تفاصيل الدورة
Introduction to Kali:Overview of Linux OS
Brief history and overview of Kali Linux
Overview of Kali tools and utilities
Managing Kali Linux Services: Default root password, SSH, HTTP
Bash Introduction
Hands-on exercise - Basic Linux usage: working with terminal (command line), using utilities for file and process viewing/manipulation
Hands-on exercise – Manipulating text files on Linux command line
Python Introduction
Hands-on-exercise - Python Introduction
Essential Tools:
Netcat
Connecting to a TCP/UDP Port
Listening on a TCP/UDP Port
Hands-on exercise – Dealing with Netcat the TCP/IP Swiss Army Knife
Wireshark
Wireshark Basics, Making Sense of Network Dumps, Capture and Display Filters, Following TCP Streams
Hands-on exercise - Examine the traffic and capture password spray attack
Passive Information Gathering:
Open Web Information Gathering using Google Hacks
Email Harvesting
Additional resources like Netcraft, Whois Enumeration
Hands-on exercise - Collecting information about your target using publicly available information
Information Gathering
DNS analysis
Interacting with a DNS Server, Automating Lookups, Forward Lookup Brute Force, Reverse Lookup Brute Force, DNS Zone Transfers
Hands-on exercise – Abusing DNS: dig, and dnsrecon to query DNS servers and performing reverse lookups
Port Scanning
Port scanning techniques
Service identification
Using Nmap efficiently
Hands-on exercise - Port Scanning with Nmap: performing basic TCP, UDP, ping, and OS fingerprinting scans with Nmap
Hands-on exercise – Stealthy Scanning: using Nmap timing options, SYN, and idle scanning techniques
Hands-on exercise – Service Identification: using telnet, netcat, and Nmap –sV scans to identify running services
SNMP analysis
Hands-on exercise – Abusing SNMP: cracking SNMP community strings and enumerating information via SNMP
SMTP Analysis
Hands-on exercise - be familiar with mail server
SMB Analysis
Hands on exercise - Scanning for the NetBIOS Service, Null Session Enumeration
Hands-on exercise – Nmap Scripting Engine (NSE): using NSE to gather detailed information about network hosts
Vulnerability Scanning:
Vulnerability Scanning with Nmap
The OpenVAS Vulnerability Scanner, Nessus
Hands-on exercise – Starting Investigation
Buffer Overflows:
Fuzzing
Win32 Buffer Overflow Exploitation
Replicating the Crash
Controlling EIP: Binary Tree Analysis or Sending a Unique String
Locating Space for Your Shellcode, Checking for Bad Characters
Redirecting the Execution Flow, Finding a Return Address
Generating Shellcode with Metasploit, getting a Shell, Improving the Exploit
Hands-on exercise – Exploiting SLMail and get shell over the system
Working with Exploits:
Searching for Exploits in Kali Linux and from the Web
Customizing and Fixing Exploits using a Development Environment and Dealing with Various Exploit Code Languages
Hands-on exercise – Fix and compile to exploit your SLMail
File Transfers:
Evading Antivirus Software
File Transfer Methods using FTP, Python, nc
Hands-on exercise – Creating in Windows
Privilege Escalation:
Privilege Escalation Exploits
Configuration Issues as Incorrect File and Service Permissions
Hands-on exercise – Bypassing UAC on Windows
Hands-on exercise – Udev Privilege Escalation on Linux
Client-Side Attacks:
Browser Exploitation
PDF Exploitation
Hands-on exercise – MS12-037 Internet Explorer 8 Fixed Col Span ID
Web Application Attacks:
Common Web Application Vulnerabilities and Attacks like XSS, File Inclusion, SQL Injection
Overview of Kali Web Applications Tools
Dealing with Proxy: Burp Suite
Hands-on exercise – Unvalidated Parameters: using Burp Suite to intercept and modify HTTP POST requests
Hands-on exercise – Cross-Site Scripting (XSS): performing a stored XSS attack
Hands-on exercise – Basic SQL Injection: performing a SQL injection attack using common techniques
Password Attacks:
Types of Password Attacks
Overview of Kali Password Attacks Tools like Hydra, Medusa, Ncrack
Password Profiling and Mutating
Hands-on exercise - Using Cewl and Crunch to get effective password list
Hands-on exercise – Post-exploit Password Cracking: dumping password hashes from a compromised system and cracking hashed passwords with John the Ripper
Port Redirection and Tunneling:
Port Forwarding/Redirection
SSH Tunneling using Local Port Forwarding, Remote Port Forwarding, Dynamic Port Forwarding
Proxychains
Hands-on exercise – Efficient Pivoting and moving between machines
Exploit Framework/Metasploit:
Metasploit Overview
Metasploit Auxiliary, Modules and Payloads
Hands-on exercise - Exploiting Vulnerable Services: using a Metasploit exploit module to gain access to a remote system
Hands-on exercise – Additional Payloads: using Metasploit and Meterpreter payloads on a compromised system
Hands-on exercise – Revisiting Client-side Attacks
تحديث بتاريخ 20 July, 2020
المتطلبات
Students should be familiar with Linux command line
A solid understanding of TCP/IP and various network services (DNS, DHCP, etc.).
Knowledge of a scripting language (Perl, Python, Ruby) is recommended, but not required.
A solid understanding of information security concepts is required.
وظائف مناسبة لهذه الدورة
Security Penetration Testing , Penetration Tester , Certified Penetration Testerالموقع
نبذة عن معهد CLS Learn
Since 1995, CLS Learning solutions is leading the technology learning market in Egypt, the Middle East, and Africa. With our wide network of international partners, trainers, instructors, and technology leaders; we are able to deliver top notch training programs to our students and technology professionals.
25 Years in the market.
We delivered over 4,200 courses to 63,500 professionals in our centers.
We delivered 1,200 courses to 18,240 corporate employees on Site.
عرض الجميع دورات CLS Learn- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at Laimoonدرهم 1,449مدة الدورة التدريبية: Upto 30 Hours
- Complete Cyber Security St. Paul's College630 جنيه مصري
6,597 جنيه مصريمدة الدورة التدريبية: Upto 2 Days - Cyber Security Complete Bundle Apex Learning1,198 جنيه مصري
24,359 جنيه مصريمدة الدورة التدريبية: Upto 3 Hours