Duração:
3 dias
Próxima Data:
Consulte-nos
Local:
Online
Descrição
IT infrastructure is more complex and dynamic than it’s ever been, demanding comprehensive, modern, and well-rehearsed security skills to match. Join this hands-on, 3-day course to develop a strong baseline in infrastructure hacking and widen your career prospects. Get your hands dirty with our popular virtual labs and learn from experienced, practicing penetration testers with a legacy of training at Black Hat.
This course uses a Defense by Offense methodology based on real world offensive research (not theory). That means everything we teach has been tried and tested on live environments and in our labs and can be applied once the course is over.
*PVP por participante. A realização do curso nas datas apresentadas está sujeita a um quórum mínimo de inscrições.
Destinatários
- Students and graduates: improve your employability and enhance your CV
- Infrastructure penetration testers (1-2 years’ experience): build up your ability with the guidance of experienced pentesters and researchers
- Penetration testers in other fields (e.g., web, mobile): develop your infrastructure hacking skills and knowledge
- Network admins: understand how your environment could be attacked
- SOC analysts and engineers: develop your awareness of potential indicators of compromise (IoCs) and more complex malicious behaviors
- Security/IT managers and team leads: update your knowledge of the threat landscape
-
Área: Cybersecurity
-
Certificação Associada: Check Point Certified Pen Testing Expert (CCPE)
Programa:
THE ART OF PORT SCANNING
- Methodology: basic concepts of hacking
- Enumeration techniques and port scanning
THE ART OF ONLINE PASSWORD ATTACKS
- Configure online password attack
- Exploiting network service misconfiguration
THE ART OF HACKING DATABASES
- MySQL, PostgreSQL
- Attack chaining techniques
METASPLOIT BASICS
- Exploitation concepts, Manual exploitation methodology
- Metasploit framework
PASSWORD CRACKING
- Understanding basic concepts of cryptography,
- Design offline brute force attack
HACKING UNIX
- Linux vulnerabilities, misconfiguration
- Privilege escalation techniques
HACKING APPLICATION SERVERS ON UNIX
- Web server misconfiguration
- Multiple exploitation techniques
HACKING THIRD PARTY CONTENT MANAGEMENT SYSTEM (CMS) SOFTWARE
- CMS Software
- Vulnerability scanning & exploitation
WINDOWS ENUMERATION
- Windows Enumeration techniques & Configuration Issues
- Attack chaining
CLIENT-SIDE ATTACKS
- Various Windows client-side attack techniques
PRIVILEGE ESCALATION ON WINDOWS
- Post exploitation
- Windows Privilege escalation techniques
HACKING APPLICATION SERVERS ON WINDOWS
- Web server misconfiguration
- Exploiting Application servers
POST EXPLOITATION
- Metasploit post-exploitation techniques
- Window 10 Security features & different bypass techniques
HACKING WINDOWS DOMAINS
- Understanding Windows Authentication
- Gaining access to Domain Controller
Pré-requisitos:
Delegates must have the following to make the most of the course:
- Basic knowledge of infrastructure application security (at least 1 year experience)
- Basic familiarity with common command line syntax
Partilha: