Network Pentest Course 1692353982

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

NETWORK

PENETRATION TESTING

www.ignitetechnologies.in
ABOUT
Well-Known Entity for Offensive Security

{Training and Services}

ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out
to be a trusted brand in cyber security training and services

WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
BENEFITS
Gain Exposure to Real-Time Pentesting in-depth
This course meets the requirements of NIST, MITRE ATTACK
Building in-house lab for threat hunting
Gain in-depth knowledge of Network Threats
Hands-on exposure to Network Pentest tools.
Latest attack such as zero day exploit.

WHO SHOULD JOIN ?


If you are an ethical hacker with Basic knowledge
If you are a Network Security Engineer
if you managed NOC and SOC
If you are an Information Security Analyst
If you are a Team leader of the Cyber Security Department
If you handle the pre-sell department for VAPT services
If you are a backend developer
If you are a system administrator

PREREQUISITES
The candidate should have a basic understanding of Networking and also
know the fundamental approach of system hacking or ethical Hacking.
NETWORK PENETRATION TESTING
Network penetration testing is one of the most efficient methods in weeding out any loopholes
and underlying vulnerabilities in the network before it is compromised and can be exploited, by
performing attacks on the organization’s network infrastructure. Conducting a network pentest
also enables the enterprise to develop the appropriate mitigation and recovery strategies.

This course has been devised to up skill the security competency of an


IT professional/individual by imparting knowledge on the basics as well as advanced concepts
of Network Security & Organizational Infrastructure. One of the benefits of opting for this
course is the flexibility of the course structure which allows even an individual with little to no
technical skills to easily grasp the knowledge.

COURSE DURATION: 30 TO 40 HOURS


COURSE OVERVIEW

01. Network Basics

• TCP/IP Packet Analysis

• Overview of Network Security

• Port and Protocols Analysis

02. Penetration Testing • Windows Lab Setup

Framework Kali Linux • Linux Lab Setup

• Linux major services & commands


• Virtual Box
• Windows major services & commands
• VMware

• AWS | Google Cloud

03. Analyzing Network


Traffic

• Importance of Packet Analysis

• How to Capture Network Traffic

• Promiscuous Mode

04. Packet Analysis • Introduction to Wireshark


with Tshark • Filtering & Decoding Traffic

• Physical Data-Link Layer


• Introduction to Tshark
• Network Internet Layer
• Capture traffic
• Transport Host-Host Layer
• Promiscuous mode
• Application Layer
• Packet count

• Read and Write in a file

• Output formats

• Display filter

• Endpoints Analysis
05. Detecting Live Systems
& Analyzing Results

• Detecting Live Systems with ICMP

• Detecting Live Systems with TCP

• ICMP Packet Analysis

06. Nmap Advance Port • Traceroute


Scan

• Fragment Scan

• Data Length Scan

• TTL Scan

• Source Port Scan

• Decoy Scan 07. Metasploit


• TCP and UDP Port Scan Framework Hands-on
• Nmap Scan with Wireshark
• Metasploit Basic
• Nmap Output Scan
• Msfvenom
• OS Fingerprinting
• Auxiliary scanner
• Spoof IP Scan
• Windows Reverse TCP
• Spoof MAC Scan
• Windows HTTPS Tunnel
• Data String Scan
• Hidden Bind TCP
• Hex String Scan
• Macro Payloads
• IP Options Scan
• Shell on the Fly (Transport)

• Bypass User Access Control

• Pass the Hash

• Post Exploitation

08. Dictionary &


Passwords Attacks

• Hydra

• Medusa

• Crunch
09. FTP Penetration
• CeWL Testing
• cUPP

• Online Attacks • Introduction & Lab Setup

• Banner Grabbing

• Banner Hiding

• FTP Exploitation

• Brute Force & Password Cracking

• Prevent against brute force

• Remote Port Forwarding

• Pivoting
10. SSH Penetration
Testing

• Introduction & Lab Setup

• Banner Grabbing

• Banner Hiding
11. Telnet Penetration • Port Redirection
Testing • Brute Force & Password Cracking

• Prevent SSH Against Brute Force


• Introduction & Lab Setup
• SSH User Key Enumeration
• Banner Grabbing/Banner Hiding
• Stealing SSH RSA_KEY
• Port Redirection
• SSH Persistence
• Brute Force & Password Cracking
• Remote Port Forwarding
• Remote Port Forwarding
• SSH Tunneling
• Pivoting

12. SMTP Penetration


Testing

• Introduction & Lab setup

• Banner Grabbing | Banner Hiding

Port Redirection

13. DNS & DHCP • User Enumeration

Penetration Testing

• Introduction & Lab Setup

• DNS Enumeration

• DHCP Packet Analysis with Wireshark

DHCP Starvation Attack

• Rogue DHCP Server

14. NetBIOS & SMB


Penetration Testing

• Introduction & Lab Setup

• SMB Enumeration

• SMB Null Sessions

• Enum4Linux

• Brute Force & Password Cracking

• SMB DOS

• Eternal Blue & Eternal romance

• Remote Login with SMB


15. MySQL Penetration
Testing

• Introduction and Lab setup

• Brute Force & Password Cracking

• MySQL Enumeration
16. Remote Desktop • Extract MySQL-Schema Information
Penetration Testing • Execute MySQL query Remotely

• Extracting Password Hashes


• Introduction & Lab setup
• Enumerate writeable directories
• RDP Enumeration
• Enumerating System Files
• RDP MITM over SSL

• Brute Force & Password Cracking

• RDP Session Hijacking

• Remote Port Forwarding

• DOS Attack

17. VNC Penetration


Testing

• Introduction & Lab setup

• Banner Grabbing

• Banner Hiding

• Port Redirection
18. Credential Dumping
• Brute Force & Password Cracking

• Remote Port Forwarding


• Wireless Creds
• Tunneling Through SSH
• Auto login Password Dump

• Application Creds

• Fake Services

19. Socks Proxy


Penetration Testing

• Socks proxy Lab Setup

• Secure Shell (SSH)

• File Transfer Protocol (FTP)

• HTTP
20. Sniffing & Spoofing

• Introduction

21. DOS Attack • ARP Poisoning


Penetration Testing • MAC Address Snooping

• DNS Spoofing
• Introduction to DOS Attack
• ICMP Redirect
• Botnet
• NTLM Hash Capture
• D-DOS Attack

• SYN Flood Attack

• UDP Flood

• Smurf Attack

• Packet Crafting 22. Covering Tracks &


• Others DOS Attack Tools Maintaining Access

• Persistence_Service

• Persistence_Exe

• Registry_Persistence

• Persistence through Netcat


23. Honeypots • Clear Event Logs

• What are Honeypots

• Working of Honeypots

• Types of Honeypots

• Installation and working of

Honeypots
24. Firewall

• Introduction to Firewall

• Types of Firewall
25. Intrusion Detection • Windows Firewall
System
• Linux Firewall

• What is Intrusion Detection System • Untangle Firewall Implementation

• Working of IDS

• Types of IDS

• Type of IDS Alert

• IDS Implementation using Snort 26. Network Vulnerability


• Capture ICMP Alert Assessment Tool
• TCP Packet Alert
• Nessus
• Capture Malicious Attacks
• Vulnerability Scanning using Nmap

• Nexpose
CONTACT US

Phone No.
+91 9599 387 41 | +91 1145 1031 30

WhatsApp:
https://wa.me/message/HIOPPNENLOX6F1

EMAIL ADDRESS
[email protected]

WEBSITE
www.ignitetechnologies.in

BLOG
www.hackingarticles.in

LINKEDIN
https://www.linkedin.com/company/hackingarticles/

TWITTER
https://twitter.com/hackinarticles

GITHUB
https://github.com/ignitetechnologies

You might also like