Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that a hacker could target. Penetration testing can be automated with software applications or performed manually.
ADVANCE Network Penetration Testing [NPT]
Introduction to Networking Security
About Penetration Testing
Networking security consists of the provisions and policies adopted by a Networking administrator to prevent and monitor unauthorized access, misuse, modification, or resources.
Pentration Testing Lab Setup
As per as to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Setup VMware, OSs on it using Bridge Connection.
Deep Information Gathering
1. Passive Information Gathering in depth.
2. Scanning target using nmap advanced features.
3. Vulnerability Scanning.
Getting into System
1. Exploiting Windows and Linux System
2. Application of Metasploit
3. Creating malicious files (standalone binaries) using msfvenom
4. Outgoing through browser
5. Evading Antivirus
6. Bruteforcing on Ports
7. Exploiting using different File Format
Sniffing & MITM
Studying ARP, RARP, how it works and how it can be modify to mount sophisticated outgoings is made extremely easy to understand. The Sniffing is a technique that you will be able to fully grasp in its most practical aspects.
Experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal Networking through advanced Post exploitation techniques. Once the candidate is comfortable with most recent exploitation techniques, will be exposed to the cyclic steps of a successful Post exploitation phase.
Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.
Social engineering module will guide you through the most modern social engineering outgoing techniques. Real world outgoings will be illustrated by exploiting the potential of social Network such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field
Pentesting With Metasploit
In this module, the candidate will study the Metasploit architecture and the framework, and will learn how to create, add or modify custom Metasploit modules. Thanks to our virtual labs, the candidate will also have the chance to practice against real vulnerable machines.
After the target Networking has been identified, the next step is to configure our apps in order to sniff and intercept the traffic. This is a very important step for all the outgoings that come here after.
Outgoinging Wireless Networking
The following module focuses on the outgoings that can be executed on Wireless Network. The candidate will learn how to outgoing and access remote Wireless Network, obtain keys, password and more, as per as to their configuration and security mechanism. We will first start exploring the outgoings against WEP and then focus our tests on more secure Network: WPA, WPA2 and WPS.
Wireless as an outgoing Vector
In the last module, of the Wireless section, the candidate will learn how to use Wireless as an outgoing vector. It means that we will not outgoing Wireless Network, instead we will use Wireless in order to create fake Network, obtain credentials, run MitM outgoings and more