Curso Penetration Testing with Kali Linux
32 horasVisão Geral
Curso Penetration Testing with Kali Linux, é um curso de teste de penetração desenvolvido para administradores de rede e profissionais de segurança que desejam dar um passo sério e significativo no mundo dos testes de penetração profissionais.
Este Curso Penetration Testing with Kali Linux, apresenta aos alunos as mais recentes ferramentas e técnicas de hacking ético, incluindo laboratórios de teste de penetração remotos e virtuais para praticar os materiais do curso. O teste de penetração com o Kali Linux simula um teste de penetração completo do início ao fim, injetando o aluno em um ambiente de rede rico em alvos, diversificado e vulnerável.
Objetivo
Após realizar este Curso Penetration Testing with Kali Linux, você será capaz de:
- Teste de penetração com Kali Linux: informações gerais do curso
- Ficando confortável com o Kali Linux
- Linha de comando divertida
- Ferramentas Práticas
- Script Bash
- Coleta passiva de informações
- Coleta ativa de informações
- Verificação de Vulnerabilidade
- Ataques de aplicativos da Web
- Introdução aos estouros de buffer
- Estouros de Buffer do Windows
- Estouros de buffer do Linux
- Ataques do lado do cliente
- Localizando Exploits Públicos
- Corrigindo exploits
- Transferências de arquivos
- Evasão de antivírus
- Escalação de Privilégios
- Ataques de senha
- Redirecionamento de portas e tunelamento
- Ataques do Active Directory
- A Estrutura do Metasploit
- Império do PowerShell
- Montando as peças: detalhamento do teste de penetração
- Tentando mais: os laboratórios
Publico Alvo
- Hackers éticos
- Especialistas em TI
Pre-Requisitos
- Teste de penetração com Kali Linux é um curso básico, mas ainda requer que os alunos tenham certo conhecimento antes de assistir à aula online
- É necessário um conhecimento sólido de TCP/IP, rede e habilidades razoáveis em Linux.
- A familiaridade com o script Bash junto com o Perl ou Python básico é considerada uma vantagem.
Materiais
Inglês + Exercícios + Lab PraticoConteúdo Programatico
- Penetration Testing with Kali Linux: General Course Information
- About The PWK Course
- Overall Strategies for Approaching the Course
- Obtaining Support
- About Penetration Testing
- Legal
- The MegaCorpone.com and Sandbox.local Domains
- About the PWK VPN Labs
- Reporting
- About the OSCP Exam
- Wrapping Up
- Getting Comfortable with Kali Linux
- Booting Up Kali Linux
- The Kali Menu
- Kali Documentation
- Finding Your Way Around Kali
- Managing Kali Linux Services
- Searching, Installing, and Removing Tools
- Wrapping Up
- Command Line Fun
- The Bash Environment
- Piping and Redirection
- Text Searching and Manipulation
- Editing Files from the Command Line
- Comparing Files
- Managing Processes
- File and Command Monitoring
- Downloading Files
- Customizing the Bash Environment
- Wrapping Up
- Practical Tools
- Netcat
- Socat
- PowerShell and Powercat
- Wireshark
- Tcpdump
- Wrapping Up
- Bash Scripting
- Intro to Bash Scripting
- If, Else, Elif Statements
- Boolean Logical Operations
- Loops
- Functions
- Practical Examples
- Wrapping Up
- Passive Information Gathering
- Taking Notes
- Website Recon
- Whois Enumeration
- Google Hacking
- Netcraft
- Recon-ng
- Open-Source Code
- Shodan
- Security Headers Scanner
- SSL Server Test
- Pastebin
- User Information Gathering
- Social Media Tools
- Stack Overflow
- Information Gathering Frameworks
- Wrapping Up
- Active Information Gathering
- DNS Enumeration
- Port Scanning
- SMB Enumeration
- NFS Enumeration
- SMTP Enumeration
- SNMP Enumeration
- Wrapping Up
- Vulnerability Scanning
- Vulnerability Scanning Overview and Considerations
- Vulnerability Scanning with Nessus
- Vulnerability Scanning with Nmap
- Wrapping Up
- Web Application Attacks
- Web Application Assessment Methodology
- Web Application Enumeration
- Web Application Assessment Tools
- Exploiting Web-based Vulnerabilities
- Extra Miles
- Wrapping Up
- Introduction to Buffer Overflows
- Introduction to the x Architecture
- Buffer Overflow Walkthrough
- Wrapping Up
- Windows Buffer Overflows
- Discovering the Vulnerability
- Win Buffer Overflow Exploitation
- Wrapping Up
- Linux Buffer Overflows
- About DEP, ASLR, and Canaries
- Replicating the Crash
- Controlling EIP
- Locating Space for Our Shellcode
- Checking for Bad Characters
- Finding a Return Address
- Getting a Shell
- Wrapping Up
- Client-Side Attacks
- Know Your Target
- Leveraging HTML Applications
- Exploiting Microsoft Office
- Wrapping Up
- Locating Public Exploits
- A Word of Caution
- Searching for Exploits
- Putting It All Together
- Wrapping Up
- Fixing Exploits
- Fixing Memory Corruption Exploits
- Fixing Web Exploits
- Wrapping Up
- File Transfers
- Considerations and Preparations
- Transferring Files with Windows Hosts
- Wrapping Up
- Antivirus Evasion
- What is Antivirus Software
- Methods of Detecting Malicious Code
- Bypassing Antivirus Detection
- Wrapping Up
- Privilege Escalation
- Information Gathering
- Windows Privilege Escalation Examples
- Linux Privilege Escalation Examples
- Wrapping Up
- Password Attacks
- Wordlists
- Brute Force Wordlists
- Common Network Service Attack Methods
- Leveraging Password Hashes
- Wrapping Up
- Port Redirection and tunneling
- Port Forwarding
- SSH tunneling
- PLINK.exe
- NETSH
- HTTP Tunnelling Through Deep Packet Inspection
- Wrapping Up
- Active Directory Attacks
- Active Directory Theory
- Active Directory Enumeration
- Active Directory Authentication
- Low and Slow Password Guessing
- Active Directory Lateral Movement
- Active Directory Persistence
- Wrapping Up
- The Metasploit Framework
- Metasploit User Interfaces and Setup
- Exploit Modules
- Metasploit Payloads
- Building Our Own MSF Module
- Post-Exploitation with Metasploit
- Metasploit Automation
- Wrapping Up
- PowerShell Empire
- Installation, Setup, and Usage
- PowerShell Modules
- Switching Between Empire and Metasploit
- Wrapping Up
- Assembling the Pieces: Penetration Test Breakdown
- Public Network Enumeration
- Targeting the Web Application
- Targeting the Database
- Deeper Enumeration of the Web Application Server
- Targeting the Database Again
- Targeting Poultry
- Internal Network Enumeration
- Targeting the Jenkins Server
- Targeting the Domain Controller
- Wrapping Up
- Trying Harder: The Labs
- Real Life Simulations
- Machine Dependencies
- Cloned Lab Machines
- Unlocking Networks
- Routing
- Machine Ordering & Attack Vectors
- Firewall / Routers / NAT
- Passwords