logo

Kali Linux 2: Windows Penetration Testing (CS8511)

This course has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important.

Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions, you will be able to quickly pen test your system and network.

Pohađajte naše hacking/cyber defense obuke u Beogradu, putem virtuelne učionice (online, uživo) ili u vašim prostorijama (on-site).

Specijalni popusti se odobravaju prilikom prijave više učesnika koji istovremeno pohađaju obuku iz vaše kompanije, državni i neprofitni sektor, itd. Kontaktirajte nas da biste saznali više.

Termini obuke

Trajanje obuke: 
3 dana / 21 sat

Privatni trening

On-site / Online
Minimalan broj polaznika: 3
3 dana / 21 sat
Cena na zahtev
srpski ili engleski
Plan obuke: 

Module 1: Sharpening the Saw

  • Installing Kali Linux to an encrypted USB drive
  • Running Kali from the live CD
  • Installing and configuring applications
  • Setting up and configuring OpenVAS
  • Reporting the tests
  • Running services on Kali Linux
  • Exploring the Kali Linux Top 10 and more

Module 2: Information Gathering and Vulnerability Assessment

  • Footprinting the network
  • Where can you find instructions on this thing?
  • A return to OpenVAS
  • Using Maltego
  • Using Unicorn-Scan
  • Monitoring resource use with Htop
  • Monkeying around the network

Module 3: Exploitation Tools (Pwnage)

  • Choosing the appropriate time and tool
  • Choosing the right version of Metasploit
  • Starting Metasploit
  • Creating workspaces to organize your attack
  • Using the hosts and services commands
  • Using advanced footprinting
  • Using the pivot
  • Creating the attack path

Module 4: Web Application Exploitation

  • Surveying the webscape
  • Arm yourself with Armitage
  • Zinging Windows servers with OWASP ZAP
  • Search and destroy with Burp Suite

Module 5: Sniffing and Spoofing

  • Sniffing and spoofing network traffic
  • Sniffing network traffic
  • Spoofing network traffic

Module 6: Password Attacks

  • Password attack planning
  • My friend Johnny
  • John the Ripper (command line)
  • xHydra
  • Adding a tool to the main menu in Kali 2.x

Module 7: Windows Privilege Escalation

  • Gaining access with Metasploit
  • Replacing the executable
  • Local privilege escalation with a standalone tool
  • Escalating privileges with physical access
  • Weaseling in with Weevely

Module 8: Maintaining Remote Access

  • Maintaining access
  • Maintaining access with Ncat
  • The Dropbox
  • Cracking the NAC (Network Access Controller)
  • Creating a Spear-Phishing Attack with the Social Engineering Toolkit
  • Using Backdoor-Factory to Evade Antivirus

Module 9: Reverse Engineering and Stress Testing

  • Setting up a test environment
  • Reverse engineering theory
  • Working with Boolean logic
  • Practicing reverse engineering
  • Stresstesting Windows

Module 10: Forensics

  • Getting into Digital Forensics
  • Exploring Guymager
  • Diving into Autopsy
  • Mounting image files
Benefiti: 
  • Video snimak predavanja u periodu od 180 dana posle kraja obuke

  • Pristup laboratorijama u toku trajanja kursa
  • Materijal u elektronskom obliku

  • Sertifikat o pohađanju kursa

Kontaktirajte nas za više informacija o ceni:

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 69 3138 100
E-mail: Ivana.Velickovic@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 65 2390 001
E-mail: Jelena.Der@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs