Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Kali Linux
- Installing and configuring Kali Linux
- Using and updating Kali Linux
Penetration Testing Standards and Classification
- Open Web Application Security Project (OWASP)
- Licence Penetration Testing (LPT)
- White box and black box approaches
- Penetration testing versus vulnerability assessment
Advanced Penetration Methodology
- Target framework and scope definition
- Gathering client requirements
- Test plan checklist
- Defining test boundaries
- Advanced penetration testing using Kali Linux
Information Discovery
- Google hacking techniques
- Gathering DNS and WHOIS information
- Gathering routing and network information
- Consolidating comprehensive information
Scanning and Enumerating the Target
- Advanced network scanning
- Port and UDP port scanning
- Stealth port scanning techniques
- Packet crafting with Hping
- Nmap scanning and plugins
- Active and passive banner and OS enumeration
- Enumerating users, groups, and shares
- Enumerating DNS resource records and network devices
Vulnerability Assessment Tools
- Nessus
- OpenVAS
Target Exploitation
- Setting up Metasploit
- Exploitation with Metasploit
- Meterpreter sessions
- VNC exploitation
- Stealing password hashes
- Adding custom modules to Metasploit
- Using Immunity Debugger
- Writing exploits
Privilege Escalation and Access Maintenance
- Cracking password hashes
- Cracking Telnet, SSH, and FTP passwords
- Using Metasploit post-exploitation modules
- Protocol tunneling
- Proxy configurations
- Installing persistent backdoors
Advanced Sniffing
- ARP poisoning
- DHCP starvation
- MAC flooding
- DNS poisoning
- Sniffing credentials from secure websites
Denial of Service (DoS) Attacks
- SYN flood attacks
- Application request flood attacks
- Service request floods
- Permanent denial of service attacks
Penetration Testing
- Web penetration testing
- Wireless penetration testing
Exploitation and Client-Side Attacks
- Exploiting browser vulnerabilities
- Buffer overflows
- Fuzzing
- Fast-track hacking
- Phishing for passwords
- Generating backdoors
- Java applet attacks
Firewall Testing
- Firewall overview
- Testing firewalls and ports
- Rules for testing firewalls
Management and Reporting
- Documentation and results verification
- Dradis framework
- Magictree and Maltego
- Data collection and evidence management
- Report types and presentation
- Post-testing procedures
Summary and Next Steps
Requirements
- Basic proficiency in using Kali Linux for penetration testing
- Fundamental understanding of Linux/Unix operating systems and networking concepts
- Comprehension of network vulnerabilities
Audience
- Ethical hackers
- Penetration testers
- Security engineers
- IT professionals
21 Hours
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 3900 € + VAT*
Contact us for an exact quote and to hear our latest promotions