Visão Geral
Neste curso aprenderá como detectar vulnerabilidades em sistemas, redes, anfitriões e conhecimento de várias técnicas de penetração de rede.
Conteúdo Programatico
Introduction
- Disclaimer
- Trends & Metrics
Wireshark
- ICMP Packet Analysis
- ARP Packet Analysis
- 3 way handshake Analysis
- Tracert Command Analysis
- Packet Forensics
- Nmap Packet Forensics
NMAP Basics
- Network Sweeping
- OS Discovery
- SYN Scan
- UDP Scan
- XMAS Scan
- FIN Scan
- NULL Scan
Nmap Firewall Scan
- Fragment Scan
- Data Length Scan
- TTL Scan
- Source Port Scan
- Decoy Scan
- Spoof IP Scan
- Spoof IP Scan
- Data String Scan
- Hex String Scan
- IP Options Scan
Metasploit
- Metasploit Basic
- Auxiliary scanner
- Windows Reverse TCP
- Windows HTTPS Tunnel
- Hidden Bind TCP
- Macro Payloads
- Shell on the Fly (Transport)
- Bypass User Access Control
- Pass the Hash
- Post Exploitation
Dictionary & Passwords Attacks
- Hydra
- Medussa
- Crunch
- CeWL
- WCE
- Mimikatz
- cUPP
- Online attacks
FTP Penetration Testing (Port 21)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Pivoting/Tunneling [windows]
SSH Penetration Testing (Port 22)
- Pivoting/Tunneling
- Multiple way to secure ssh
SMTP Penetration Testing (Port 25)
- Penetration testing with SWAKS
DNS & DHCP Penetration Testing (Port 53, 67, 68)
- DNS Enumeration
- DHCP Packet Analysis with Wireshark
- DHCP Starvation attack
- Rogue DHCP Server
- Tools (Gobbler, responder, Yersinia)
NetBIOS & SMB Penetration Testing (Port 135-445)
- SMB Enumeration
- SMB Null Sessions
- Enum4Linux
- NetBIOS Spoofing
- Penetration Testing with (PS exec, eternal blue )
- Multiple way to connect smb
SNMP Penetration Testing (Port 161, 162)
- Penetration Testing with Metasploit and Nmap
MSSQL Penetration Testing (Port 1433)
- MSSQL Brute force Attack
- Enumerate MSSQL configuration setting
- Identifying SQL Server logins
- Identify Database owner
- Identify a User With masquerade privilege
- Execute SQL Statement
- Retrieve MSSQL Password Hashes of Users
- Decode Password Hashes of Users
- Extracting MYSQL Schema Information
MySQL Penetration Testing (Port 3306)
- Introduction and Lab setup
- MYSQL Brute Force Attack
- mysql banner user/file/ Enumeration
- Stealing MYSQL information
- Check File Privileges
- Enumerate MYSQL writeable directories
- Extract MYSQL Username with Hash Password
- Crack Hash Password with John the Ripper
- Secure MYSQL through port forwarding
- Prevent Mysql against brute force attack
Remote Desktop Penetration Testing (Port 3389)
- DOS Attack
Sniffing & Spoofing
- MAC Address Snooping
- DNS Spoofing
- DNS Poisoning
- Capture NTLM Hashes
- Xerosploit
Socks Proxy Penetration Testing
- Socks proxy lab setup
- FTP
IDS, Firewall, Honeypots
- Setup Snort Lab in Ubuntu
- Introduction to Windows Firewal
- ICMP Detect
- TCP Packet Detect
- Detect Nmap Scan
- Detect Dos Attack
- Antivirus Evasion with veil
DOS Attack Penetration Testing
- Introduction to DOS Attack
- Botnet
- D-DOS Attack
- UDP Flood
- Smurf Attack
- Packet Crafting
- Others DOS Attack Tools
Social Engineering Attack
- Introduction to Social Engineering Attack
- Payload and Listener Attack
- HTA Attack
- MSFPC
- PowerShell Attack Vector
- VNC Attack
Covering Tracks & Maintaining access
- Persistence
- s4u_persistence
- VSS_Persistence
- Registry Persistence
- Clear Event Logs
Network Vulnerability Assessment Tool
- GFI Languard
- Nexpose
- Openvas
- MBSA