The agenda of this training will be the following :
Day 1 - Basics
- Introduction to Kali Linux
- Active and Passive Recon
- Scanning and Enumeration
- Vulnerability Mapping
- Exploitation with Metasploit
- Man-in-the-Middle Attacks
- Pivoting and Post-Exploitation
- Offline Password Cracking
- Hacking Wireless Networks
Day 2 - Advanced
- Advanced Password Attacks
- Pass-the-Hash Techniques
- Kerberos Token Impersonation
- Extracting Windows Credentials
- Hacking WPA/WPA2/WPS
- Rogue Access Points
- Device: the WiFi Pineapple
- Anatomy of an Exploit
- Hacking Windows 10/2012
- Malware and Social Engineering
- Client-Side Exploits (e.g. Flash)
- Attacking Mobile Devices
Day 3 - Web Applications
- Introduction to Web Applications
- Pentesting and Methodologies
- OWASP and the Top 10 Risks
- Vulnerabilities and Exploitation
- Post-Exploitation and Webshells
- Local Privilege Escalations
- Vulnerability Detection
- Web Application Scanners
- Intercepting Proxies
- Web Server Hardening
Prerequisites :
- Own laptop is required (!)
- Windows, Mac OS X, or Linux
- Administrator privileges
- Ethernet and USB interface
- Ability to disable AV and IPS
- VMware Player/Fusion installed
- Basic knowledge in TCP/IP
This training will be held at abnetwork.