About This Course
Skills You’ll Get
Interactive Lessons
20+ Interactive Lessons | 5+ Exercises |
Gamified TestPrep
Hands-On Labs
22+ LiveLab | 00+ Minutes
1
Preface
- Who this course is for
- What this course covers
- To get the most out of this course
2
Introduction to Ethical Hacking
- Understanding the need for cybersecurity
- Exploring cybersecurity terminology
- Identifying threat actors and their intent
- Understanding what matters to threat actors
- Exploring the importance of penetration testing
- Penetration testing methodologies
- Discovering penetration testing approaches
- Types of penetration testing
- Exploring the phases of penetration testing
- Understanding the Cyber Kill Chain framework
- Summary
3
Building a Penetration Testing Lab
- Technical requirements
- An overview of the lab setup and technologies used
- Setting up a hypervisor and virtual networks
- Setting up and working with Kali Linux
- Setting up a vulnerable web application
- Deploying Metasploitable 2 as a vulnerable machine
- Building and deploying Metasploitable 3
- Summary
4
Setting Up for Advanced Penetration Testing Techniques
- Technical requirements
- Building an Active Directory red team lab
- Setting up a wireless penetration testing lab
- Summary
5
Passive Reconnaissance
- Technical requirements
- The importance of reconnaissance
- Exploring passive reconnaissance
- Creating a sock puppet
- Anonymizing internet-based traffic
- Summary
6
Exploring Open-Source Intelligence
- Technical requirements
- Google hacking techniques
- Domain reconnaissance
- Sub-domain harvesting
- Identifying organizational infrastructure
- Harvesting employees’ data using Hunter
- Automating social media reconnaissance with Sherlock
- Summary
7
Active Reconnaissance
- Technical requirements
- Understanding active information
- Profiling websites using EyeWitness
- Exploring active scanning techniques
- Using scanning evasion techniques
- Enumerating network services
- Discovering data leaks in the cloud
- Summary
8
Performing Vulnerability Assessments
- Technical requirements
- Getting started with Nessus
- Vulnerability identification using Nmap
- Working with Greenbone Vulnerability Manager
- Using web application scanners
- Summary
9
Understanding Network Penetration Testing
- Technical requirements
- Introduction to network penetration testing
- Working with bind and reverse shells
- Antimalware evasion techniques
- Working with wireless adapters
- Managing and Monitoring wireless modes
- Summary
10
Performing Network Penetration Testing
- Technical requirements
- Exploring password-based attacks
- Performing host discovery
- Identifying and exploiting vulnerable services
- Summary
11
Post-Exploitation Techniques
- Technical requirements
- Pass-the-hash techniques
- Post exploitation using Meterpreter
- Data encoding and exfiltration
- Summary
12
Delving into Command and Control Tactics
- Technical requirements
- Understanding C2
- Setting up C2 operations
- Post-exploitation using Empire
- Working with Starkiller
- Summary
13
Working with Active Directory Attacks
- Technical requirements
- Understanding Active Directory
- Enumerating Active Directory
- Leveraging network-based trust
- Summary
14
Advanced Active Directory Attacks
- Technical requirements
- Understanding Kerberos
- Abusing trust on IPv6 with Active Directory
- Attacking Active Directory
- Domain dominance and persistence
- Summary
15
Advanced Wireless Penetration Testing
- Technical Requirements
- Introduction to Wireless Networking
- Performing Wireless Reconnaissance
- Compromising WPA/WPA2 Networks
- Performing AP-less Attacks
- Exploiting Enterprise Networks
- Setting Up a Wi-Fi Honeypot
- Exploiting WPA3 Attacks
- Summary
16
Social Engineering Attacks
- Technical requirements
- Fundamentals of social engineering
- Types of social engineering
- Planning for each type of social engineering attack
- Defending against social engineering
- Exploring social engineering tools and techniques
- Summary
17
Understanding Website Application Security
- Technical requirements
- Understanding web applications
- Exploring the OWASP Top 10: 2021
- Getting started with FoxyProxy and Burp Suite
- Understanding injection-based attacks
- Exploring broken access control attacks
- Discovering cryptographic failures
- Understanding insecure design
- Exploring security misconfiguration
- Summary
18
Advanced Website Penetration Testing
- Technical requirements
- Identifying vulnerable and outdated components
- Exploiting identification and authentication failures
- Understanding software and data integrity failures
- Exploring server-side request forgery
- Understanding security logging and monitoring failures
- Understanding cross-site scripting
- Automating SQL injection attacks
- Performing client-side attacks
- Summary
19
Best Practices for the Real World
- Technical requirements
- Guidelines for penetration testers
- Penetration testing checklist
- Creating a hacker’s toolkit
- Setting up remote access
- Next steps ahead
- Summary
A
Appendix
- Setting Up a Penetration Testing Lab on Ubuntu Desktop
- Technical requirements
- An overview of the lab setup and technologies used
- Setting up a hypervisor and virtual networks
- Setting up Kali Linux on Ubuntu
- Setting up Metasploitable 3 on Ubuntu
- Summary
1
Building a Penetration Testing Lab
- Setting Up a Vulnerable Web Application
2
Passive Reconnaissance
- Setting Up TOR Services and TOR Browser on Kali Linux
- Setting Up Proxychains
3
Exploring Open-Source Intelligence
- Performing Automation using SpiderFoot
- Exploiting DNS Zone Transfer
- Performing DNS Enumeration
- Using DNSRecon for DNS Enumeration
- Performing Sub-domain Enumeration with Knockpy
- Performing Enumeration with DNSMap
- Performing Live Host Discovery
- Using Netcraft to profile a targeted organization/domain
- Using theHarvester for Data Collection
- Using the Hunter tool
4
Active Reconnaissance
- Changing MAC Address using MAC Changer
5
Understanding Network Penetration Testing
- Setting Up Bind and Reverse Shells
- Working with Remote Shells Using Netcat
6
Performing Network Penetration Testing
- Performing Host Discovery on a Targeted Network
7
Post-Exploitation Techniques
- Working with Impacket for Pass-the-Hash Attack
8
Delving into Command and Control Tactics
- Performing Penetration Testing with Empire Server and Starkiller
9
Advanced Active Directory Attacks
- Abusing Trust on IPv6 with Active Directory
10
Understanding Website Application Security
- Setting Up Burp Suite for Web Application Security
- Setting Up FoxyProxy for Proxy Configuration
11
Advanced Website Penetration Testing
- Identifying Vulnerable and Outdated Components