Course Overview
Penetration Testing with Kali Linux, is a unique penetration course course that combines traditional course materials with hands-on simulations, using a virtual lab environment.
Who should attend
- Infosec professionals transitioning into penetration testing
- Pentesters seeking one of the best pentesting certifications
- Those interested in pursuing a penetration tester career path
- Security professionals
- Network administrators
- Other technology professionals
Prerequisites
All students are required to have:
- Solid understanding of TCP/IP networking
- Reasonable Windows and Linux administration experience
- Familiarity of Bash scripting with basic Python or Pearl a plus
Course Objectives
- Using information gathering techniques to identify and enumerate targets running various operating systems.
- Writing basic scripts and tools to aid in the penetration testing process
- Analyzing, correcting, modifying, cross-compiling and porting public exploit code
- Conducting remote, local privilege escalation and clientside attacks
- Identifying and exploiting XSS, SQL injection and file inclusion vulnerabilities in web applications
- Leveraging tunneling techniques to pivot between networks
- Creative problem solving and lateral thinking skills
Outline: Penetration Testing with Kali Linux (PTKL)
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- Command Line Fun
- Practical Tools
- Bash Scripting – NEW in 2020
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Buffer Overflow Intro
- Windows Buffer Overflows
- Linux Buffer Overflow
- Client Side Attacks
- Using Public Exploits
- Fixing Exploits
- File Transfers
- Bypassing Antivirus Software
- Privilege Escalation
- Password Attacks
- Port Redirection and Tunneling
- Metasploit
- Active Directory attacks (Domains)
- PowerShell Empire
- Assembling the Pieces: Penetration Test Breakdown