The Penetration Testing course focuses on demonstrating advanced techniques to perform penetration testing. You learn to use Metasploit Framework and practices used in exploiting Windows and Unix platforms. Vulnerability scanning forms an integral part of this comprehensive training and demonstrates how a system is targeted and exploited. The training also empowers you with detailed understanding of diverse post-exploitation techniques and modernistic techniques to evade antivirus while understanding the customization of attacks. Kali Linux Operating system is a pen-testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The skills acquired by the candidate from this course make him/her understand the basics to conduct penetration testing of the network.
Course Objectives:
In this course, you will learn to:
- Learn Kali Linux installation with lab setup
- Understand Reconnaissance types, Vulnerability analysis, classification, and identification
- Practice SQLMap, Metasploit, Tomcat Manager and other tools for identifying exploitation and attacks
- Learn advanced level exploitation such as exploiting vulnerable services in Windows and Unix
- Understand Spoofing, spinning and access maintenance, social engineering and BEEF (Browser Exploitation Framework)
- Report writing and pen testing process
Course content
Linux for Testing
- The Linux Filesystem
- Basic Linux Commands
- Finding Files in Linux
- Managing Linux Services
- Searching, Installing, and Removing Tools
- The Bash Environment
- Piping and Redirection
- Text Searching and Manipulation
- Background Processes (bg)
- Jobs Control
- Process Control
- File and Command Monitoring
- Downloading Files
- Persistent Bash Customization
Scripting for Pen-Testers
- Introduction to Shell
- Script Basics
- Global Declarations
- Variable basics
- Escape characters
- Basic redirection and pipe
- Understanding Conditions
- Understanding Loops
- Recursion and Nested Functions
- Function Attributes
- The Linux Execution Environment with Scripts
- Restricted Shells
Introduction to Python
- What is Python?
- Python: Favourite of Hackers
- Data Types and variables
- Control Flow and Data structure
- Functions, Functional Programming and File Handling
- Exception Handling
- Creating Managing File and Directory Access
- Raw Socket basics
- Socket Programming with Python
- Servers and Clients architecture
- Creating Sniffers (wired and wireless)
- Creating packet injector
Introduction to Pen-Testing
- Penetration Testing Benefits
- Types of Penetration Testing
- Penetration Testing Methodologies
- Law & Compliance
- Planning, Managing & Reporting
OSINT & Analysis
- Foundation of OSINT
- Goals of OSINT Collection
- Core OSINT Skills
- Leveraging Search Engines
- File Metadata Analysis
- Reverse Image Searching
- People Investigations
- SOCMINT
- Finding Email Addresses
- Domain & IP Investigations
- Dark Web OSINT
- What is TOR?
- OSINT for Business
- Capture the Flag Exercises for OSINT
Reconnaissance & Enumeration
- Types of Information Gathering
- Reconnaissance vs Enumeration
- Google Search
- Google Hacking
- User Enumeration & Phishing
- Forward Lookup Brute Force
- Reverse Lookup Brute Force
- DNS Zone Transfers
- Port Scanning
- Null Sessions
- Enum4Linux
- VRFY Script
- Python Port
The Exploit Framework
- Exploring Metasploit Framework
- Using Metasploit Auxiliary
- Using Exploit Modules
- Staged and Non-Staged Payloads
- Working with Multi Handler
- Working with Meterpreter Session
Bypassing Security
- Antivirus Evasion using Encoder
- Creating the shellcode with Msfvenom
- Bypassing Network Filters
- Understanding and bypassing pfsense firewall
- Bypassing IDS and IPS demo on snort
Overflow to Attack
- Stack Overflows Introduction
- A Word About DEP, ASLR, and CFG
- Replicating the Crash
- Controlling EIP
- Stack Overflows and ASLR Bypass
- ASLR Introduction
- ASLR Implementation
- ASLR Bypass Theory
- Windows Defender Exploit Guard and ASLR
- Understanding SEH
- Exploiting SEH Overflows
- Understanding the low fragmentation heap
- Heap Overrun/Overflow
Advanced Windows Exploitation
- Operating System and Programming Theory
- Win32 APIs
- Windows Registry
- What are Macros?
- Creating Dangerous Macros using Empire
- Microsoft Office Phishing using Macros
- Executing Shellcode in Word Memory
- PowerShell File Transfers
- VBA Shellcode Runner
- PowerShell Shellcode Runner
- Reflection Shellcode Runner in PowerShell
- Client-Side Code Execution with Windows Script Host
- Credential Replay Attacks
- Credential Discovery
Hashing Concept
- Pass the Hash (PTH)
- Kerberoasting and AS-REP Roasting
- Pass the Ticket (PTT)
Exploiting Latest Vulnerabilities
- FOLLINA
- Log4j
- Spring4Shell
Privilege Escalation & Persistence
Windows Privilege Escalation
- Understanding Windows Privileges and Integrity Levels
- User Account Control (UAC) Bypass: fodhelper.exe Case Study
- Insecure File Permissions: Serviio Case Study
- Leveraging Unquoted Service Paths
- Kernel Vulnerabilities: USBPcap Case Study
Linux Privilege Escalation
- Understanding Linux Privileges
- Insecure File Permissions: Cron Case Study
- Insecure File Permissions: /etc/passwd Case Study
- Kernel Vulnerabilities: Case Study
The Web Attacks
- OWASP Standards
- Broken Web Application
- ATutor & JuiceShop
- Web Traffic Inspection using Burpsuite
- Atmail Mail Server Appliance: from XSS to RCE
- Session Hijacking
- Session Riding
- Authentication Bypass and RCE
- Injection Attacks
- ATutor LMS Type Juggling Vulnerability
- Attacking the Loose Comparison
- Magic Hashes
- JavaScript Injection Remote Code Execution
- Cookie Deserialization RCE
- Server-Side Template Injection
- XSS and OS Command Injection
- Advanced XSS Exploitation
- RCE Hunting
AWS Pen testing
- Building and setup AWS pen testing Environment
- Exploiting S3
- Understanding and exploiting Lambda Services
- Testing IAM privileges
- Case study For Capital One Attack
Deliverables – Report Writing
- Defining Methodology
- Types of Reports
- Executive Summary
- Detailed Reports
- Adding Proof of Concept
- Creating Drafts
- Risk Rating Factors
- Automating Reports
- Report Writing Tools
To see the full course content Download now
Course Prerequisites
- Basic understanding of networking, servers, and Linux
- Understanding of a programming language like Python recommended
Who can attend
- Middle and advanced level penetration testers
- Security enthusiasts
- Aspiring penetration testers
- Security professionals intending to upskill for compliance based penetration testing
- Ethical hackers and cybersecurity enthusiasts
Number of Hours: 30hrs
Certification
Key features
- One to One Training
- Online Training
- Fastrack & Normal Track
- Resume Modification
- Mock Interviews
- Video Tutorials
- Materials
- Real Time Projects
- Virtual Live Experience
- Preparing for Certification
FAQs
DASVM Technologies offers 300+ IT training courses with 10+ years of Experienced Expert level Trainers.
- One to One Training
- Online Training
- Fastrack & Normal Track
- Resume Modification
- Mock Interviews
- Video Tutorials
- Materials
- Real Time Projects
- Materials
- Preparing for Certification
Call now: +91-99003 49889 and know the exciting offers available for you!
We working and coordinating with the companies exclusively to get placed. We have a placement cell focussing on training and placements in Bangalore. Our placement cell help more than 600+ students per year.
Learn from experts active in their field, not out-of-touch trainers. Leading practitioners who bring current best practices and case studies to sessions that fit into your work schedule. We have a pool of experts and trainers are composed with highly skilled and experienced in supporting you in specific tasks and provide professional support. 24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts. Our trainers has contributed in the growth of our clients as well as professionals.
All of our highly qualified trainers are industry experts with at least 10-12 years of relevant teaching experience. Each of them has gone through a rigorous selection process which includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating continue to train for us.
No worries. DASVM technologies assure that no one misses single lectures topics. We will reschedule the classes as per your convenience within the stipulated course duration with all such possibilities. If required you can even attend that topic with any other batches.
DASVM Technologies provides many suitable modes of training to the students like:
- Classroom training
- One to One training
- Fast track training
- Live Instructor LED Online training
- Customized training
Yes, the access to the course material will be available for lifetime once you have enrolled into the course.
You will receive DASVM Technologies recognized course completion certification & we will help you to crack global certification with our training.
Yes, DASVM Technologies provides corporate trainings with Course Customization, Learning Analytics, Cloud Labs, Certifications, Real time Projects with 24x7 Support.
Yes, DASVM Technologies provides group discounts for its training programs. Depending on the group size, we offer discounts as per the terms and conditions.
We accept all major kinds of payment options. Cash, Card (Master, Visa, and Maestro, etc), Wallets, Net Banking, Cheques and etc.
DASVM Technologies has a no refund policy. Fees once paid will not be refunded. If the candidate is not able to attend a training batch, he/she is to reschedule for a future batch. Due Date for Balance should be cleared as per date given. If in case trainer got cancelled or unavailable to provide training DASVM will arrange training sessions with other backup trainer.
Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.
Please Contact our course advisor +91-99003 49889. Or you can share your queries through info@dasvmtechnologies.com
