Documentation and results verification
  • Dradis framework
  • Magictree and Maltego
  • Data collection and evidence management
  • Report types and presentation
  • Post-testing procedures

Summary and Next Steps

Requirements

  • Basic proficiency in using Kali Linux for penetration testing
  • Fundamental understanding of Linux/Unix operating systems and networking concepts
  • Comprehension of network vulnerabilities

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 21 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 3900 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories