Exam Objective:

Session 01: Getting Comfortable with Kali Linux

Session 02: The Essential Tools

Session 03: Passive Information Gathering

Session 04: Active Information Gathering

Session 05: Vulnerability Scanning

Session 06: Buffer Overflow

Session 07: Win32 Buffer Overflow Exploitation

Session 08: Linux Buffer Overflow Exploitation

Session 09: Working with Exploits

Session 10: File Transfers

Session 11: Privileges Escalation

Session 12: Client Side Attacks

Session 13: Web Application Attacks

Session 14: Password Attacks

Session 15: Port Redirection and Tunneling

Session 16: The Metasploit Framework

Session 17: Bypassing Antivirus Software

Session 18: Assembling the Pieces: Penetration Test Breakdown

Detailed Syllabus:

Session 01: Getting Comfortable with Kali Linux

Finding your way around Kali
Managing Kali Linux Services
The Bash Environment
Intro to Bash Scripting

Session 02: The Essential Tools

Netcat
Ncat
Wireshark
Tcpdump

Session 03: Passive Information Gathering

Open web Information Gathering
Email Harvesting
Additional Resources
Recon-ng

Session 04: Active Information Gathering

DNS Enumeration
Port Scanning
SMB Enumeration
SMTP Enumeration
SNMP Enumeration

Session 05: Vulnerability Scanning

Vulnerability Scanning with Nmap
The OpenVAS Vulnerability Scanner

Session 06: Buffer Overflow

Fuzzing

Session 07: Win32 Buffer Overflow Exploitation

Replicating the Crash
Controlling EIP
Locating Space for Your Shellcode
Checking for Bad Characters
Redirecting the Execution Flow
Generating Shellcode with Metasploit
Getting a Shell
Improving the Exploit

Session 08: Linux Buffer Overflow Exploitation

Setting Up the Environment
Crashing Crossfire
Controlling EIP
Finding Space for Our Shellcode
Improving Exploit Reliability
Discovering Bad Characters
Finding a Return Address

Session 09: Working with Exploits

Searching for Exploits
Customizing and Fixing Exploits

Session 10: File Transfers

A Word About Anti Virus Software
File Transfer Methods

Session 11: Privileges Escalation

Privilege Escalation Exploits
Configuration Issues

Session 12: Client Side Attacks

Know Your Target
MS12-037- Internet Explorer 8 Fixed Col Span ID
Java Signed Applet Attack

Session 13: Web Application Attacks

Essential Iceweasel Add-ons
Cross Site Scripting (XSS)
File Inclusion Vulnerabilities
MySQL SQL Injection
Web Application Proxies
Automated SQL Injection Tools

Session 14: Password Attacks

Preparing for Brute Force
Online Password Attacks
Password Hash Attacks

Session 15: Port Redirection and Tunneling

Port Forwarding/Redirection
SSH Tunneling
Proxychains
HTTP Tunneling
Traffic Encapsulation

Session 16: The Metasploit Framework

Metasploit User Interfaces
Setting up Metasploit Framework on Kali
Exploring the Metasploit Framework
Auxiliary Modules
Exploit Modules
Metasploit Payloads
Building Your Own MSF Module
Post Exploitation with Metasploit

Session 17: Bypassing Antivirus Software

Encoding Payloads with Metasploit
Crypting Known Malware with Software Protectors
Using Custom/Uncommon Tools and Payloads

Session 18: Assembling the Pieces: Penetration Test Breakdown

Phase 0 – Scenario Description
Phase 1 – Information Gathering
Phase 2 – Vulnerability Identification and Prioritization
Phase 3 – Research and Development
Phase 4 – Exploitation
Phase 5 – Post-Exploitation

If You Like What We Do Here On PentesterWorld, You Should Consider:

Stay Connected to: Twitter | Facebook

Subscribe to our email updates: Sign Up Now

 

We are thankful for your support.