Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Python in Depth
- Strings and expressions.
- Functions and conditionals.
- Variables and lists.
Penetration Testing
- What is penetration testing?
- The five phases of penetration testing.
Overview of Kali Linux
- Kali deployments.
- Exploit methods.
- The Kali menu and toolbox.
Preparing the Development Environment
- Installing a virtual machine.
- Installing and configuring Kali Linux.
- Installing and configuring Python Kali Linux.
- Setting up a Lab Box.
System Shells
- Using Weevely.
- Generating shellcode with MSFvenom.
- Injecting images with jhead.
- Using shellcode in exploits.
Python and Kali Linux
- Creating a penetration program with Python.
- Working with TCP Client and TCP Service.
- Using raw binary packets.
- Port scanning with NMAP.
Mapping
- Applying sniffing methods.
- Using SQL injection: offensive and defensive.
- Implementing brute force methods.
Metasploitable
- Targeting Metasploitable.
- Exploiting the distributed compile system.
- Exploiting network files.
- Gaining root access.
End-to-End Testing
- Exploiting with EternalBlue.
- Using Devel exploits.
- Using Kronos exploits.
Summary and Conclusion
Requirements
- Familiarity with network vulnerabilities.
Target Audience
- Penetration Testers.
- Security Engineers.
- Ethical Hackers.
14 Hours
Testimonials (2)
The knowledge and the patience from the trainer to answer to our questions.
Calin Avram - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
The availability of the virtual desktop as form of sandbox for the participants to tinker with is great!